{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T19:24:23Z","timestamp":1764617063539,"version":"3.46.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1109\/snpd65828.2025.11253742","type":"proceedings-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:40:29Z","timestamp":1764355229000},"page":"907-912","source":"Crossref","is-referenced-by-count":0,"title":["Multivariate Bounded Support Kotz Mixture Model: Addressing Financial Fraud and Network Security Challenges"],"prefix":"10.1109","author":[{"given":"Tsega Weldu","family":"Araya","sequence":"first","affiliation":[{"name":"Concordia University,Concordia Institute for Information Systems Engineering,Montreal,Canada"}]},{"given":"Muhammad","family":"Azam","sequence":"additional","affiliation":[{"name":"Algoma University,School of Computer Science and Technology,Canada"}]},{"given":"Nizar","family":"Bouguila","sequence":"additional","affiliation":[{"name":"Concordia University,Concordia Institute for Information Systems Engineering,Montreal,Canada"}]},{"given":"Jamal","family":"Bentahar","sequence":"additional","affiliation":[{"name":"Khalifa University,6G Research Center,Department of Computer Science,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.139"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5351\/KJAS.2011.24.2.315"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014062"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294361"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-1842-5_20"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1095"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-019-09664-w"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-013-0323-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.133"},{"key":"ref10","article-title":"Mixtures of Power Exponential Distributions and Topics in Regression-based Mixture Models","volume-title":"Doctoral dissertation, University of Guelph","author":"Dang","year":"2014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-023-01148-w"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1114.003.0016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.71"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014062"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/34.990138"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/9781351077040"},{"key":"ref17","first-page":"13","article-title":"Convexity properties of elliptically contoured distributions with applications","author":"Iyengar","year":"1989","journal-title":"Sankhya: The Indian Journal of Statistics,\u00af Series A"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/0233188031000078060"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/73.2.528"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1142\/9789812567765_0010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176344136"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1974.1100705"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2005.05.009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s23198296"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12688"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC62547.2024.10759059"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/math7121215"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3982\/ecta8968"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9892.2011.00759.x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2987320"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23876-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.03.021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2002.805639"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/89.848220"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.863949"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001406004624"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2018.8361343"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.152"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/math9212683"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2856910"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08422-0_24"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1998.10474110"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24581-0_40"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5493-0"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1117\/1.2898125"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-013-0568-z"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852415"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103330"}],"event":{"name":"2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2025,6,25]]},"location":"Busan, Korea, Republic of","end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11251382\/11252538\/11253742.pdf?arnumber=11253742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T18:23:14Z","timestamp":1764613394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11253742\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/snpd65828.2025.11253742","relation":{},"subject":[],"published":{"date-parts":[[2025,6,25]]}}}