{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:20:41Z","timestamp":1770463241903,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009923","name":"U.S. Military Academy","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,8]]},"DOI":"10.1109\/noms56928.2023.10154410","type":"proceedings-article","created":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T16:50:45Z","timestamp":1687539045000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Gaspard","family":"Baye","sequence":"first","affiliation":[{"name":"University of Massachusetts Dartmouth,Dartmouth,MA"}]},{"given":"Priscila","family":"Silva","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth,Dartmouth,MA"}]},{"given":"Alexandre","family":"Broggi","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth,Dartmouth,MA"}]},{"given":"Lance","family":"Fiondella","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth,Dartmouth,MA"}]},{"given":"Nathaniel D.","family":"Bastian","sequence":"additional","affiliation":[{"name":"United States Military Academy,West Point,NY"}]},{"given":"Gokhan","family":"Kul","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth,Dartmouth,MA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC52172.2021.9615638"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103334"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.07.036"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55190-2_53"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31703-4_16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019801"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.256"},{"key":"ref8","volume-title":"Open set text classification using neural networks","author":"Venkataram","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1314"},{"key":"ref10","article-title":"Enhancing the reliability of outof-distribution image detection in neural networks","author":"Liang","year":"2017","journal-title":"arXiv preprint arXiv:1706.02690"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3052613"},{"key":"ref12","author":"Lindstedt","year":"2022","journal-title":"Methods for network intrusion detection: Evaluating rulebased methods and machine learning models on the cic-ids2017 dataset"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4027900"},{"key":"ref14","article-title":"Algorithms for hyper-parameter optimization","volume-title":"Advances in neural information processing systems","volume":"24","author":"Bergstra"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.173"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.54"},{"key":"ref17","article-title":"Energy-based out-of-distribution detection","volume-title":"Advances in Neural Information Processing Systems","author":"Liu"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1511-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3177507"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-019-6413-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00382-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BDCAT56447.2022.00015"}],"event":{"name":"NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium","location":"Miami, FL, USA","start":{"date-parts":[[2023,5,8]]},"end":{"date-parts":[[2023,5,12]]}},"container-title":["NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10154252\/10154208\/10154410.pdf?arnumber=10154410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T10:45:05Z","timestamp":1709289905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10154410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/noms56928.2023.10154410","relation":{},"subject":[],"published":{"date-parts":[[2023,5,8]]}}}