{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T18:22:33Z","timestamp":1750530153093,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,1]]},"DOI":"10.1109\/ssci47803.2020.9308206","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T18:12:38Z","timestamp":1609870358000},"page":"1121-1130","source":"Crossref","is-referenced-by-count":8,"title":["Intrusion Detection with Interpretable Rules Generated Using the Tsetlin Machine"],"prefix":"10.1109","author":[{"given":"K. Darshana","family":"Abeyrathna","sequence":"first","affiliation":[]},{"given":"Harsha S. Gardiyawasam","family":"Pussewalage","sequence":"additional","affiliation":[]},{"given":"Sasanka N.","family":"Ranasinghe","sequence":"additional","affiliation":[]},{"given":"Vladimir A.","family":"Oleshchuk","sequence":"additional","affiliation":[]},{"given":"Ole-Christoffer","family":"Granmo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ITME.2015.29"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS-SWS.2018.8525572"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CIMCA.2016.8053265"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISACV.2018.8354024"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT.2018.8565736"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2015.7219890"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CUBE.2013.31"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275914"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/APCIP.2009.218"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2018.00108"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"journal-title":"Types of IDS","year":"2018","key":"ref12"},{"key":"ref13","article-title":"Interpretable Machine Learning","author":"molnar","year":"2019","journal-title":"Lulu Com"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbx044"},{"key":"ref15","article-title":"The Tsetlin Machine - A Game Theoretic Bandit Driven Approach to Optimal Pattern Recognition with Propositional Logic","author":"granmo","year":"2018","journal-title":"arXiv 1804 01508"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935416"},{"key":"ref17","article-title":"The Convolutional Tsetlin Machine","author":"granmo","year":"2019","journal-title":"arXiv preprint 1905 09688"},{"key":"ref18","article-title":"The Multi-Layered Tsetlin Machine","author":"granmo","year":"2020","journal-title":"preparation"},{"key":"ref19","article-title":"A Tsetlin Machine with Multigranular Clauses","volume":"11927","author":"gorji","year":"2019","journal-title":"Lecture Notes in ComputerScience Proceedings of the Thirty-ninth International Conference on Innovative Techniques and Applications of Artificial Intelligence (SGAI2019)"},{"journal-title":"Chapter 2-SVM Theory","year":"2018","key":"ref28"},{"key":"ref4","first-page":"236","article-title":"Research on Intrusion Detection Approach based on Signature Generation","author":"zhang","year":"2010","journal-title":"Proceedings of 2nd Pacific-Asia Conference on Circuits Communications and System"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2016.7561088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FADS.2017.8253208"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"journal-title":"SVM-Understanding the Math","year":"2018","key":"ref29"},{"journal-title":"What is IDS","year":"2018","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732199"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"ref1","first-page":"77","article-title":"Intrusion Detection System-Types and Prevention","volume":"4","author":"kumar","year":"2013","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30244-3_23"},{"key":"ref22","first-page":"4260","article-title":"Short Term Load Forecasting Model Using Support Vector Machine based on Artificial Neural Network","author":"niu","year":"2005","journal-title":"Proceedings of International Conference on Machine Learning and Cybernetics"},{"key":"ref21","article-title":"The Regression Tsetlin Machine - A Novel Approach to Interpretable Non-Linear Regression","volume":"378","author":"abeyrathna","year":"2019","journal-title":"Philosophical Transactions of the Royal Society A"},{"key":"ref42","article-title":"Extending the tsetlin machine with integer-weighted clauses for increased interpretability","author":"abeyrathna","year":"2020","journal-title":"arXiv preprint arXiv 2005 06138"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22999-3_49"},{"journal-title":"Using neural nets to recognize handwritten digits","year":"2018","key":"ref23"},{"key":"ref26","first-page":"1","article-title":"The Use of Artificial Neural Networks in Network Intrusion Detection: A Systematic Review","author":"\u00f6ney","year":"2018","journal-title":"Proceedings of International Conference on Artificial Intelligence and Data Processing (IDAP)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICWAPR.2007.4420755"}],"event":{"name":"2020 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2020,12,1]]},"location":"Canberra, ACT, Australia","end":{"date-parts":[[2020,12,4]]}},"container-title":["2020 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9308061\/9308107\/09308206.pdf?arnumber=9308206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T11:17:24Z","timestamp":1656587844000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9308206\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,1]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ssci47803.2020.9308206","relation":{},"subject":[],"published":{"date-parts":[[2020,12,1]]}}}