{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:36:03Z","timestamp":1738215363685,"version":"3.34.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/csnet64211.2024.10851732","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:35:01Z","timestamp":1738089301000},"page":"157-160","source":"Crossref","is-referenced-by-count":0,"title":["Towards an Unsupervised Reward Function for a Deep Reinforcement Learning Based Intrusion Detection System"],"prefix":"10.1109","author":[{"given":"Bilel","family":"Saghrouchni","sequence":"first","affiliation":[{"name":"INSA Lyon, Inria, CITI, UR3720,Villeurbanne,France,69621"}]},{"given":"Fr\u00e9d\u00e9ric Le","family":"Mou\u00ebl","sequence":"additional","affiliation":[{"name":"INSA Lyon, Inria, CITI, UR3720,Villeurbanne,France,69621"}]},{"given":"Bogdan","family":"Szanto","sequence":"additional","affiliation":[{"name":"SPIE ICS,Bron,France,69500"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/computers11030041"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.104743"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3179720"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2023.104089"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"ref6","first-page":"440","article-title":"The influence of reward on the speed of reinforcement learning: An analysis of shaping","volume-title":"Proceedings of the 20th International Conference on Machine Learning (ICML-03)","author":"Laud","year":"2003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref9","article-title":"Traffic anomaly detection using k-means clustering","volume-title":"Gi\/itg workshop mmbnet","volume":"7","author":"M\u00fcnz","year":"2007"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"issue":"3.24","key":"ref11","first-page":"479","article-title":"A detailed analysis of cicids2017 dataset for designing intrusion detection systems","volume":"7","author":"Panigrahi","year":"2018","journal-title":"International Journal of Engineering & Technology"},{"issue":"12","key":"ref12","first-page":"1848","article-title":"A detailed analysis on nsl-kdd dataset using various machine learning techniques for intrusion detection","volume":"2","author":"Revathi","year":"2013","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8693059"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027452"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027452"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900366"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/math12070948"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v20i05.48229"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09874-x"}],"event":{"name":"2024 8th Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2024,12,4]]},"location":"Paris, France","end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 8th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10851715\/10851472\/10851732.pdf?arnumber=10851732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:45:07Z","timestamp":1738133107000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10851732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/csnet64211.2024.10851732","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}