{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:15:24Z","timestamp":1768292124769,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422401","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":60,"title":["Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures"],"prefix":"10.1109","author":[{"given":"Safa","family":"Otoum","sequence":"first","affiliation":[]},{"given":"Burak","family":"Kantarci","sequence":"additional","affiliation":[]},{"given":"Hussein","family":"Mouftah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/11196.2007.900242"},{"key":"ref11","first-page":"1142","article-title":"Intrusion detection using data mining approach","volume":"3","author":"jayshree","year":"2014","journal-title":"International Journal of Science and Research (IJSR)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SISY.2017.8080566"},{"key":"ref13","first-page":"14","author":"nokuthala","year":"2017","journal-title":"A fuzzy logic based network intrusion detection system for predicting the tcp syn flooding attack"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2016.7561088"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AUTEST.2017.8080473"},{"key":"ref16","first-page":"153","author":"honig","year":"2002","journal-title":"Adaptive model generation An architecture for deployment of data mining-based intrusion detection systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2701551"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577152"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288409"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.5120\/7470-0475","article-title":"Article: Anomaly detection based on machine learning: Dimensionality reduction using pca and classification using svm","volume":"47","author":"george","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2013.6466310"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2017.2752719"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2016.7496502"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IOTA.2016.7562709"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986278"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2015.7133612"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997099"},{"key":"ref20","article-title":"An adaptive density-based clustering algorithm for spatial database with noise","author":"ma","year":"0","journal-title":"IEEE International Conference on Data Mining (ICDM'04)"},{"key":"ref22","year":"0","journal-title":"Breiman Leo and Cutler Adele Random Forests"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"ref24","year":"0","journal-title":"KDD Cup 1999 data"},{"key":"ref23","year":"0","journal-title":"The Ns-3 Tutorial"},{"key":"ref25","first-page":"290","article-title":"A new approach for evaluating intrusion detection system","volume":"2","author":"elhamahmy","year":"2010","journal-title":"International Journal of Artificial Intelligent Systems and Machine Learning"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","location":"Kansas City, MO","start":{"date-parts":[[2018,5,20]]},"end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422401.pdf?arnumber=8422401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:33:42Z","timestamp":1598240022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422401","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}