{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:11:35Z","timestamp":1755216695316,"version":"3.43.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/sds.2018.8370423","type":"proceedings-article","created":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T19:25:33Z","timestamp":1528140333000},"page":"59-66","source":"Crossref","is-referenced-by-count":9,"title":["Machine learning for network resilience: The start of a journey"],"prefix":"10.1109","author":[{"given":"Ali","family":"Hussein","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Department, American University of Beirut, Beirut 1107 2020, Lebanon"}]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, American University of Beirut, Beirut 1107 2020, Lebanon"}]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, American University of Beirut, Beirut 1107 2020, Lebanon"}]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, American University of Beirut, Beirut 1107 2020, Lebanon"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2015.12"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/QiR.2015.7374895"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2015.7219890"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2013.6496342"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","article-title":"A novel SVM-kNN-PSO ensemble method for intrusion detection system","volume":"38","author":"aburomman","year":"2016","journal-title":"Applied Soft Computing"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2013.6920485"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2012.6510197"},{"key":"ref10","first-page":"16","article-title":"Multiple self-organizing maps for intrusion detection","author":"rhodes","year":"2000","journal-title":"Proceedings of the 23rd National Information Systems Security Conference"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref11","first-page":"12","article-title":"A study in using neural networks for anomaly and misuse detection","author":"ghosh","year":"1999","journal-title":"USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00140-7"},{"key":"ref13","first-page":"1","article-title":"Using genetic algorithm for network intrusion detection","volume":"1","author":"li","year":"2004","journal-title":"Proceedings of the United States Department of Energy Cyber Security Group"},{"key":"ref14","first-page":"633","article-title":"Modeling intrusion detection systems using linear genetic programming approach","author":"mukkamala","year":"2004","journal-title":"International Conference on Industrial Engineering and Other Annlications of Annlied Intelligent Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2006.253508"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/UKCI.2013.6651315"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"ref19","first-page":"258","article-title":"Network intrusion detection using naive bayes","volume":"7","author":"panda","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"journal-title":"A deep learning based ddos detection system in software-defined networking (sdn)","year":"0","author":"niyaz","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583682"},{"journal-title":"Deep Learning in Intrusion Detection System An Overview","year":"0","author":"aminantoa","key":"ref27"},{"journal-title":"A survey on artificial intelligence for network routing problems","year":"2007","author":"bai","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778942"},{"key":"ref29","first-page":"190","article-title":"An effective model for anomaly IDS to improve the efficiency","author":"gupta","year":"2015","journal-title":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT) ICGCIoT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5120\/319-487"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"journal-title":"Shallow and deep networks intrusion detection system A taxonomy and survey","year":"2017","author":"hodo","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081073"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732445"},{"key":"ref20","first-page":"11","article-title":"Naive bayesian networks in intrusion detection systems","author":"amor","year":"2003","journal-title":"Proc Workshop on Probabilistic Graphical Models for Classification 14th European Conference on Machine Learning (ECML) and the 7th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD) 23rd September"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACIIDS.2009.59"},{"key":"ref21","first-page":"381","article-title":"Efficient intrusion detection using principal component analysis","author":"bouzida","year":"2004","journal-title":"3&#x00E9;me Conf&#x00E9;rence sur la S&#x00E9;curit&#x00E9; et Architectures R&#x00E9;seaux (SAR)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72395-0_16"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11760191_33"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/ICNN.1993.298623","article-title":"A direct adaptive method for faster backpropagation learning: The RPROP algorithm","author":"riedmiller","year":"1993","journal-title":"Neural Networks 1993 IEEE International Conference on"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"40","DOI":"10.5120\/758-993","article-title":"Intrusion detection system using support vector machine and decision tree","volume":"3","author":"mulay","year":"2010","journal-title":"International Journal ot Comouter Apolications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref25","article-title":"Network intrusion detection using random forests","author":"zhang","year":"2005","journal-title":"PST"}],"event":{"name":"2018 Fifth International Conference on Software Defined Systems (SDS)","start":{"date-parts":[[2018,4,23]]},"location":"Barcelona, Spain","end":{"date-parts":[[2018,4,26]]}},"container-title":["2018 Fifth International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8362835\/8370402\/08370423.pdf?arnumber=8370423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:35:50Z","timestamp":1754332550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8370423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/sds.2018.8370423","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}