{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:09:36Z","timestamp":1732770576808,"version":"3.29.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10725547","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["A Long-Short Term Memory Model-based approach for smart intrusion detection systems"],"prefix":"10.1109","author":[{"given":"Dasari Deepthi","family":"Reddy","sequence":"first","affiliation":[{"name":"GITAM (Deemed to be University),School of Technology,Dept. of CSE,Hyderabad,Telangana,India"}]},{"given":"G.","family":"HimaBindu","sequence":"additional","affiliation":[{"name":"GITAM (Deemed to be University),School of Technology,Dept. of CSE,Hyderabad,Telangana,India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MC.2018.3011034"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.4018\/978-1-5225-9866-4.ch026"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-1-4842-5914-6_1"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/access.2019.2908225"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3052973.3053013"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/mcom.2019.1800819"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.04.012","article-title":"False alarm minimization techniques in signature-based intrusion detection systems: a survey","volume":"49","author":"Hubballi","year":"2014","journal-title":"Comput. Commun."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.cose.2017.05.009","article-title":"Flow-based intrusion detection: techniques and challenges","volume":"70","author":"Umer","year":"2017","journal-title":"Comput. Secur."},{"issue":"4","key":"ref9","doi-asserted-by":"crossref","first-page":"3369","DOI":"10.1109\/COMST.2018.2854724","article-title":"From intrusion detection to attacker attribution: a comprehensive survey of unsupervised methods","volume":"20","author":"Nisioti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"ref10","first-page":"493","article-title":"Survey on sdn based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw","volume":"12","author":"Sultana","year":"2019","journal-title":"Appl."},{"key":"ref11","article-title":"How to break anonymity of the netflix prize dataset","author":"Narayanan","year":"2006","journal-title":"ArXiv abs\/ cs\/0610105"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"580","DOI":"10.5937\/vojtehg66-16670","article-title":"Review of kdd cup \u201899, nsl-kdd and kyoto 2006+ datasets","volume":"66","author":"Protic","year":"2018","journal-title":"Vojnotehnicki glasnik"},{"key":"ref14","first-page":"177","article-title":"Towards a reliable intrusion detection benchmark dataset. Software Netw","volume":"2017","author":"Sharafaldin","year":"2017"},{"key":"ref15","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin","year":"2018"},{"key":"ref16","first-page":"413","volume-title":"Isolation forest","author":"Liu","year":"2009"},{"volume-title":"A tutorial on principal component analysis","year":"2014","author":"Shlens","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach Learn."}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10725547.pdf?arnumber=10725547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:59:01Z","timestamp":1732683541000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10725547\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10725547","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}