{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T04:09:06Z","timestamp":1747714146269,"version":"3.40.5"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,21]]},"DOI":"10.1109\/icaiic54071.2022.9722691","type":"proceedings-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T20:41:38Z","timestamp":1646167298000},"page":"011-016","source":"Crossref","is-referenced-by-count":2,"title":["NetMD- Network Traffic Analysis and Malware Detection"],"prefix":"10.1109","author":[{"given":"Sampath Kumar","family":"Katherasala","sequence":"first","affiliation":[{"name":"Tata Consultancy Services Limited,Hyderabad,India"}]},{"given":"Vaddeboyina","family":"Sri Manvith","sequence":"additional","affiliation":[{"name":"Tata Consultancy Services Limited,Hyderabad,India"}]},{"given":"Ajay","family":"Therala","sequence":"additional","affiliation":[{"name":"Tata Consultancy Services Limited,Hyderabad,India"}]},{"given":"Manjari","family":"Murala","sequence":"additional","affiliation":[{"name":"IIIT Hyderabad,India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"key":"ref3","first-page":"1","article-title":"A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks","author":"ullah","year":"2019","journal-title":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)"},{"year":"2015","article-title":"Stratosphere Laboratory Datasets","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.32604\/cmc.2020.09802"},{"key":"ref11","first-page":"108","author":"sharafaldin","year":"2018","journal-title":"Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-030-45778-5_16"},{"year":"0","article-title":"NetML Network Traffic Analytics Challenge 2020","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ACCESS.2017.2747560"},{"year":"2021","author":"hu","journal-title":"Network Traffic Classification Model Based on Attention Mechanism and Spatiotemporal Features","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00225"},{"year":"0","article-title":"NetML: A Challenge for Network Traffic Analysis","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ACCESS.2018.2841987"}],"event":{"name":"2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","start":{"date-parts":[[2022,2,21]]},"location":"Jeju Island, Korea, Republic of","end":{"date-parts":[[2022,2,24]]}},"container-title":["2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9722611\/9722613\/09722691.pdf?arnumber=9722691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T17:55:25Z","timestamp":1747677325000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9722691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,21]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icaiic54071.2022.9722691","relation":{},"subject":[],"published":{"date-parts":[[2022,2,21]]}}}