{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:22:23Z","timestamp":1725747743550},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/nca57778.2022.10013643","type":"proceedings-article","created":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:28:06Z","timestamp":1673897286000},"page":"235-242","source":"Crossref","is-referenced-by-count":1,"title":["Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Venturi","sequence":"first","affiliation":[{"name":"University of Modena,\"Enzo Ferrari\",Department of Engineering,Italy"}]},{"given":"Claudio","family":"Zanasi","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Informatics, Science and Engineering,Italy"}]},{"given":"Mirco","family":"Marchetti","sequence":"additional","affiliation":[{"name":"University of Modena,\"Enzo Ferrari\",Department of Engineering,Italy"}]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Informatics, Science and Engineering,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3031843"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548327"},{"article-title":"Dos and don\u2019ts of machine learning in computer security","volume-title":"Proc. of the USENIX Security Symposium","author":"Arp","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"article-title":"Ios netflow","volume-title":"Tech. Rep","year":"2021","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470065"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00854-y"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5626\/jok.2021.48.4.418"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00058"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService49289.2020.00030"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI50040.2020.00110"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348169"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411621080174"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"Madry","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3595-x"},{"article-title":"Network traffic anomaly detection using recurrent neural networks","year":"2018","author":"Radford","key":"ref21"},{"article-title":"Sequence aggregation rules for anomaly detection in computer network traffic","year":"2018","author":"Radford","key":"ref22"},{"article-title":"Tracking temporal evolution of network activity for botnet detection","year":"2019","author":"Sinha","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ARGENCON.2016.7585247"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NCA53618.2021.9685709"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905041"}],"event":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2022,12,14]]},"location":"Boston, MA, USA","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10013484\/10013503\/10013643.pdf?arnumber=10013643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T05:33:36Z","timestamp":1712900016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10013643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/nca57778.2022.10013643","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}