{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:15:42Z","timestamp":1759335342509,"version":"3.41.2"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1109\/ic3i59117.2023.10397738","type":"proceedings-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T13:27:08Z","timestamp":1706275628000},"page":"1416-1421","source":"Crossref","is-referenced-by-count":6,"title":["Retracted: Real-Time Innovation in Future Generation Security for Data Privacy Intrusion System in Machine Learning Approach"],"prefix":"10.1109","author":[{"given":"Hansaraj Shalikram","family":"Wankhede","sequence":"first","affiliation":[{"name":"G H Raisoni college of Engineering,Department of artificial Intelligence,Nahpur,Maharashtra,India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Venkatesh","sequence":"additional","affiliation":[{"name":"Karpagam College of Engineering,Department of Computer Science and Engineering,Coimbatore,Tamilnadu,India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sumit","family":"Pundr","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,Uttrakhand,India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ravikiran","family":"Madala","sequence":"additional","affiliation":[{"name":"University of Cumberlands,Durham,North Carolina,US."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kamunuri Ganapathi","family":"Babu","sequence":"additional","affiliation":[{"name":"St. Martin&#x0027;s Engineering College,Department of Computer Science and Engineering,Secunderabad,Telangana,India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Badepally","family":"Mallaiah","sequence":"additional","affiliation":[{"name":"CVR College of Engineering,Department of Information Technology,Hyderabad,Telangana,India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01253-w"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99619-2_36"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.37391\/ijeer.100210"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I56241.2022.10072955"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.26599\/bdma.2022.9020029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.12.082230"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2003.1226084"},{"key":"ref9","first-page":"118","article-title":"Learning Classier for Misuse and Anomaly Detection Using a Bag of System Calls Representation","volume-title":"Proc. of the International Conference on Information Security","author":"Dae-Ki Kang Fuller","year":"2005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icmlc.2004.1382239"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2009.64"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286428"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2006.371"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050754"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11162627"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2022.100575"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.37391\/ijeer.100236"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icac3n53548.2021.9725608"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icses55317.2022.9914340"}],"event":{"name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2023,9,14]]},"location":"Gautam Buddha Nagar, India","end":{"date-parts":[[2023,9,16]]}},"container-title":["2023 6th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10397581\/10397594\/10397738.pdf?arnumber=10397738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T18:32:00Z","timestamp":1753295520000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10397738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ic3i59117.2023.10397738","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]}}}