{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:37:01Z","timestamp":1776443821981,"version":"3.51.2"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T00:00:00Z","timestamp":1718064000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T00:00:00Z","timestamp":1718064000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,11]]},"DOI":"10.1109\/medcomnet62012.2024.10578278","type":"proceedings-article","created":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:28:44Z","timestamp":1720114124000},"page":"1-10","source":"Crossref","is-referenced-by-count":18,"title":["Enhancing Network Anomaly Detection Using Graph Neural Networks"],"prefix":"10.1109","author":[{"given":"William","family":"Marfo","sequence":"first","affiliation":[{"name":"University of Texas at El Paso,Department of Computer Science,El Paso,USA"}]},{"given":"Deepak K.","family":"Tosh","sequence":"additional","affiliation":[{"name":"University of Texas at El Paso,Department of Computer Science,El Paso,USA"}]},{"given":"Shirley V.","family":"Moore","sequence":"additional","affiliation":[{"name":"University of Texas at El Paso,Department of Computer Science,El Paso,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017793"},{"key":"ref2","article-title":"Inductive representation learning on large graphs","volume":"30","author":"Hamilton","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE55472.2022.9812638"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SIU59756.2023.10223760"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3211306"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC57223.2023.10074111"},{"key":"ref7","volume-title":"Graph attention networks","author":"Velickovic","year":"2017"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-020-00379-6","article-title":"Performance analysis of intrusion detection systems using a feature selection method on the unsw-nbl5 dataset","volume":"7","author":"Kasongo","year":"2020","journal-title":"Journal of Big Data"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3098162"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29857-8_25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3094295"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref14","volume-title":"Open argus","author":"Argus","year":"2024"},{"issue":"10","key":"ref15","doi-asserted-by":"crossref","DOI":"10.3390\/electronics9101565","article-title":"An anomaly mitigation framework for iot using fog computing","volume":"9","author":"Lawal","year":"2020","journal-title":"Electronics"},{"key":"ref16","volume-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"Abadi","year":"2015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/mci.2020.3039072"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/978-3-030-50423-6_12","article-title":"Towards network anomaly detection using graph embedding","volume-title":"Computational Science- ICCS 2020: 20th International Conference","volume":"12140","author":"Xiao","year":"2020"},{"key":"ref19","volume-title":"Automating botnet detection with graph neural networks","author":"Zhou","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00943"},{"key":"ref21","first-page":"1263","article-title":"Neural message passing for quantum chemistry","volume-title":"Proceedings of the 34th International Conference on Machine Learning, ser. Proceedings of Machine Learning Research","volume":"70","author":"Gilmer","year":"2017"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"183207","DOI":"10.1109\/ACCESS.2019.2959131","article-title":"A novel multimodal-sequential approach based on multi-view features for network intrusion detection","volume":"7","author":"He","year":"2019","journal-title":"IEEE Access"},{"key":"ref23","article-title":"Netflow datasets for machine learning-based network intrusion detection systems","volume":"abs\/2011.09144","author":"Sarhan","year":"2020","journal-title":"CoRR"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.comcom.2020.12.003","article-title":"An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for iomt networks","volume":"166","author":"Kumar","year":"2021","journal-title":"Comput. Commun."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s21020446"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789878"}],"event":{"name":"2024 22nd Mediterranean Communication and Computer Networking Conference (MedComNet)","location":"Nice, France","start":{"date-parts":[[2024,6,11]]},"end":{"date-parts":[[2024,6,13]]}},"container-title":["2024 22nd Mediterranean Communication and Computer Networking Conference (MedComNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10577997\/10578125\/10578278.pdf?arnumber=10578278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T05:36:36Z","timestamp":1720330596000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10578278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/medcomnet62012.2024.10578278","relation":{},"subject":[],"published":{"date-parts":[[2024,6,11]]}}}