{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:36:46Z","timestamp":1762522606606,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10,30]]},"DOI":"10.1109\/iccta45985.2018.9499140","type":"proceedings-article","created":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T16:51:57Z","timestamp":1628095917000},"page":"19-23","source":"Crossref","is-referenced-by-count":11,"title":["Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets"],"prefix":"10.1109","author":[{"given":"Mohammed F.","family":"Suleiman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Biju","family":"Issac","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"446","article-title":"A study on nsl-kdd dataset for intrusion detection system based on classification algorithms","volume":"4","author":"dhanabal","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref11","first-page":"1","article-title":"UNSW-NB 15: A comprehensive data set for network intrusion detection systems (UNSW-NB 15 network data set)","author":"moustafa","year":"2015","journal-title":"Military Communications and Information Systems Conference (MilCIS)"},{"journal-title":"Phishing Websites Data Set","year":"2014","author":"abdelhamid","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.198"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.59"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2014.6821663"},{"key":"ref8","first-page":"1011","article-title":"Performance evaluation of classification techniques for intrusion detection in noisy datasets","volume":"5","author":"vijay","year":"2017","journal-title":"International Journal on Recent and Innovation Trends in Computing and Communication"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V47P247"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.6169141"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE.2014.6909184"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.145"}],"event":{"name":"2018 28th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2018,10,30]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2018,11,1]]}},"container-title":["2018 28th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9499109\/9499103\/09499140.pdf?arnumber=9499140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T17:09:13Z","timestamp":1635268153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9499140\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,30]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iccta45985.2018.9499140","relation":{},"subject":[],"published":{"date-parts":[[2018,10,30]]}}}