{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:03:00Z","timestamp":1725742980145},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7840711","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T16:46:59Z","timestamp":1486486019000},"page":"1082-1089","source":"Crossref","is-referenced-by-count":2,"title":["On the feasibility of an embedded machine learning processor for intrusion detection"],"prefix":"10.1109","author":[{"given":"Rajesh","family":"Sankaran","sequence":"first","affiliation":[]},{"given":"Ricado A.","family":"Calix","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.medengphy.2014.06.012"},{"year":"0","journal-title":"Data set","key":"ref11"},{"year":"0","author":"hardware","article-title":"Schematic for the CM1K-PGA69 machine learning chip","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TSMCB.2006.885306"},{"key":"ref14","article-title":"Taxicab Geometry","author":"krause","year":"1987","journal-title":"Dover"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICIIP.2011.6108866"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/WCNC.2013.6555301"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-642-12365-8_5"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1017\/CBO9780511543241"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.comnet.2014.08.007"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TSMC.2014.2373816"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TSMCC.2008.923876"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.ijpe.2011.07.002"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIFS.2009.2026954"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/382912.382923"},{"key":"ref5","first-page":"12","article-title":"A database of computer attacks for the evaluation of intrusion detection systems","author":"kendall","year":"1999","journal-title":"Proc DARPA Information Survivability Conf Exposition (DISCEX)"},{"key":"ref8","article-title":"Risk and responsibility in a hyper-connected world: Implications for enterprises","author":"chinn","year":"2014","journal-title":"A report from McKinsey & Company"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/CISDA.2009.5356528"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIFS.2007.916288"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIE.2010.2052533"},{"year":"2011","author":"witten","article-title":"Data Mining: Practical Machine Learning Tools and Techniques","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.comnet.2007.02.001"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/BF00387211"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ISPASS.2009.4919649"},{"key":"ref24","article-title":"Feature Ranking and Support Vector Machines Classification Analysis of the NSL-KDD Intrusion Detection Corpus","author":"calix","year":"2013","journal-title":"proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference (FLAIRS-26)"},{"key":"ref23","first-page":"674","article-title":"Pattern class degeneracy in an unrestricted storage density memory","author":"scofield","year":"1988","journal-title":"in Neural Information Processing Systems Denver CO 1987"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.cor.2010.12.011"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.ins.2013.10.008"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07840711.pdf?arnumber=7840711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T17:40:50Z","timestamp":1488390050000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7840711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7840711","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}