{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:07:37Z","timestamp":1772122057122,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/snpd.2014.6888681","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:39:23Z","timestamp":1409755163000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Converting PCAPs into Weka mineable data"],"prefix":"10.1109","author":[{"given":"Charles A.","family":"Fowler","sequence":"first","affiliation":[]},{"given":"Robert J.","family":"Hammel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Using decision tree analysis for intrusion detection: A how-to guide","author":"markey","year":"2011","journal-title":"Global Information Assurance Certification Paper"},{"key":"17","year":"2014","journal-title":"PCAPSploits"},{"key":"18","article-title":"Network intrusion detection system using reduced dimensionality","volume":"2","author":"revathi","year":"2011","journal-title":"Indian Journal of Computer Science and Engineering"},{"key":"15","year":"0","journal-title":"Weka 3-Data Mining with Open Source Machine Learning Software in Java"},{"key":"16","article-title":"2013 cost of data breach study: Global analysis","year":"2013","journal-title":"Ponemon Institute-Symantec Corporation"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2011.23"},{"key":"14","article-title":"Building baseline preprocessed common data sets for multiple follow-on data mining algorithms","author":"fowler","year":"2012","journal-title":"Proceedings of the Conference on Information Systems Applied Research"},{"key":"11","year":"2013","journal-title":"Wireshark ? Display Filter Reference Index"},{"key":"12","author":"witten","year":"2011","journal-title":"Data Mining-Practical Machine Learning Tools Andn Techniques"},{"key":"3","year":"2007","journal-title":"IDS IPS Buyer's Guide-IT Security"},{"key":"20","first-page":"208","author":"ramirez","year":"2005","journal-title":"Nessus Snort &Ethereal Power Tools"},{"key":"2","first-page":"468","article-title":"Anomalybased network intrusion detection methods","author":"nevlud","year":"2013","journal-title":"Advances in Electrical and Electronic Engineering"},{"key":"1","article-title":"Cutting the clutter: Tackling information overload at the source","author":"gantz","year":"2009","journal-title":"Xerox"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"7","author":"holland","year":"2004","journal-title":"Understanding IPS and IDS Using IPS and IDS Together for Defense in Depth"},{"key":"6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-34956-3_1","article-title":"Swarm intelligence in data minin","author":"grosan","year":"2006","journal-title":"Studies in Computational Intelligence"},{"key":"5","author":"mccanne","year":"2011","journal-title":"Libpcap An Architecture and Optimization Methodology for Packet Capture"},{"key":"4","year":"0"},{"key":"9","author":"phillips","year":"2013","journal-title":"Tcp2d"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1186\/2194-0827-1-2"}],"event":{"name":"2014 15th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2014,6,30]]},"end":{"date-parts":[[2014,7,2]]}},"container-title":["15th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6877792\/6888665\/06888681.pdf?arnumber=6888681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T15:51:16Z","timestamp":1498146676000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6888681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/snpd.2014.6888681","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}