{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:11:29Z","timestamp":1771024289293,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,6]]},"DOI":"10.1109\/icccnt56998.2023.10306428","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T13:54:40Z","timestamp":1700747680000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Comparative Analysis of State-of-the-Art Attack Detection Models"],"prefix":"10.1109","author":[{"given":"Priyanka","family":"Kumari","sequence":"first","affiliation":[{"name":"UIET Panjab University,Department of Information Technology,Chandigarh,India,160014"}]},{"given":"Veenu","family":"Mangat","sequence":"additional","affiliation":[{"name":"UIET Panjab University,Department of Information Technology,Chandigarh,India,160014"}]},{"given":"Anshul","family":"Singh","sequence":"additional","affiliation":[{"name":"UIET Panjab University,Department of Information Technology,Chandigarh,India,160014"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"SolarWinds hack explained: Everything you need to know"},{"key":"ref2","volume-title":"Colonial Pipeline CEO testifies on first hours of ransomware attack","year":"2021"},{"key":"ref3","volume-title":"JBS S.A. ransomware attack"},{"key":"ref4","volume-title":"The Microsoft Exchange Serverhack: A timeline"},{"key":"ref5","article-title":"Use of machine learning for securing IoT","author":"Singh","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s22103607"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564644"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411621080241"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-08536-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00435-0"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-2357212\/v1","article-title":"A Hybrid PCA-MAO Based LSTM Model for Intrusion Detection in IoT Environments","author":"Karamollao\u011flu","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s22155690"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040529"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9343-4_16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.33915\/etd.8024"},{"key":"ref16","article-title":"Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis","author":"Bobrovnikova","year":"2020"},{"key":"ref17","article-title":"Comparing Machine Learning and Deep Learning for IoT botnet detection","author":"Li"},{"key":"ref18","article-title":"Machine Learning for Anomaly Detection in IoT networks: Malware analysis on the IoT-23 Data set","author":"Stoian"},{"key":"ref19","article-title":"Anomaly Detection Algorithms and Techniques for Network Intrusion Detection Systems","author":"Mishin"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3233\/AIS-210600"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s22103646"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3103\/S014641162108040X"}],"event":{"name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Delhi, India","start":{"date-parts":[[2023,7,6]]},"end":{"date-parts":[[2023,7,8]]}},"container-title":["2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10306338\/10306339\/10306428.pdf?arnumber=10306428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T07:56:34Z","timestamp":1710402994000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10306428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccnt56998.2023.10306428","relation":{},"subject":[],"published":{"date-parts":[[2023,7,6]]}}}