{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:03:38Z","timestamp":1766484218827},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,4]]},"DOI":"10.1109\/globecom48099.2022.10000985","type":"proceedings-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T22:24:18Z","timestamp":1673475858000},"page":"2662-2667","source":"Crossref","is-referenced-by-count":10,"title":["Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Jinxin","family":"Liu","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science University of Ottawa,Ottawa,Canada"}]},{"given":"Murat","family":"Simsek","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science University of Ottawa,Ottawa,Canada"}]},{"given":"Burak","family":"Kantarci","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science University of Ottawa,Ottawa,Canada"}]},{"given":"Mehran","family":"Bagheri","sequence":"additional","affiliation":[{"name":"AI and Analytics Ciena Corp.,Ottawa,Canada"}]},{"given":"Petar","family":"Djukic","sequence":"additional","affiliation":[{"name":"AI and Analytics Ciena Corp.,Ottawa,Canada"}]}],"member":"263","reference":[{"key":"ref1","first-page":"35","volume-title":"A taxonomy and survey of intrusion detection system design techniques, network threats and datasets","author":"Hindy","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799854"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1000\/1\/012049"},{"key":"ref5","article-title":"Generalizations of the bias\/variance decompo-sition for prediction error","volume-title":"Tech. Rep.","author":"James","year":"1997"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"volume-title":"KDD Cup 1999 Data","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/9781786340757_0002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/9781786345646_001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2019.8735640"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5695021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"volume-title":"IDS 2018 Datasets Research Canadian Institute for Cybersecurity UNB","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00382-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03410-y"},{"journal-title":"Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks","year":"2019","author":"Basnet","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IAICT50021.2020.9172014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2991876"}],"event":{"name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","start":{"date-parts":[[2022,12,4]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2022,12,8]]}},"container-title":["GLOBECOM 2022 - 2022 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10000063\/10000593\/10000985.pdf?arnumber=10000985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T03:09:34Z","timestamp":1707448174000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10000985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/globecom48099.2022.10000985","relation":{},"subject":[],"published":{"date-parts":[[2022,12,4]]}}}