{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:27:00Z","timestamp":1730233620088,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/icccn49398.2020.9209657","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T20:59:41Z","timestamp":1601499581000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users\u2019 Traffic Patterns"],"prefix":"10.1109","author":[{"given":"Daniel Y.","family":"Karasek","sequence":"first","affiliation":[]},{"given":"Jeehyeong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Victor Youdom","family":"Kemmoe","sequence":"additional","affiliation":[]},{"given":"Md","family":"Zakirul Alam Bhuiyan","sequence":"additional","affiliation":[]},{"given":"Sunghyun","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Junggab","family":"Son","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7590319"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1236"},{"article-title":"Anomaly detection using one-class neural networks","year":"2018","author":"chalapathy","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"article-title":"Network traffic anomaly detection using recurrent neural networks","year":"2018","author":"radford","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.04.004"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref4","first-page":"6006","article-title":"Enhance intrusion detection capabilities via weighted chi-square, discretization and svm","volume":"96","author":"mohamed","year":"2018","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2766844"},{"key":"ref6","first-page":"1","article-title":"Deep weakly-supervised anomaly detection","author":"pang","year":"2020"},{"key":"ref5","first-page":"1","article-title":"Comparison of supervised, semi-supervised and unsupervised learning methods in network intrusion detection system (nids) application","author":"arunraj","year":"2017","journal-title":"Anwendungen und Konzepte der Wirtschaftsinformatik"},{"key":"ref8","first-page":"149","article-title":"Host based intrusion detection system with combined cnn\/rnn model","author":"chawla","year":"2018","journal-title":"Proc Eur Conf Mach Learn Knowl Discovery Databases"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.03.011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref1","first-page":"292","article-title":"Anomaly detection and machine learning methods for network intrusion detection: an industrially focused literature review","author":"gilmore","year":"2016","journal-title":"Proceedings of the International Conference on Security and Management (SAM)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.009"}],"event":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2020,8,3]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2020,8,6]]}},"container-title":["2020 29th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9205796\/9209588\/09209657.pdf?arnumber=9209657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T02:19:53Z","timestamp":1657333193000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9209657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccn49398.2020.9209657","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}