{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:40:09Z","timestamp":1730227209439,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10073369","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T13:34:44Z","timestamp":1679492084000},"page":"645-649","source":"Crossref","is-referenced-by-count":0,"title":["Time-stretching and genetic zooms in OutGene: Detecting Undefined Network Attacks"],"prefix":"10.1109","author":[{"given":"Ms. Jyoti","family":"Shekhawat","sequence":"first","affiliation":[{"name":"Vivekananda Global University,Department of Computer Science Engineering,Jaipur,India"}]},{"given":"Ms. Rashmi","family":"Khurana","sequence":"additional","affiliation":[{"name":"Chandigarh School of Business,Department of Master of Computer Application,Jhanjeri,India"}]}],"member":"263","reference":[{"key":"ref13","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","author":"macqueen","year":"1967","journal-title":"Proc Berkeley Symp on Math Statist and Prob"},{"key":"ref12","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"The Proceedings of the 7th USENIX Security Symposium"},{"article-title":"Mastering Apache Spark 2.x: Scalable Analytics Faster than Ever","year":"2017","author":"kienzler","key":"ref11"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11875604_20"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref1","first-page":"110","article-title":"Feature selection for clustering: A review","volume":"29","author":"alelyani","year":"2013","journal-title":"Data Clustering"},{"key":"ref8","first-page":"2171","article-title":"Deep: evolutionary algorithms made easy","volume":"13","author":"fortin","year":"2012","journal-title":"J Mach Learn Res"},{"journal-title":"CheckPoint 2018 security report Welcome to the future of cyber security","year":"2018","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.216"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.39"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10073369.pdf?arnumber=10073369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T15:00:56Z","timestamp":1681138856000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10073369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10073369","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}