{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:47:29Z","timestamp":1771703249603,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/icis.2018.8466537","type":"proceedings-article","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T20:14:06Z","timestamp":1537560846000},"page":"34-38","source":"Crossref","is-referenced-by-count":21,"title":["Hybrid Intrusion Detection System using K-means and K-Nearest Neighbors Algorithms"],"prefix":"10.1109","author":[{"given":"Yi Yi","family":"Aung","sequence":"first","affiliation":[]},{"given":"Myat","family":"Myat Min","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Survey on Intrusion Detection Using Data Mining Methods","volume":"2","author":"parihar","year":"2016"},{"key":"ref11","author":"syarif","year":"2011","journal-title":"Application of Bagging Boosting and Stacking to Intrusion Detection"},{"key":"ref12","year":"0","journal-title":"KDD Cup&#x2019;99 Intrusion Data Sets"},{"key":"ref13","article-title":"A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems","volume":"2","author":"patel","year":"2012","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"key":"ref14","article-title":"A Study on Intrusion Detection and Protection Techniques","year":"2016","journal-title":"International Conference on Emerging Trends in Engineering & Management (ICETEM) IOSR Journal of Computer Engineering (IOSR-JCE)"},{"key":"ref15","year":"0"},{"key":"ref4","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070109"},{"key":"ref5","article-title":"A Comparative Performance Evaluation of Machine Learning-Based NIDS on Benchmark Datasets","volume":"2","author":"patil","year":"2014","journal-title":"International Journal of Research in Advent Technology"},{"key":"ref8","article-title":"An Emprrical Comparison of Classifiers to Analyze Intrudion Detection","author":"aggarwal","year":"2015","journal-title":"Fifth International Conference on Advanced Computing & Communication Technologies IEEE"},{"key":"ref7","author":"sandeep","year":"0","journal-title":"Review on Data Mining Techniques for Intrusion Detection System"},{"key":"ref2","article-title":"Intrusion Detection Using Data Mining Techniques","author":"tiwari","year":"2006","journal-title":"International Journal on Advanced Computing Techniques (IJACT)"},{"key":"ref1","first-page":"1750","article-title":"Intrusion Detection Using Data Mining Technique (Classification)","volume":"6","author":"kumari","year":"2015","journal-title":"International Journal of Computer Science and Information Technologies (IJCSIT)"},{"key":"ref9","article-title":"Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection","volume":"8","author":"albalawi","year":"2014","journal-title":"International Journal of Computer Electrical Automation Control and Information Engineering"}],"event":{"name":"2018 IEEE\/ACIS 17th International Conference on Computer and Information Science (ICIS)","location":"Singapore","start":{"date-parts":[[2018,6,6]]},"end":{"date-parts":[[2018,6,8]]}},"container-title":["2018 IEEE\/ACIS 17th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8430032\/8466376\/08466537.pdf?arnumber=8466537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T19:40:57Z","timestamp":1539027657000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8466537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icis.2018.8466537","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}