{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:23:49Z","timestamp":1751095429206,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,22]]},"DOI":"10.1109\/idaacs53288.2021.9660920","type":"proceedings-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T15:43:03Z","timestamp":1641397383000},"page":"1108-1113","source":"Crossref","is-referenced-by-count":12,"title":["Analysis of Anomaly Detection and Identification Methods in 5G Traffic"],"prefix":"10.1109","author":[{"given":"Tamara","family":"Radivilova","sequence":"first","affiliation":[]},{"given":"Lyudmyla","family":"Kirichenko","sequence":"additional","affiliation":[]},{"given":"Oleksandr","family":"Lemeshko","sequence":"additional","affiliation":[]},{"given":"Dmytro","family":"Ageyev","sequence":"additional","affiliation":[]},{"given":"Oksana","family":"Mulesa","sequence":"additional","affiliation":[]},{"given":"Andrii","family":"Ilkov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICHVEPS.2017.8225855"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65188-0"},{"key":"ref31","first-page":"1162","article-title":"Towards Generating Realistic SNMP-MIB Dataset for Network Anomaly Detection","volume":"14","author":"al-kasassbeh","year":"2016","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s41468-018-0016-2","article-title":"Algorithms and complexity for Turaev-Viro invariants","volume":"2","author":"bendich","year":"2018","journal-title":"Journal of Applied and Computational Topology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0135-7_46"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/proceedings2020054007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0475-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.03.027"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v8i1.1387"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/data4010005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2021.06.033"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26474-1_49"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761796"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ATIT50783.2020.9349259"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PICST47496.2019.9061451"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80472-5_28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54215-3_44"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5288-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC49849.2020.9238872"},{"key":"ref7","first-page":"184","article-title":"Comparative Analysis of Noisy Time Series Clustering","author":"kirichenko","year":"2019","journal-title":"2019 3rd International Conference on Computational Linguistics and Intelligent Systems (COLINS) Volume I Main Conference"},{"key":"ref2","first-page":"103","article-title":"Threat Hunting as a Method of Protection Against Cyber Threats","volume":"2833","author":"lukova-chuiko","year":"2020","journal-title":"Information Technology and Interactions 7th International Conference &#x201C;Information Technology and Interactions&#x201D; (IT&I-2020) Conference Proceedings"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/a13090222"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2018.8631901"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/proceedings2020054007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2514\/6.2020-1851"},{"journal-title":"DBSCAN - a density-based unsupervised algorithm for fraud detection","year":"0","author":"mahbubul","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/su13031522"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4961-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.19.3.1889"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ViTECoN.2019.8899721"}],"event":{"name":"2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","start":{"date-parts":[[2021,9,22]]},"location":"Cracow, Poland","end":{"date-parts":[[2021,9,25]]}},"container-title":["2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9660827\/9660386\/09660920.pdf?arnumber=9660920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:56:46Z","timestamp":1652187406000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/idaacs53288.2021.9660920","relation":{},"subject":[],"published":{"date-parts":[[2021,9,22]]}}}