{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:58:17Z","timestamp":1770814697731,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/comm48946.2020.9141989","type":"proceedings-article","created":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T20:29:20Z","timestamp":1594931360000},"page":"291-296","source":"Crossref","is-referenced-by-count":14,"title":["Machine learning approach to quick incident response"],"prefix":"10.1109","author":[{"given":"Constantin","family":"Nila","sequence":"first","affiliation":[]},{"given":"Ioana","family":"Apostol","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Patriciu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An Introduction to Kernel and Nearest Neighbor","volume":"46","author":"altman","year":"1991","journal-title":"The American Statistician"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973105.102"},{"key":"ref10","author":"jang","year":"1996","journal-title":"Neuro-Fuzzy and Soft Computing A Computational Approach to Learning and Machine Intelligence"},{"key":"ref11","author":"breiman","year":"1984","journal-title":"Classification and Regression Trees"},{"key":"ref12","first-page":"582","author":"scholkopf","year":"2000","journal-title":"Support Vector Method for Novelty Detection"},{"key":"ref13","article-title":"Vectra&#x00AE; AI-based network detection and response (NDR)","year":"0"},{"key":"ref14","article-title":"What is SIEM and How Does it Relate to Big Data and Machine Learning?","year":"0"},{"key":"ref15","article-title":"Improve IT Security With Vulnerability Management","author":"williams","year":"2005"},{"key":"ref16","article-title":"What is SIEM?","year":"0"},{"key":"ref17","article-title":"General Data Protection Regulation (GDPR)","year":"0"},{"key":"ref18","year":"0","journal-title":"NIS Directive"},{"key":"ref19","author":"lambert ii","year":"2017","journal-title":"Security Analytics Using Deep Learning to Detect"},{"key":"ref28","article-title":"Exploratory Data Analysis, Categorical Data &#x2014; Part II","author":"ng","year":"0"},{"key":"ref4","article-title":"Classification Of Attacks In Network Intrusion Detection System","volume":"4","author":"patil","year":"2013","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref27","author":"davidson","year":"2019","journal-title":"Security Gets Smart with AI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05197-5_9"},{"key":"ref6","article-title":"Intrusion detection evaluation dataset (ISCXIDS2012)","year":"2012"},{"key":"ref29","article-title":"Privacy Preserving Machine Learning: Threats and Solutions","author":"al-rubaie","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v6i5.pp2432-2436"},{"key":"ref7","article-title":"Machine Learning Techniques for Intrusion Detection","author":"zamani","year":"2013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/9781315213262"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/21047-3678"},{"key":"ref1","author":"chebbi","year":"2018","journal-title":"Mastering Machine Learning for Penetration Testing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2018.095298"},{"key":"ref22","article-title":"Machine Learning Methods for Malware Detection","year":"2020","journal-title":"Kaspersky"},{"key":"ref21","author":"davis","year":"2017","journal-title":"Machine learning and feature engineering for computer network security"},{"key":"ref24","article-title":"Malware Detection Using Deep Learning","author":"kulshrestha","year":"2019","journal-title":"Towardsdatascience com"},{"key":"ref23","article-title":"HOW TO CREATE A MALWARE DETECTION SYSTEM WITH MACHINE LEARNING","author":"margaritelli","year":"2019","journal-title":"vilsocket net"},{"key":"ref26","article-title":"Cyber Threat Detection using Word Embeddings and Deep Learning","author":"prejbean","year":"2019","journal-title":"Bitdefender"},{"key":"ref25","article-title":"Unmasking DeepFakes with simple Features","author":"durall","year":"2019","journal-title":"paperswithcode com"}],"event":{"name":"2020 13th International Conference on Communications (COMM)","location":"Bucharest, Romania","start":{"date-parts":[[2020,6,18]]},"end":{"date-parts":[[2020,6,20]]}},"container-title":["2020 13th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9139890\/9141948\/09141989.pdf?arnumber=9141989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T05:41:45Z","timestamp":1723268505000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9141989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/comm48946.2020.9141989","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}