{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:30:42Z","timestamp":1776277842846,"version":"3.50.1"},"reference-count":128,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tnsm.2023.3298533","type":"journal-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T17:31:51Z","timestamp":1690306311000},"page":"1190-1212","source":"Crossref","is-referenced-by-count":19,"title":["Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7651-1024","authenticated-orcid":false,"given":"Ulya","family":"Sabeel","sequence":"first","affiliation":[{"name":"Faculty of Business and IT, University of Ontario Institute of Technology, Oshawa, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6107-7728","authenticated-orcid":false,"given":"Shahram Shah","family":"Heydari","sequence":"additional","affiliation":[{"name":"Faculty of Business and IT, University of Ontario Institute of Technology, Oshawa, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5960-6942","authenticated-orcid":false,"given":"Khalil","family":"El-Khatib","sequence":"additional","affiliation":[{"name":"Faculty of Business and IT, University of Ontario Institute of Technology, Oshawa, Canada"}]},{"given":"Khalid","family":"Elgazzar","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Applied Science, University of Ontario Institute of Technology, Oshawa, Canada"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Cybercrime to cost the world 10.5 trillion annually by 2025","author":"Morgan","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53396-4_15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/fi9040081"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00840-6_16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICTS.2017.8265667"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8030322"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets48225.2019.9069788"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093830"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/52.877859"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11553595_6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685699"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983568"},{"issue":"3","key":"ref15","first-page":"9","article-title":"Application of machine learning approaches in intrusion detection system: A survey","volume":"4","author":"Haq","year":"2015","journal-title":"Int. J. Adv. Res. Artif. Intell."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref17","article-title":"Shallow and deep networks intrusion detection system: A taxonomy and survey","author":"Hodo","year":"2017","journal-title":"arXiv:1701.02145"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010097"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/app11125458"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.51.1.29595"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5120\/15544-4098"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10437-z"},{"key":"ref26","article-title":"Adversarial machine learning in network intrusion detection domain: A systematic review","author":"Alatwi","year":"2021","journal-title":"arXiv:2112.03315"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1040037"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS50059.2020.00014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02805-w"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103196"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2303\/1\/012008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1395-1_16"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3215269"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01264-7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/computers11070115"},{"key":"ref36","first-page":"241","article-title":"Polymorphic blending attacks","volume-title":"Proc. USENIX Security Symp.","author":"Fogla"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297264"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.5772\/intechopen.92653","article-title":"Machine learning applications in misuse and anomaly detection","volume-title":"Security Privacy From a Legal, Ethical, Technology Perspective","author":"Sen","year":"2020"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206805"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2991876"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3050917"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001350"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT.2018.8855772"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2018.8405026"},{"key":"ref45","volume-title":"KDD cup 1999 data","author":"Stolfo","year":"2021"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997492"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.007"},{"key":"ref50","volume-title":"Malware Capture Facility Project","author":"Garcia","year":"2013"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"},{"key":"ref56","volume-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic, (version 1.0.0) [data set]","author":"Garcia","year":"2020"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04152-6"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3416013.3426457"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3116612"},{"issue":"1","key":"ref61","first-page":"1","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","volume":"2","author":"An","year":"2015","journal-title":"Special Lecture IE"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/s17091967"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527980"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3083422"},{"key":"ref66","article-title":"Multi-class generative adversarial networks with the L2 loss function","author":"Mao","year":"2016","journal-title":"arXiv:1611.04076"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893871"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/app11115213"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.710384"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1746373"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/math11010108"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102177"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3112159"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110343"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140015"},{"key":"ref77","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102262","article-title":"SFE-GACN: A novel unknown attack detection under insufficient data via intra categories generation in embedding space","volume":"105","author":"Liu","year":"2021","journal-title":"Comput. Security"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1002\/int.22766"},{"key":"ref79","article-title":"Anomaly detection with adversarial dual autoencoders","author":"Vu","year":"2019","journal-title":"arXiv:1902.06924"},{"key":"ref80","article-title":"Adversarial autoencoders","author":"Makhzani","year":"2015","journal-title":"arXiv:1511.05644"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3428363.3428371"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.299"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00910-1"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1177\/1059712318818568"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000476"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CCNS50731.2020.00019"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3128024"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2330900"},{"key":"ref90","volume-title":"Exploring the limits of transfer learning","author":"Joshi","year":"2022"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1561\/2200000071"},{"key":"ref92","volume-title":"Introduction to deep learning","year":"2021"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC48513.2020.9065240"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106631"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102923"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_57"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2021.3121870"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2977374"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.01.007"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107315"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102289"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-018-1306-7"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.3390\/s19112528"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS51619.2021.9563297"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI51800.2020.00031"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.24425\/ijet.2021.135975"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.14"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICNISC.2016.056"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC49638.2020.9123302"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3119055"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232408"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v11i12.3638"},{"issue":"2","key":"ref114","first-page":"265","article-title":"Using parametric t-distributed stochastic Neighbor embedding combined with hierarchical neural network for network intrusion detection","volume":"22","author":"Yao","year":"2020","journal-title":"Int. J. Netw. Security"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.026"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.119"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863036"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1021\/ci0342472"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128834"},{"key":"ref122","article-title":"Evaluation of requirements management tools with support for traceability-based change impact analysis","author":"Abma","year":"2009"},{"key":"ref123","article-title":"Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation","author":"Powers","year":"2020","journal-title":"arXiv:2010.16061"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68887-5_4"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.3390\/fi14040108"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref127","first-page":"4765","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Lundberg"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10423826\/10193854.pdf?arnumber=10193854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,12]],"date-time":"2024-02-12T19:15:13Z","timestamp":1707765313000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10193854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":128,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2023.3298533","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}