{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T05:16:06Z","timestamp":1771564566229,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,14]]},"DOI":"10.1109\/icit52682.2021.9491770","type":"proceedings-article","created":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T21:29:46Z","timestamp":1627334986000},"page":"440-445","source":"Crossref","is-referenced-by-count":51,"title":["Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study"],"prefix":"10.1109","author":[{"given":"Omar","family":"Almomani","sequence":"first","affiliation":[]},{"given":"Mohammed Amin","family":"Almaiah","sequence":"additional","affiliation":[]},{"given":"Adeeb","family":"Alsaaidah","sequence":"additional","affiliation":[]},{"given":"Sami","family":"Smadi","sequence":"additional","affiliation":[]},{"given":"Adel Hamdan","family":"Mohammad","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Althunibat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"12038","DOI":"10.1088\/1757-899X\/1013\/1\/012038","article-title":"Comparative analysis of Machine Learning algorithms for Intrusion Detection","volume":"1013","author":"pai","year":"2021","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"ref32","first-page":"31","article-title":"PERFORMANCE ANALYSIS OF MACHINE LEARNING CLASSIFIERS FOR INTRUSION DETECTION USING UNSW-NB15 DATASET","author":"kocher","year":"0","journal-title":"Comput Sci Inf Technol (CS IT) CCSEA"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9343-4_16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i5.pp5445-5452"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2015.7399985"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.01.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2014.050322"},{"key":"ref12","article-title":"Dynamic redundancy forward error correction mechanism for the enhancement of internet-based video streaming","author":"al-momani","year":"2010","journal-title":"Universiti Utara Malaysia"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100824"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/sym12061046"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.016113"},{"key":"ref16","author":"berry","year":"2019","journal-title":"Supervised and Unsupervised Learning for Data Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4135\/9781412984812"},{"key":"ref18","first-page":"108","article-title":"Arabic Text Categorization Using Support vector machine, Nave Bayes and Neural Network","volume":"5","author":"mohammad","year":"2016","journal-title":"Global Science and Technology Forum Journal of Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2991\/masta-19.2019.67"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2019.8862784"},{"key":"ref4","article-title":"AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE","volume":"98","author":"almaiah","year":"2020","journal-title":"J Theor Appl Inf Technol"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIC.2018.8601203"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/215932020"},{"key":"ref6","article-title":"Improved Security Particle Swarm Optimization (PSO) Algorithm to Detect Radio Jamming Attacks in Mobile Networks","volume":"11","author":"hwaitat","year":"2020","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.133"},{"key":"ref5","article-title":"AN INVESTIGATOR DIGITAL FORENSICS FREQUENCIES PARTICLE SWARM OPTIMIZATION FOR DECTECTION AND CLASSIFICATION OF APT ATTACK IN FOG COMPUTING ENVIROMENT (IDF-FPSO)","volume":"98","author":"almaiah","year":"2020","journal-title":"J Theor Appl Inf Technol"},{"key":"ref8","article-title":"Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography","volume":"15","author":"albalas","year":"2018","journal-title":"Int Arab J Inf Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s20082311"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i6.pp6461-6471"},{"key":"ref9","article-title":"A Proposed Framework for Botnet Spam-email Filtering Using Neucube","author":"almomani","year":"2017","journal-title":"The International Arab Conference on Information Technology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3115\/1067807.1067848"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1907-84"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2016.415"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.12.005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2013.00021"}],"event":{"name":"2021 International Conference on Information Technology (ICIT)","location":"Amman, Jordan","start":{"date-parts":[[2021,7,14]]},"end":{"date-parts":[[2021,7,15]]}},"container-title":["2021 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9491111\/9491112\/09491770.pdf?arnumber=9491770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:48:19Z","timestamp":1652183299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9491770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,14]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icit52682.2021.9491770","relation":{},"subject":[],"published":{"date-parts":[[2021,7,14]]}}}