{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:53:24Z","timestamp":1764251604648,"version":"3.37.3"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior, Brazil","doi-asserted-by":"publisher","award":["001"],"award-info":[{"award-number":["001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004901","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de Minas Gerais","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004901","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. II"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/tcsii.2019.2939826","type":"journal-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T19:52:32Z","timestamp":1567799552000},"page":"1459-1463","source":"Crossref","is-referenced-by-count":18,"title":["Reconfigurable FPGA-Based K-Means\/K-Modes Architecture for Network Intrusion Detection"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7595-0877","authenticated-orcid":false,"given":"Lucas","family":"Andrade Maciel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9242-9282","authenticated-orcid":false,"given":"Matheus","family":"Alcantara Souza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9722-1093","authenticated-orcid":false,"given":"Henrique","family":"Cota de Freitas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.041"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2010-0461"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30111-7_70"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810267"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.33736\/jita.45.2014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.9790\/1813-0601029397"},{"key":"ref16","first-page":"1","article-title":"A hardware-based clustering approach for anomaly detection","author":"labib","year":"2005","journal-title":"Int J Netw Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISVDAT.2016.8064848"},{"key":"ref18","first-page":"459","article-title":"MUCH-SWIFT: A high-throughput multi-core HW\/SW co-design K-means clustering architecture","author":"kamali","year":"2018","journal-title":"Proc Great Lakes Symp VLSI (GLSVLSI)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2964910"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898400"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.01.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015906708"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/360276.360311"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2017.2690843"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2014.7000814"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2922657"},{"key":"ref22","first-page":"420","article-title":"Feature selection for intrusion detection system using ant colony optimization","volume":"18","author":"aghdam","year":"2016","journal-title":"Int J Netw Security"},{"journal-title":"NSL-KDD Dataset","year":"2015","author":"hong","key":"ref21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11261-4_11"}],"container-title":["IEEE Transactions on Circuits and Systems II: Express Briefs"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8920\/9152175\/08826329.pdf?arnumber=8826329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:55:12Z","timestamp":1651078512000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8826329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":23,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tcsii.2019.2939826","relation":{},"ISSN":["1549-7747","1558-3791"],"issn-type":[{"type":"print","value":"1549-7747"},{"type":"electronic","value":"1558-3791"}],"subject":[],"published":{"date-parts":[[2020,8]]}}}