{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:02:08Z","timestamp":1761897728817,"version":"3.37.3"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100013403","name":"TED","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100013403","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/noms54207.2022.9789927","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:21:22Z","timestamp":1654809682000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Network-based Intrusion Detection: A One-class Classification Approach"],"prefix":"10.1109","author":[{"given":"Paulina","family":"Arregoces","sequence":"first","affiliation":[{"name":"Universidad Nacional de Colombia,Faculty of Engineering,Medell&#x00ED;n,Colombia"}]},{"given":"Jaime","family":"Vergara","sequence":"additional","affiliation":[{"name":"Universidad de Antioquia,Faculty of Engineering,Medell&#x00ED;n,Colombia"}]},{"given":"Sergio Armando","family":"Gutierrez","sequence":"additional","affiliation":[{"name":"Universidad Aut&#x00F3;noma Latinoamericana,Faculty of Engineering,Medell&#x00ED;n,Colombia"}]},{"given":"Juan Felipe","family":"Botero","sequence":"additional","affiliation":[{"name":"Universidad de Antioquia,Faculty of Engineering,Medell&#x00ED;n,Colombia"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.29"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT51146.2020.9312002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2021.13102"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2018.8586840"},{"article-title":"One-class classification for cyber intrusion detection in industrial systems","year":"2015","author":"nader","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2947676"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/wics.61"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"article-title":"Effective and efficient network anomaly detection system using machine learning algorithm","year":"2018","author":"nawir","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2315","DOI":"10.1007\/s10489-017-1085-y","article-title":"A new evolutionary neural networks based on intrusion detection systems using multiverse optimization","volume":"48","author":"benmessahel","year":"2018","journal-title":"Applied Intelligence"},{"key":"ref15","article-title":"Network based intrusion detection using the unsw-nb15 dataset","author":"s","year":"2019","journal-title":"International Journal of Computing and Digital Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-03008-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5557577"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE.2019.8859773"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.29"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-021-01893-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2015.014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.91"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87481-2_21"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT47144.2019.9001867"},{"article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","year":"0","author":"m","key":"ref5"},{"key":"ref8","first-page":"188","article-title":"A survey of recent trends in one class classification","author":"khan","year":"2009","journal-title":"Irish Conference on Artificial Intelligence and Cognitive Science"},{"article-title":"A hybrid feature selection for network intrusion detection systems: Central points","year":"2015","author":"moustafa","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.13"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2003.1260106"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: techniques, datasets and challenges","volume":"2","author":"khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref20","first-page":"711","article-title":"Deep-intrusion detection system with enhanced unsw-nb15 dataset based on deep learning techniques","volume":"16","author":"aleesa","year":"2021","journal-title":"Journal of Engineering Science and Technology"},{"article-title":"Anomaly detection system using beta mixture models and outlier detection","year":"2017","author":"moustafa","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASICON47005.2019.8983598"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v8i1.1387"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1018\/1\/012015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314439"}],"event":{"name":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2022,4,25]]},"location":"Budapest, Hungary","end":{"date-parts":[[2022,4,29]]}},"container-title":["NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9789703\/9789704\/09789927.pdf?arnumber=9789927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:10:39Z","timestamp":1656965439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/noms54207.2022.9789927","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}