{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T07:33:39Z","timestamp":1766820819026,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8125851","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T22:26:11Z","timestamp":1512426371000},"page":"266-274","source":"Crossref","is-referenced-by-count":10,"title":["Evaluating shallow and deep networks for secure shell (ssh)traffic analysis"],"prefix":"10.1109","author":[{"given":"R","family":"Vinayakumar","sequence":"first","affiliation":[]},{"given":"K. P.","family":"Soman","sequence":"additional","affiliation":[]},{"given":"Prabaharan","family":"Poornachandran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972719.29"},{"key":"ref11","article-title":"Selecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets","author":"kayacik","year":"2005","journal-title":"Proceedings of the Third Annual Conference on Privacy Security and Trust"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","article-title":"Adaboost-based algorithm for network intrusion detection","volume":"38","author":"hu","year":"2008","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39945-3_6"},{"key":"ref16","first-page":"11","article-title":"Naive bayesian networks in intrusion detection systems","author":"amor","year":"2003","journal-title":"Proc Workshop on Probabilistic Graphical Models for Classification 14th European Conference on Machine Learning (ECML) and the 7th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD) 23rd September"},{"key":"ref17","first-page":"385","article-title":"Parzen-window network intrusion detectors","volume":"4","author":"yeung","year":"2002","journal-title":"Pattern Recognition 2002 Proceedings 16th International Conference"},{"key":"ref18","article-title":"Ensemble learning for intrusion detection in computer networks","author":"didaci","year":"2002","journal-title":"Workshop Machine Learning Methods Applications"},{"key":"ref19","first-page":"1","article-title":"Using genetic algorithm for network intrusion detection","volume":"1","author":"li","year":"2004","journal-title":"Proceedings of the United States Department of Energy Cyber Security Group"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v52i0.200"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.41"},{"key":"ref27","first-page":"105","article-title":"Feature set reduction for automatic network intrusion detection with machine learning algorithms","author":"staudemeyer","year":"2009","journal-title":"Proc the Southern Africa Telecommunication Networks and Applications Conference (SATNAC)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2002-101-202"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2015.7443094"},{"journal-title":"Shallow and deep networks intrusion detection system A taxonomy and survey","year":"2017","author":"hodo","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39945-3_11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286428"},{"key":"ref1","article-title":"Computer security threat monitoring and surveillance","author":"anderson","year":"1980","journal-title":"Technical report James P Anderson Company Fort Washington Pennsylvania Tech Rep"},{"key":"ref20","first-page":"13","article-title":"Kernel based intrusion detection system","author":"kim","year":"2005","journal-title":"Computer and Information Science 2005 Fourth Annual ACIS International Conference on IEEE"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref21","first-page":"15","article-title":"A neural network based system for intrusion detection and classification of attacks","author":"moradi","year":"2004","journal-title":"Proceedings of the IEEE International Conference on Advances in Intelligent Systems-Theory and Applications"},{"key":"ref24","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref23","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","volume":"16","author":"abadi","year":"2016","journal-title":"OSDI"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2450498"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2017,9,13]]},"location":"Udupi","end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08125851.pdf?arnumber=8125851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T11:26:15Z","timestamp":1570447575000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8125851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8125851","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}