{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:59:06Z","timestamp":1774267146415,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/eit53891.2022.9814045","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T19:32:19Z","timestamp":1657222339000},"page":"606-615","source":"Crossref","is-referenced-by-count":13,"title":["Network Anomaly Uncovering on CICIDS-2017 Dataset: A Supervised Artificial Intelligence Approach"],"prefix":"10.1109","author":[{"given":"Pankaj","family":"Jairu","sequence":"first","affiliation":[{"name":"St. Cloud State University,Department of Information Systems,St. Cloud,MN,USA"}]},{"given":"Akalanka B.","family":"Mailewa","sequence":"additional","affiliation":[{"name":"St. Cloud State University,Department of Computer Science and Information Technology,St. Cloud,MN,USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78503-5_6"},{"key":"ref38","article-title":"Using 5G in Smart Cities: A Systematic Mapping Study","volume":"200065","author":"chen","year":"2022","journal-title":"Journal of Intelligent Systems with Applications"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2021.200048"},{"key":"ref32","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2020.100197"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2847722"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66854-3_19"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1260\/1748-3018.6.3.385"},{"key":"ref35","first-page":"5","article-title":"DARKNET AND BLACK MARKET ACTIVITIES AGAINST THE CYBERSECURITY: A SURVEY","author":"mojolaoluwa","year":"0","journal-title":"Midwest instructions and computing symposium"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref40","article-title":"Sklearn.Metrics.Precision_recall_fscore_support-scikit-learn 0.24.2 documentation","year":"0","journal-title":"Scikit-learn org"},{"key":"ref11","author":"mailewa dissanayaka","year":"0","journal-title":"Vulnerability Prioritization Root Cause Analysis and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux Containers In The 4th International Conference on Compute and Data Analysis -2020 (ICCDA-2020)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102177"},{"key":"ref13","article-title":"Intrusion detection approach based on optimised Artificial neural network","author":"chora?","year":"2020","journal-title":"Neurocomputing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102804"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102688"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"ref28","first-page":"34","article-title":"A linear classifier based approach for identifying security requirements in open source software development","author":"wentao","year":"2019","journal-title":"Journal of Industrial Information Integration"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"ref27","first-page":"5","article-title":"SECURITY THREATS\/ATTACKS VIA BOTNETS AND BOTNET DETECTION & PREVENTION TECHNIQUES IN COMPUTER NETWORKS: A REVIEW","author":"emerald","year":"0","journal-title":"Midwest instructions and computing symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104216"},{"key":"ref6","first-page":"91","author":"dissanayaka","year":"2017","journal-title":"A Review of MongoDB and Singularity Container Security in regards to HIPAA Regulations In Companion Proceedings of the10th International Conference on Utility and Cloud Computing (UCC '17 Companion)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref5","first-page":"99","author":"ramprasad shetty","year":"2017","journal-title":"Secure NoSQL Based Medical Data Processing and Retrieval The Exposome Project In Companion Proceedings of the10th International Conference on Utility and Cloud Computing (UCC '17 Companion)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.07.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106301"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02529-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2021.200056"},{"key":"ref20","author":"mailewa dissanayaka","year":"0","journal-title":"Dynamic & portable vulnerability assessment testbed with Linux containers to ensure the security of MongoDB in Singularity LXCs In Companion Conference of the Supercomputing-2018 (SC18)"},{"key":"ref45","first-page":"1","article-title":"The Role of Intrusion Detection\/Prevention Systems in Modern Computer Networks: A Review","volume":"53","author":"suman","year":"2020","journal-title":"In Conference Midwest Instruction and Computing Symposium (MICS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECloudSummit48914.2020.00013"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.069"},{"key":"ref41","first-page":"1955","author":"dissanayaka","year":"2020","journal-title":"Security assurance of MongoDB in singularity LXCs an elastic and convenient testbed using Linux containers to explore vulnerabilities Cluster Comput 23"},{"key":"ref23","article-title":"Leveraging Asynchronous Federated Learning to Predict Customers Financial Distress","volume":"200064","author":"imteaj","year":"2022","journal-title":"Journal of Intelligent Systems with Applications"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009843"},{"key":"ref26","first-page":"14","article-title":"Network traffic behavioral analytics for detection of DDoS attacks","volume":"2","author":"lopez","year":"2019","journal-title":"SMU Data Science Review"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0527-8"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep Learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"}],"event":{"name":"2022 IEEE International Conference on Electro Information Technology (eIT)","location":"Mankato, MN, USA","start":{"date-parts":[[2022,5,19]]},"end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9813697\/9813750\/09814045.pdf?arnumber=9814045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:44:57Z","timestamp":1659660297000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9814045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/eit53891.2022.9814045","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}