{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:15:32Z","timestamp":1774466132852,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tnsm.2025.3540753","type":"journal-article","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:43:37Z","timestamp":1740163417000},"page":"1929-1944","source":"Crossref","is-referenced-by-count":6,"title":["Adapting to the Evolution: Enhancing Intrusion Detection Through Machine Learning in the QUIC Protocol Era"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3659-4276","authenticated-orcid":false,"given":"Adam","family":"Kadi","sequence":"first","affiliation":[{"name":"ENSICAEN, UNICAEN, CNRS, GREYC, Normandie Universit&#x00E9;, Caen, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1922-769X","authenticated-orcid":false,"given":"Lyes","family":"Khoukhi","sequence":"additional","affiliation":[{"name":"ENSICAEN, UNICAEN, CNRS, GREYC, Normandie Universit&#x00E9;, Caen, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1618-004X","authenticated-orcid":false,"given":"Jouni","family":"Viinikka","sequence":"additional","affiliation":[{"name":"6cure, Caen, France"}]},{"given":"Pierre-Edouard","family":"Fabre","sequence":"additional","affiliation":[{"name":"6cure, Caen, France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/catch.2009.40"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/fi13080198"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/app11125713"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/giis59465.2024.10449925"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9114","volume-title":"HTTP\/3","author":"Bishop","year":"2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00616-0"},{"key":"ref7","author":"Shirsath","year":"2023","journal-title":"CAIDA UCSD DDoS 2007 attack dataset"},{"key":"ref8","article-title":"Predict and prevent DDOS attacks using machine learning and statistical algorithms","author":"Golduzian","year":"2023","journal-title":"arXiv:2308.15674"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.12697"},{"key":"ref11","author":"Ferrag","year":"2022","journal-title":"Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications: Centralized and federated learning"},{"key":"ref12","volume-title":"KDD Cup 1999 Data","author":"Stolfo","year":"1999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icassp39728.2021.9413570"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2015.3.1924"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref17","first-page":"30","article-title":"A new attack composition for network security","volume-title":"Proc. 10th DFN-Forum Kommunikationstechnologien","author":"Beer"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref19","volume-title":"A realistic cyber defense dataset (CSE-CIC-IDS2018)","year":"2018"},{"key":"ref20","volume-title":"Bogazi\u00e7i university DDoS dataset","author":"Erhan","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050800"},{"issue":"13","key":"ref22","doi-asserted-by":"crossref","first-page":"5941","DOI":"10.3390\/s23135941","article-title":"CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment","volume":"23","author":"Neto","year":"2023","journal-title":"Sensors"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9000","volume-title":"QUIC: A UDP-based multiplexed and secure transport","author":"Iyengar","year":"2021"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9001","volume-title":"Using TLS to secure QUIC","author":"Thomson","year":"2021"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9002","volume-title":"QUIC loss detection and congestion control","author":"Iyengar","year":"2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/s43586-022-00184-w"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10973774\/10899873.pdf?arnumber=10899873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:12:50Z","timestamp":1745385170000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10899873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":27,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3540753","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}