{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:54:27Z","timestamp":1776977667990,"version":"3.51.4"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472453","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection on Code Vulnerabilities"],"prefix":"10.1109","author":[{"given":"Nazgul","family":"Seralina","sequence":"first","affiliation":[{"name":"Kazakh-British Technical University,School of Information Technologies and Engineering,Almaty,Kazakhstan"}]},{"given":"Assel","family":"Akzhalova","sequence":"additional","affiliation":[{"name":"Kazakh-British Technical University,School of Information Technologies and Engineering,Almaty,Kazakhstan"}]},{"given":"Aiman","family":"Moldagulova","sequence":"additional","affiliation":[{"name":"Satbayev University,Institute of Automation and Information Technilogy,Almaty,Kazakhstan"}]},{"given":"Irina","family":"Ualiyeva","sequence":"additional","affiliation":[{"name":"Kazakh-British Technical University,School of Information Technologies and Engineering,Almaty,Kazakhstan"}]},{"given":"Ryskhan","family":"Satybaldiyeva","sequence":"additional","affiliation":[{"name":"Al-Farabi Kazakh National University,Institure Information and Computational Technologies,Almaty,Kazakhstan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3359999.3360496"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/latincom50620.2020.9282320"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/elmar55880.2022.9899790"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100148"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3368926.3369715"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ic2e.2019.00026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icde48307.2020.00030"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/00295639.2021.1997041"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s23218908"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/latincom50620.2020.9282320"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/wf-iot.2019.8767194"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s40313-021-00747-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2023.3278311"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010119"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icics63486.2024.10638289"},{"issue":"08","key":"ref16","article-title":"Enhancing Cyber Security Through Machine Learning-Based Anomaly Detection","volume-title":"International Journal of Engineering Research and Technology (IJERT)","volume":"13","author":"Narendrasinha"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3041181"},{"key":"ref18","volume-title":"david-cortes\/outliertree-GitHub"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icpr.2008.4761796"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icmla.2018.00120"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-56871-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2988557"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12066"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/sym13050866"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/srds60354.2023.00032"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/sym14061178"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/icct.2017.8359854"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/AINIT61980.2024.10581582"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/icrcv55858.2022.9953210"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icetci55101.2022.9832392"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/icdis55630.2022.00015"},{"key":"ref33","article-title":"ANVIL: Anomaly-based Vulnerability Identification without Labelled Training Data","author":"Wang","year":"2024"},{"key":"ref34","first-page":"413","article-title":"Jump-Starting multivariate time series anomaly detection for online service systems","volume-title":"2021 USENIX Annual Technical Conference (USENIX ATC 21)","author":"Zhang"},{"key":"ref35","first-page":"4247","article-title":"Uncovering the limits of machine learning for automatic vulnerability detection","volume-title":"Proceedings of the 33rd USENIX Conference on Security Symposium (SEC \u201924)","author":"Risse"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tro.2023.3332224"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/aiccsa50499.2020.9316513"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472453.pdf?arnumber=11472453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:57:32Z","timestamp":1776974252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472453","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}