{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:12:23Z","timestamp":1751688743285,"version":"3.41.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/atsip.2018.8364337","type":"proceedings-article","created":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T22:46:02Z","timestamp":1527201962000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Evidence theory data fusion-based method for cyber-attack detection"],"prefix":"10.1109","author":[{"given":"Adel","family":"Dallali","sequence":"first","affiliation":[]},{"given":"Takwa","family":"Omrani","sequence":"additional","affiliation":[]},{"given":"Belgacem Chibani","family":"Rhaimi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Generalization of the dempster-shafer theory","year":"1993","author":"guan","key":"ref39"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2014.956265"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"journal-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","year":"2006","author":"bishop","key":"ref31"},{"key":"ref30","first-page":"303","article-title":"Log analysis techniques using clustering in network forensics","volume":"10","author":"imam riadi","year":"2012","journal-title":"International Journal of Computer Science and Information Security(IJCSIS)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44792-4_3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119193"},{"key":"ref35","first-page":"1","article-title":"A hybrid intelligent approach for network intrusion detection","volume":"4","author":"mrutyunjaya","year":"2012","journal-title":"Procedia Engineering"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2012.6194588"},{"key":"ref10","article-title":"Improving risk assessment model of cyber security using fuzzy logic inference system","author":"alali","year":"2017","journal-title":"Computers & Security"},{"journal-title":"KDD-CUP-99 Task Description","year":"1999","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2015.7301200"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778942"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2014.6841979"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2014.115"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169133"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IFITA.2009.294"},{"key":"ref17","first-page":"5","article-title":"Advances in the dempster-shafer theory of evidence","author":"smets","year":"1994","journal-title":"What is Dempster-Shafer's Model?"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2016.07.009"},{"key":"ref19","first-page":"1629","article-title":"Intrusion detection systems: A survey and analysis of classification techniques","volume":"2","author":"jaiganesh","year":"2013","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"journal-title":"Statistical Data Mining Tutorials","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2013.6724149"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref3","first-page":"742","article-title":"Intrusion detection systems:a survey and analysis of classification techniques","volume":"3","author":"shahul kshirsagar","year":"2014","journal-title":"International Journal of Scientific Research Engineering and Technology IJRSET"},{"key":"ref6","first-page":"761","article-title":"Authenticating ANN-NAR and ANN-NARMA models utilizing bootstrap techniques","author":"ghani","year":"2017","journal-title":"Intelligent Information and Database Systems-9th Asian Conference ACIIDS 2017"},{"volume":"2001","journal-title":"Self-Aware Services Using Bayesian Networks for Detecting Anomalies in Internet-based Services","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-016-0355-x"},{"journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference","year":"1988","author":"pearl","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119013563"},{"key":"ref2","article-title":"The Top 5 Cybercrimes","author":"singleton","year":"2013","journal-title":"AICPA 220 Leigh Farm Road Durham American Institute of CPAs"},{"journal-title":"4th International Conference on Control Decision and Information Technologies CoDIT 2017","year":"2017","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4018\/ADCFCT"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1016\/j.asej.2013.01.003","article-title":"A hybrid network intrusion detection framework based on random forests and weighted k-means","volume":"4","author":"reda","year":"2013","journal-title":"Shams Engineering Journal(ASEJ)"},{"journal-title":"Anomaly Detection and Machine Learning Methods for Network Intrusion Detection an Industrially Focused Literature Review","year":"2016","key":"ref21"},{"journal-title":"Usefulness of DARPA Dataset for Intrusion Detection System Evaluation","year":"2008","author":"ciza","key":"ref42"},{"key":"ref24","article-title":"Intrusion detection and attack classification using feed-forward neural network","author":"fariba haddadi","year":"2010","journal-title":"Second International Conference on Computer and Network Technology"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMPTELIX.2017.8004032"},{"key":"ref23","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","author":"kotsiantis","year":"2007","journal-title":"Proceedings of the 2007 Conference on Emerging Artificial Intelligence Applications in Computer Engineering Real Word AI Systems with Applications in EHealth HCI Information Retrieval and Pervasive Technologies"},{"journal-title":"High perception intrusion detection system using neural networks","year":"2015","author":"haidar","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.490"}],"event":{"name":"2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)","start":{"date-parts":[[2018,3,21]]},"location":"Sousse","end":{"date-parts":[[2018,3,24]]}},"container-title":["2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8360431\/8364333\/08364337.pdf?arnumber=8364337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T19:07:40Z","timestamp":1751656060000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8364337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/atsip.2018.8364337","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}