{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T21:26:24Z","timestamp":1769203584059,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/noms.2018.8406295","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T19:09:23Z","timestamp":1531163363000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Detecting malicious authentication events trustfully"],"prefix":"10.1109","author":[{"given":"Georgios","family":"Kaiafas","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Varisteas","sequence":"additional","affiliation":[]},{"given":"Sofiane","family":"Lagraa","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Cu D","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Ries","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ourdane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbs006"},{"key":"ref11","author":"more","year":"2016","journal-title":"Survey of resampling techniques for improving classification performance in unbalanced datasets"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85920-8_42"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2002909"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745472"},{"key":"ref15","first-page":"1","article-title":"Verizon. 2016 Data Breach Investigations Report","year":"2016","journal-title":"Verizon Business"},{"key":"ref16","author":"williams","year":"2017","journal-title":"The Caret Package"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2011.06.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.01.018"},{"key":"ref6","author":"kent","year":"2015","journal-title":"Multi-Source Cyber-Security Events"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745478"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.09.001"},{"key":"ref7","article-title":"Cybersecurity data sources for dynamic network research","author":"kent","year":"2015","journal-title":"Dynamic Networks in Cybersecurity"},{"key":"ref2","author":"dowle","year":"2017","journal-title":"data table extension of data frame"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093539"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264"}],"event":{"name":"NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium","location":"Taipei","start":{"date-parts":[[2018,4,23]]},"end":{"date-parts":[[2018,4,27]]}},"container-title":["NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399136\/8406102\/08406295.pdf?arnumber=8406295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T18:59:55Z","timestamp":1532372395000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/noms.2018.8406295","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}