{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:07:39Z","timestamp":1764400059005,"version":"3.46.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1109\/snpd65828.2025.11253024","type":"proceedings-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:40:29Z","timestamp":1764355229000},"page":"111-116","source":"Crossref","is-referenced-by-count":0,"title":["Improving the efficiency of attack detection in cellular networks through the combination of statistical feature selection methods and machine learning algorithms"],"prefix":"10.1109","author":[{"given":"Dina","family":"Satybaldin","sequence":"first","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Information Security and Cryptology Research Institute,Astana,Kazakhstan"}]},{"given":"Nazerke","family":"Bisenbaeva","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Computer Engineering and Software Department,Astana,Kazakhstan"}]},{"given":"Aliya","family":"Issainova","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"}]},{"given":"Yerzhan","family":"Seitkulov","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"}]},{"given":"Tolegen","family":"Aidynov","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"}]},{"given":"Mamyr","family":"Altaibek","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"}]}],"member":"263","reference":[{"key":"ref1","first-page":"2320","article-title":"On certain integrals of Lipschitz-S. Villamil, C. Hern\u00e1ndez, and G. Tarazona,\u201dAn overview of internet of things","volume":"18","author":"Eason","year":"2020","journal-title":"Telkomnika. Telecommunication Computing Electronics and Control."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v27.i1.pp246-261"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/asi5030056"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.282"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s22155738"},{"key":"ref6","article-title":"Key Performance Indicators (KPI) of new communication networks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109515"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.22667\/JISIS.2020.05.31.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1874\/1\/012042"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041951"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s22249957"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC58608.2023.10176740"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12153300"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"year":"2009","key":"ref16","article-title":"NSL-KDD99 Dataset"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.enfie.2019.07.001"},{"volume-title":"Manual for VOS Viewer Version 1.6.10","year":"2019","author":"Van Eck","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/app12199572"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v10.i1.pp110-120"},{"article-title":"TON-IoT Dataset","year":"2020","author":"Moustafa","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i3.pp2701-2709"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.36724\/2072-8735-2020-14-10-53-60"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3207-1_4"}],"event":{"name":"2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2025,6,25]]},"location":"Busan, Korea, Republic of","end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11251382\/11252538\/11253024.pdf?arnumber=11253024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:04:55Z","timestamp":1764399895000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11253024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/snpd65828.2025.11253024","relation":{},"subject":[],"published":{"date-parts":[[2025,6,25]]}}}