{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:58:22Z","timestamp":1725685102107},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/kse.2019.8919494","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T10:26:17Z","timestamp":1575627977000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Approach for Data Collection and Network Attack Warning"],"prefix":"10.1109","author":[{"given":"Van Kha","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Minh","family":"Nhat Quang Truong","sequence":"additional","affiliation":[]},{"given":"Van Lam","family":"Le","sequence":"additional","affiliation":[]},{"given":"Quyet","family":"Thang Le","sequence":"additional","affiliation":[]},{"given":"Thanh Hai","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISAC.2010.5670479"},{"article-title":"Artificial Neural Networks Architecture For Intrusion Detection Systems and Classification of Attacks","year":"2007","author":"sammany","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2016.7561088"},{"article-title":"Adversarial Examples: Attacks and Defenses for Deep Learning","year":"2017","author":"yuan","key":"ref13"},{"year":"2014","key":"ref14","article-title":"bWAPP"},{"article-title":"Bodgeit","year":"2011","author":"bennetts","key":"ref15"},{"year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v52i0.200"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF.2019.8713670"},{"key":"ref19","article-title":"Scikit-learn: Machine Learning in Python","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"journal-title":"KDDCup 1999 Data","year":"2019","key":"ref4"},{"article-title":"Data Collection and Data Analysis in Honeypots and Honeynets","year":"2015","author":"sokol","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"journal-title":"1999 DARPA Intrusion Detection Evaluation","year":"2017","key":"ref5"},{"key":"ref8","article-title":"A survey of deep learning-based network anomaly detection","author":"kwon","year":"2017","journal-title":"Cluster Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443696"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30933-0_56"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SCOPES.2016.7955826"},{"journal-title":"TensorFlow&#x2122;","year":"2019","key":"ref20"},{"journal-title":"BioData Mining","article-title":"Ten quick tips for machine learning in computational biology","year":"2017","key":"ref22"},{"journal-title":"Keras The Python deep learning library","year":"2019","key":"ref21"}],"event":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2019,10,24]]},"location":"Da Nang, Vietnam","end":{"date-parts":[[2019,10,26]]}},"container-title":["2019 11th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8909968\/8919259\/08919494.pdf?arnumber=8919494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:09:35Z","timestamp":1657854575000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8919494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/kse.2019.8919494","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}