{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:43:15Z","timestamp":1730277795107,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T00:00:00Z","timestamp":1701216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T00:00:00Z","timestamp":1701216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,29]]},"DOI":"10.1109\/itnac59571.2023.10368510","type":"proceedings-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T19:30:40Z","timestamp":1703878240000},"page":"267-270","source":"Crossref","is-referenced-by-count":0,"title":["Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection"],"prefix":"10.1109","author":[{"given":"Sarah","family":"Alharbi","sequence":"first","affiliation":[{"name":"University of Delaware,Department of Electrical and Computer Engineering,Newark,DE"}]},{"given":"Arshiya","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Delaware,Department of Electrical and Computer Engineering,Newark,DE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN52240.2021.9522215"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-1999-7103"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129336"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09589-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"issue":"4","key":"ref6","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"Depren","year":"2005","journal-title":"Expert Systems with Applications"},{"journal-title":"A hybrid intrusion detection system of cluster-based wireless sensor networks","year":"2009","author":"Yan","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIE.2010.5559708"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52243-8_19"},{"volume-title":"Snort","key":"ref10"},{"volume-title":"What is elastic search machine learning?","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IC2SE52832.2021.9791983"},{"volume-title":"WireGuard","key":"ref13"},{"volume-title":"Suricata","key":"ref14"},{"volume-title":"elk","key":"ref15"},{"volume-title":"Logstash","year":"2021","key":"ref16"},{"volume-title":"Kibana","year":"2021","key":"ref17"},{"volume-title":"Nmap - the Network Mapper","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2022.2058836"},{"volume-title":"Zeek network security monitor","year":"2021","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.339"},{"volume-title":"Stratospherelinuxips - intrusion detection and prevention system","key":"ref22"},{"volume-title":"Docker documentation","key":"ref23"},{"volume-title":"filebeat","key":"ref24"},{"volume-title":"Suricata: Open source next generation intrusion detection and prevention engine","key":"ref25"},{"volume-title":"EDS","author":"Alh","key":"ref26"},{"volume-title":"nikto","key":"ref27"},{"volume-title":"Ping","key":"ref28"},{"volume-title":"hping","key":"ref29"},{"volume-title":"sqlmap","key":"ref30"}],"event":{"name":"2023 33rd International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2023,11,29]]},"location":"Melbourne, Australia","end":{"date-parts":[[2023,12,1]]}},"container-title":["2023 33rd International Telecommunication Networks and Applications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10368315\/10368472\/10368510.pdf?arnumber=10368510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:18:28Z","timestamp":1705105108000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10368510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,29]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/itnac59571.2023.10368510","relation":{},"subject":[],"published":{"date-parts":[[2023,11,29]]}}}