{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:40:30Z","timestamp":1774680030227,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T00:00:00Z","timestamp":1770076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T00:00:00Z","timestamp":1770076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,2,3]]},"DOI":"10.1109\/icce67443.2026.11449868","type":"proceedings-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T19:47:50Z","timestamp":1774640870000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Stacking Ensemble-Based Framework for Intrusion Detection in Internet-of-Energy (IoE) Systems"],"prefix":"10.1109","author":[{"given":"Abdallah","family":"Moubayed","sequence":"first","affiliation":[{"name":"King Fahd University of Petroleum &#x0026; Minerals,Computer Engineering Department and Interdisciplinary Research Center for Intelligent Secure Systems,Dhahran,Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyai.2023.100306"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAISC56366.2023.10085312"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03423-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/OCIT53463.2021.00081"},{"key":"ref5","first-page":"2013","volume-title":"Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things","author":"Ghazal","year":"2023"},{"key":"ref6","article-title":"Optimization Modeling and Machine Learning Techniques Towards Smarter Systems and Processes","volume-title":"Ph.D. dissertation","author":"Moubayed","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC62547.2024.10759066"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE47787.2020.9255697"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/9789811273209_0004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/fi16090331"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES51350.2021.9489177"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02968-1"},{"key":"ref13","first-page":"100071","article-title":"A comparative analysis of k-nearest neighbor, genetic, support vector machine, decision tree, and long short term memory algorithms in machine learning","volume-title":"Decision Analytics Journal","volume":"3","author":"Bansal","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICM50269.2020.9331794"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICM50269.2020.9331819"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2631891"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2023.129493"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MMS48040.2019.9157321"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277206"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2994177"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3233793"},{"issue":"22","key":"ref22","article-title":"A study of network intrusion detection systems using artificial intelligence\/machine learning","volume-title":"Applied Sciences","volume":"12","author":"Vanin","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43300-9_38"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9596-5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102667"},{"issue":"3","key":"ref26","article-title":"A comprehensive survey on core technologies and services for 5g security: Taxonomies, issues, and solutions","volume":"11","author":"Park","year":"2021","journal-title":"Hum.-Centric Comput. Inf. Sci"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s23218772"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900054"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/9781119723950.ch14"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2021.3049190"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/19\/3a\/8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3167256"},{"key":"ref33","article-title":"Modeling tabular data using conditional gan","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Xu","year":"2019"},{"key":"ref34","volume-title":"Decision Tree Learning","author":"Mitchell","year":"1997"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INCET49848.2020.9154050"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11749-016-0481-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3212859"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982418"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/su14148707"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2021.112015"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115895"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09896-5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychres.2021.114261"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295070"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService52369.2021.00024"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/OAJPE.2024.3439856"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MLDS.2017.6"}],"event":{"name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2026,2,3]]},"end":{"date-parts":[[2026,2,5]]}},"container-title":["2026 IEEE International Conference on Consumer Electronics (ICCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11449575\/11449585\/11449868.pdf?arnumber=11449868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T05:13:37Z","timestamp":1774674817000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11449868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,3]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icce67443.2026.11449868","relation":{},"subject":[],"published":{"date-parts":[[2026,2,3]]}}}