{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:05:50Z","timestamp":1762254350759,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["18\/CRT\/6183"],"award-info":[{"award-number":["18\/CRT\/6183"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,30]]},"DOI":"10.1109\/itnac55475.2022.9998363","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T19:05:35Z","timestamp":1672945535000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks"],"prefix":"10.1109","author":[{"given":"John William","family":"O'Meara","sequence":"first","affiliation":[{"name":"School of Computer Science, University College Dublin,Dublin,Ireland"}]},{"given":"Mahmoud Said","family":"Elsayed","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin,Dublin,Ireland"}]},{"given":"Takfarinas","family":"Saber","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Galway,Galway,Ireland"}]},{"given":"Anca Delia","family":"Jurcut","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin,Dublin,Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022633"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2010.25"},{"key":"ref7","first-page":"277","article-title":"Machine-Learning Techniques for Detecting Attacks in SDN","volume-title":"7th IEEE International Conference on Computer Science and Network Technology (ICCSNT)","author":"Elsayed","year":"2019"},{"issue":"4","key":"ref8","first-page":"1","article-title":"Xgboost: extreme gradient boosting","volume":"1","author":"Chen","year":"2015","journal-title":"R package version 0.4-2"},{"key":"ref9","article-title":"CatBoost: gradient boosting with categorical features support","author":"Dorogush","year":"2018","journal-title":"arXiv preprint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2018.8586840"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/466\/1\/012003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8012568"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269042"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022862"},{"issue":"2","key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"Hossin","year":"2015","journal-title":"International journal of data mining & knowledge management process"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/a15080258"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969637"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02319-4_61"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref23","article-title":"Schapire R: Experiments with a new boosting algorithm","volume-title":"Thirteenth International Conference on ML","author":"Freund","year":"1996"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80023-1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2022.3186331"}],"event":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2022,11,30]]},"location":"Wellington, New Zealand","end":{"date-parts":[[2022,12,2]]}},"container-title":["2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9998179\/9998326\/09998363.pdf?arnumber=9998363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T04:45:29Z","timestamp":1710391529000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9998363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,30]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/itnac55475.2022.9998363","relation":{},"subject":[],"published":{"date-parts":[[2022,11,30]]}}}