{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:20:18Z","timestamp":1766269218242,"version":"3.37.3"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100011688","name":"ECSEL Joint Undertaking (JU)","doi-asserted-by":"publisher","award":["876038"],"award-info":[{"award-number":["876038"]}],"id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892293","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"01-08","source":"Crossref","is-referenced-by-count":15,"title":["Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection and Attack Classification"],"prefix":"10.1109","author":[{"given":"Miguel","family":"Leon","sequence":"first","affiliation":[{"name":"School of Innovation, Design and Engineering Malardalen University,V&#x00E4;ster&#x00E5;s,Sweden"}]},{"given":"Tijana","family":"Markovic","sequence":"additional","affiliation":[{"name":"School of Innovation, Design and Engineering Malardalen University,V&#x00E4;ster&#x00E5;s,Sweden"}]},{"given":"Sasikumar","family":"Punnekkat","sequence":"additional","affiliation":[{"name":"School of Innovation, Design and Engineering Malardalen University,V&#x00E4;ster&#x00E5;s,Sweden"}]}],"member":"263","reference":[{"key":"ref33","first-page":"232","article-title":"DBSCAN: Past, Present and Future","author":"khan","year":"0","journal-title":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/34.400568"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3178582"},{"journal-title":"Using Supervised Learning and Data Fusion to Detect Network Attacks","year":"2021","author":"hautsalo","key":"ref36"},{"journal-title":"Anomaly detection in Network data with unsupervised learning methods","year":"2021","author":"sarossy","key":"ref35"},{"key":"ref34","first-page":"541","article-title":"PCA+HMM+SVM for EEG Pattern Classification","author":"lee","year":"0","journal-title":"Seventh International Symposium on Signal Processing and its Applications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref11","first-page":"1848","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection","volume":"2","author":"revathi","year":"2013","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2018.8628599"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00310-w"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060916"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615294"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2014.7083539"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/2.485891"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1615-5"},{"key":"ref27","article-title":"Artificial Intelligence: A Modern Approach","author":"russell","year":"2016","journal-title":"Malaysia Pearson Education Limited"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-94"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5120\/17447-5392"},{"key":"ref29","first-page":"1","article-title":"Linear Discriminant Analisys - a brief tutorial","volume":"18","author":"balakrishnama","year":"1998","journal-title":"Institute for signal and information processing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00078"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126834"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2018.8474162"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-31"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v7i430185"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref20","first-page":"2231","article-title":"K-means clustering approach to analyze NSL-KDD intrusion detection dataset","author":"kumar","year":"2013","journal-title":"International Journal of Soft Computing and Engineering (IJSCE) ISSN"},{"journal-title":"NSL-KDD","year":"2009","key":"ref22"},{"journal-title":"The UCI KDD Archive","year":"1999","author":"hettich","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892293.pdf?arnumber=9892293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T20:52:40Z","timestamp":1665780760000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892293\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892293","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}