{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T18:25:39Z","timestamp":1745432739771,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/ictas53252.2022.9744643","type":"proceedings-article","created":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T20:59:55Z","timestamp":1649105995000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Autonomous Threat Detection and Response for Self-Protected Networks"],"prefix":"10.1109","author":[{"given":"Wessel","family":"Havenga","sequence":"first","affiliation":[{"name":"University of the Western Cape,Computer Science Department,Cape Town,South Africa"}]},{"given":"Antoine","family":"Bagula","sequence":"additional","affiliation":[{"name":"University of the Western Cape,Computer Science Department,Cape Town,South Africa"}]},{"given":"Olasupo","family":"Ajayi","sequence":"additional","affiliation":[{"name":"University of the Western Cape,Computer Science Department,Cape Town,South Africa"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727476"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1153-7_200360"},{"key":"ref12","first-page":"84","article-title":"Effective Management of Delays at Road Intersections Using Smart Traffic Light System","author":"ajayi","year":"2019","journal-title":"e-Infrastructure and e-Services for Developing Countries"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219628"},{"year":"2019","author":"siwek","key":"ref14"},{"key":"ref15","first-page":"154","article-title":"An optimization model-based decision support system for staff scheduling analysis in healthcare facilities","author":"isken","year":"2000","journal-title":"AMCIS 2000 Proc"},{"key":"ref16","first-page":"15","article-title":"On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things","author":"bagula","year":"2019","journal-title":"e-Infrastructure and e-Services for Developing Countries"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"ref3","article-title":"Combining Host-based and network-based intrusion detection system: A cost effective tool for managing intrusion detection","volume":"13","author":"kalu","year":"2014","journal-title":"Scientia Africana"},{"key":"ref6","article-title":"Network intrusion detection system using genetic algorithm and fuzzy logic","volume":"1","author":"hassan","year":"2013","journal-title":"Inti J of Innov Res in Comp and Comm Eng"},{"key":"ref5","first-page":"23","article-title":"Traffic classification on the fly. ACM SIGCOMM Comp","volume":"36","author":"bernaille","year":"2006","journal-title":"Review of Communication"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2348-5_15"},{"key":"ref7","first-page":"129","article-title":"AANtID: an alternative approach to network intrusion detection","volume":"23","author":"azeez","year":"2016","journal-title":"Computational Science and its Application"},{"key":"ref2","first-page":"1","article-title":"Network Based Intrusion Detection and Prevention Systems: Attack Classification, Methodologies and Tools","volume":"6","author":"harale","year":"2016","journal-title":"International Journal of Engineering Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref9","first-page":"1","article-title":"The applications of deep learning on traffic identification","volume":"24","author":"wang","year":"2015","journal-title":"BlackHat USA"}],"event":{"name":"2022 Conference on Information Communications Technology and Society (ICTAS)","start":{"date-parts":[[2022,3,9]]},"location":"Durban, South Africa","end":{"date-parts":[[2022,3,10]]}},"container-title":["2022 Conference on Information Communications Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9744636\/9744642\/09744643.pdf?arnumber=9744643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T20:34:54Z","timestamp":1655238894000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9744643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ictas53252.2022.9744643","relation":{},"subject":[],"published":{"date-parts":[[2022,3]]}}}