{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:21:30Z","timestamp":1757452890913,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1109\/icccnt54827.2022.9984365","type":"proceedings-article","created":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:44:09Z","timestamp":1672083849000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Man-In-The-Middle Attack Detection Using Ensemble Learning"],"prefix":"10.1109","author":[{"given":"Krittika","family":"Das","sequence":"first","affiliation":[{"name":"Techno International New Town,Department of CSE,Kolkata,India,700156"}]},{"given":"Rajdeep","family":"Basu","sequence":"additional","affiliation":[{"name":"Techno International New Town,Department of AI &amp; ML,Kolkata,India,700156"}]},{"given":"Raja","family":"Karmakar","sequence":"additional","affiliation":[{"name":"Techno International New Town,Department of CSE,Kolkata,India,700156"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MECON53876.2022.9752406"},{"volume-title":"An adaptive ensemble machine learning model for intrusion detection","author":"HU","key":"ref3"},{"article-title":"An insight into \u201cdecision tree analysis","year":"2017","author":"Chandra","key":"ref4"},{"article-title":"Knn model-based approach in classification","year":"2004","author":"Wang","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2514489"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT47585.2019.8962457"},{"article-title":"Artificial neural network (ann) based fast and accurate inductor modeling and design","year":"2020","author":"Papamanolis","key":"ref8"},{"article-title":"Support vector machine (svm) classification through geometry","year":"2005","author":"Mavroforakis","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT52419.2022.9711555"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2008.25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/OPTIM.2014.6850925"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VCIP47243.2019.8965682"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT54504.2022.9817151"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCAF.2017.8344724"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ElConRus51938.2021.9396241"},{"article-title":"Dos: Routing with reinforcement learning","year":"2010","author":"Reig","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIEA.2010.5679451"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2006.32"},{"article-title":"Minmaxscaler binary pso for feature selection","year":"2020","author":"Agarwal","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/EEEI.2010.5662159"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2006.277607"},{"key":"ref24","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"Pedregosa","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref25","first-page":"1","article-title":"Ml using tensorflow","volume-title":"2020 IEEE Integrated STEM Education Conference (ISEC)","author":"Albayrak"}],"event":{"name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2022,10,3]]},"location":"Kharagpur, India","end":{"date-parts":[[2022,10,5]]}},"container-title":["2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9984157\/9984211\/09984365.pdf?arnumber=9984365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:58:33Z","timestamp":1706763513000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9984365\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icccnt54827.2022.9984365","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]}}}