{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T22:35:22Z","timestamp":1776724522295,"version":"3.51.2"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ministry of Science Information and Communications Technology","award":["IITP-2018-2016- 0-00465"],"award-info":[{"award-number":["IITP-2018-2016- 0-00465"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/mc.2018.2888764","type":"journal-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T19:37:33Z","timestamp":1553197053000},"page":"41-51","source":"Crossref","is-referenced-by-count":121,"title":["KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2286-1728","authenticated-orcid":false,"given":"Kamran","family":"Siddique","sequence":"first","affiliation":[{"name":"Xiamen University Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5026-5416","authenticated-orcid":false,"given":"Zahid","family":"Akhtar","sequence":"additional","affiliation":[{"name":"University of Memphis"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7023-7172","authenticated-orcid":false,"given":"Farrukh","family":"Aslam Khan","sequence":"additional","affiliation":[{"name":"Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4038-3267","authenticated-orcid":false,"given":"Yangwoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Dongguk University, South Korea"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AHICI.2011.6113948"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"ref13","article-title":"&#x2018;Flow size difference&#x2019; can make a difference: Detecting malicious TCP network flows based on Benford&#x2019;s law","author":"iorliam","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.03.018"},{"key":"ref16","first-page":"683","article-title":"Towards generating real-life datasets for network intrusion detection","volume":"17","author":"bhuyan","year":"2015","journal-title":"Int J Network Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1615-5"},{"key":"ref19","author":"brugger","year":"2005","journal-title":"An Assessment of the DARPA IDS Evaluation Dataset Using Snort"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref3","first-page":"e1954v1","article-title":"A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015","volume":"4","author":"\u00f6zg\u00fcr","year":"2016","journal-title":"PeerJ PrePrints"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref2","article-title":"KDD cup&#x2019;99 dataset (network intrusion) considered harmful","author":"brugger","year":"2007","journal-title":"KDnuggets"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6216078"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1117\/12.777341"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/8672400\/08672520.pdf?arnumber=8672520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:51:10Z","timestamp":1657745470000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8672520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":20,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mc.2018.2888764","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2]]}}}