{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T13:01:40Z","timestamp":1770555700191,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,29]]},"DOI":"10.1109\/ecai58194.2023.10194229","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:33:22Z","timestamp":1690997602000},"page":"1-4","source":"Crossref","is-referenced-by-count":3,"title":["Autoencoders and AutoML for intrusion detection"],"prefix":"10.1109","author":[{"given":"Alina Florina","family":"Glavan","sequence":"first","affiliation":[{"name":"University POLITEHNICA of Bucharest,Faculty of Electronics, Telecommunications and Information,Bucharest,Romania"}]},{"given":"Victor","family":"Croitoru","sequence":"additional","affiliation":[{"name":"University POLITEHNICA of Bucharest,Faculty of Electronics, Telecommunications and Information,Bucharest,Romania"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3115697"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2849509"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3050441"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377192"},{"key":"ref11","article-title":"The 5G Guide: A reference for operators","year":"2019","journal-title":"GSMA"},{"key":"ref10","author":"erickson","year":"2020","journal-title":"AutoGluon-Tabular Robust and Accurate AutoML for Structured Data"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916180"},{"key":"ref1","year":"0","journal-title":"AT&T Cybersecurity Insights"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIA55826.2022.9993487"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2995133"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994079"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/asb.2023.15"},{"key":"ref23","year":"0","journal-title":"NSL-KDD | Datasets | Research | Canadian Institute for Cybersecurity | UNB"},{"key":"ref26","year":"0","journal-title":"Project Jupyter | Try Jupyter"},{"key":"ref25","year":"0","journal-title":"AutoGluon-Tabular - Amazon SageMaker"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2019.8817340"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3001017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022855"},{"key":"ref27","year":"0","journal-title":"Accuracy Precision and Recall in Deep Learning | Paperspace Blog"},{"key":"ref8","year":"0","journal-title":"What are the Advantages of Automated Machine Learning?"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00346-1"},{"key":"ref9","article-title":"H2O AutoML: Scalable Automatic Machine Learning","volume":"2020","author":"ledell","year":"0","journal-title":"Proceedings of the AutoML Workshop at ICML"},{"key":"ref4","article-title":"NIST Special Publication on Intrusion Detection Systems Intrusion Detection Systems","author":"bace","year":"2001","journal-title":"Booz Allen and Hamilton INC MCLean VA"},{"key":"ref3","year":"0","journal-title":"European Union Agency for Cybersecurity"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref5","article-title":"Intrusion Detection Systems: A Survey and Taxonomy","author":"axelsson","year":"2000","journal-title":"Technical Report"}],"event":{"name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","location":"Bucharest, Romania","start":{"date-parts":[[2023,6,29]]},"end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10193876\/10193857\/10194229.pdf?arnumber=10194229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:42:55Z","timestamp":1692639775000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10194229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,29]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ecai58194.2023.10194229","relation":{},"subject":[],"published":{"date-parts":[[2023,6,29]]}}}