{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:33:33Z","timestamp":1770845613687,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11343270","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"1695-1702","source":"Crossref","is-referenced-by-count":0,"title":["Combining Side-Channel Features with Deep Learning for Network Traffic Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Yu","family":"Gong","sequence":"first","affiliation":[{"name":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101"}]},{"given":"Min","family":"Li","sequence":"additional","affiliation":[{"name":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101"}]},{"given":"Keyu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101"}]},{"given":"Chen","family":"Huang","sequence":"additional","affiliation":[{"name":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101"}]},{"given":"Yuanfang","family":"Lu","sequence":"additional","affiliation":[{"name":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101"}]},{"given":"Xiuwei","family":"Zhou","sequence":"additional","affiliation":[{"name":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"A real-time intrusion detection system using decision trees","volume-title":"Proc. IEEE Work. Inform. Assur. Secur","author":"Ghosh"},{"key":"ref2","first-page":"7316","article-title":"Random forest for network intrusion detection","volume-title":"Proc. IEEE Int. Conf. Commun. Probl","author":"Zhang"},{"key":"ref3","first-page":"1","article-title":"An intrusion detection system based on support vector machine","volume-title":"Proc. Int. Conf. Comput. Commun. Eng","author":"Ayd\u0131n"},{"key":"ref4","first-page":"102109","article-title":"A survey on machine learning-based network intrusion detection systems","volume":"102","author":"Xie","year":"2021","journal-title":"Comput. Secur"},{"key":"ref5","first-page":"34","article-title":"A novel anomaly detection approach for intrusion detection system","volume":"124","author":"Zhao","year":"2019","journal-title":"J. Netw. Comput. Appl"},{"key":"ref6","first-page":"124","article-title":"A Comprehensive Review on Machine Learning Approaches for Intrusion Detection Systems","volume":"128","author":"Bhatia","year":"2022","journal-title":"Future Gener. Comput. Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref8","first-page":"84394","article-title":"An Effective Intrusion Detection System using a Hybrid Deep Learning Model","volume":"8","author":"Kim","year":"2020","journal-title":"IEEE Access"},{"issue":"1","key":"ref9","first-page":"100","article-title":"Detecting DDoS Attacks Based on Deep Learning Frameworks","volume":"16","author":"Chen","year":"2019","journal-title":"IEEE Trans. Netw. Serv. Manag"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref11","first-page":"124","article-title":"A Comprehensive Review on Machine Learning Approaches for Intrusion Detection Systems","volume":"128","author":"Bhatia","year":"2022","journal-title":"Future Gener. Comput. Syst"},{"issue":"19","key":"ref12","first-page":"9","article-title":"A Hybrid Model for Network Intrusion Detection","volume":"182","author":"Gupta","year":"2018","journal-title":"Int. J. Comput. Appl"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040524"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00712-x"},{"key":"ref15","first-page":"43","article-title":"Feature Selection in Network Intrusion Detection","volume":"135","author":"Alazab","year":"2019","journal-title":"J. Netw. Comput. Appl"},{"key":"ref16","article-title":"Network Intrusion Detection Using LSTM","volume":"1-8","author":"Abduh","year":"2020","journal-title":"J. Comput. Netw. Commun"},{"key":"ref17","first-page":"56","article-title":"An Enhanced Hybrid Model for Network Intrusion Detection Using Feature Selection and Random Forest","volume":"142","author":"Kumar","year":"2023","journal-title":"Future Gener. Comput. Syst"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"103025","DOI":"10.1016\/j.cose.2022.103025","article-title":"A Novel Dimensionality Reduction Method for Network Intrusion Detection Based on PCA and Autoen-coder","volume":"126","author":"Zhang","year":"2023","journal-title":"Comput. Secur"},{"issue":"4","key":"ref19","first-page":"218","article-title":"Utilizing Side-Channel Features for Network Anomaly Detection","volume":"8","author":"Cisco","year":"2017","journal-title":"J. Inform. Secur"},{"issue":"7","key":"ref20","first-page":"1768","article-title":"Anomaly Detection Based on Side-Channel Features in Network Communication","volume":"14","author":"He","year":"2019","journal-title":"IEEE Trans. Inform. Forens. Secur"},{"key":"ref21","first-page":"102973","article-title":"A Hybrid Model for Intrusion Detection Using Side-Channel and Traditional Traffic Features","volume":"178","author":"Smith","year":"2021","journal-title":"J. Netw. Comput. Appl"},{"key":"ref22","first-page":"102828","article-title":"Enhancing Network Intrusion Detection through Improved Side-Channel Feature Extraction Using Deep Learning","volume":"122","author":"Lee","year":"2022","journal-title":"Comput. Secur"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05532-z"},{"key":"ref24","article-title":"Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization","volume-title":"Proc. 4th Int. Conf. Inf. Syst. Secur. Priv. (ICISSP)","author":"Mohammadian"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PST62714.2024.10788064"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.01.026"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01332-y"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6591140"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/s24186035"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/info13070314"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/app14020479"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11343270.pdf?arnumber=11343270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:51:14Z","timestamp":1770843074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11343270","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}