{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:40:43Z","timestamp":1771958443675,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,8]]},"DOI":"10.1109\/meditcom61057.2024.10621237","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:26:00Z","timestamp":1723483560000},"page":"51-56","source":"Crossref","is-referenced-by-count":10,"title":["Advancing Cybersecurity with AI: A Multimodal Fusion Approach for Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"George","family":"Agrafiotis","sequence":"first","affiliation":[{"name":"Centre for Research and Technology Hellas \/ Information Technologies Institute,Greece"}]},{"given":"Sarantis","family":"Kalafatidis","sequence":"additional","affiliation":[{"name":"Centre for Research and Technology Hellas \/ Information Technologies Institute,Greece"}]},{"given":"Konstantinos","family":"Giapantzis","sequence":"additional","affiliation":[{"name":"Centre for Research and Technology Hellas \/ Information Technologies Institute,Greece"}]},{"given":"Antonios","family":"Lalas","sequence":"additional","affiliation":[{"name":"Centre for Research and Technology Hellas \/ Information Technologies Institute,Greece"}]},{"given":"Konstantinos","family":"Votis","sequence":"additional","affiliation":[{"name":"Centre for Research and Technology Hellas \/ Information Technologies Institute,Greece"}]}],"member":"263","reference":[{"key":"ref1","article-title":"5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network","author":"Samarakoon","year":"2022","journal-title":"arXiv:2212.01298"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3139835"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13066"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544473"},{"key":"ref7","article-title":"Floodlight SDN Controller"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN60470.2024.10494481"},{"key":"ref9","article-title":"6G-SANDBOX Malaga-UMA testbed","year":"2023"},{"key":"ref10","article-title":"linuxserver\/openssh-server"},{"key":"ref11","article-title":"dockette\/nginx"},{"key":"ref12","article-title":"CVE-2019-9512"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3276062"},{"key":"ref14","article-title":"Hydra"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNEWS.2018.8903954"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57077-4_10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1148\/ryai.2021200126"}],"event":{"name":"2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)","location":"Madrid, Spain","start":{"date-parts":[[2024,7,8]]},"end":{"date-parts":[[2024,7,11]]}},"container-title":["2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621051\/10621071\/10621237.pdf?arnumber=10621237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:42:54Z","timestamp":1723527774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/meditcom61057.2024.10621237","relation":{},"subject":[],"published":{"date-parts":[[2024,7,8]]}}}