{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:35:10Z","timestamp":1758807310212},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/icspcs53099.2021.9660294","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:50Z","timestamp":1640898410000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["A Machine Learning Approach to network Security Classification utilizing NetFlow Data"],"prefix":"10.1109","author":[{"given":"John","family":"Watkins","sequence":"first","affiliation":[{"name":"Naval Postgraduate School,Department of Electrical and Computer Engineering,Monterey,California,USA"}]},{"given":"Murali","family":"Tummala","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School,Department of Electrical and Computer Engineering,Monterey,California,USA"}]},{"given":"John","family":"McEachen","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School,Department of Electrical and Computer Engineering,Monterey,California,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icacccn51052.2020.9362804"},{"key":"ref2","first-page":"50","article-title":"A convolutional neural network for network intrusion detection system","volume-title":"Proceedings of the Asia-Pacific Advanced Network","author":"Mohammadpour"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060916"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v20.i3.pp1413-1418"},{"volume-title":"Netflow - What is it, a Definition & How to Collect & Analyze Flow Data (sFlow, Ipfix, jFlow, etc), Software Portal","year":"2019","key":"ref5"},{"volume-title":"Internet Assigned Numbers Authority","key":"ref6"},{"volume-title":"Registered Port - an overview | ScienceDirect Topics","key":"ref7"},{"volume-title":"Supervised vs. Unsupervised Learning","year":"2020","author":"Soni","key":"ref8"},{"volume-title":"Step by Step KMeans Explained in Detail","key":"ref9"},{"volume-title":"Gaussian Mixture Models Explained","year":"2020","author":"Carrasco","key":"ref10"},{"volume-title":"Machine Learning Basics with the K-Nearest Neighbors Algorithm","year":"2019","author":"Harrison","key":"ref11"},{"volume-title":"An Introduction To Mathematics Behind Neural Networks","year":"2020","author":"S","key":"ref12"}],"event":{"name":"2021 15th International Conference on Signal Processing and Communication Systems (ICSPCS)","start":{"date-parts":[[2021,12,13]]},"location":"Sydney, Australia","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 15th International Conference on Signal Processing and Communication Systems (ICSPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9660209\/9660213\/09660294.pdf?arnumber=9660294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:22:32Z","timestamp":1727500952000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icspcs53099.2021.9660294","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}