{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T10:41:29Z","timestamp":1762080089889,"version":"build-2065373602"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1109\/wincom55661.2022.9966426","type":"proceedings-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T03:22:13Z","timestamp":1670383333000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Improving Intrusion Detection Using PCA And K-Means Clustering Algorithm"],"prefix":"10.1109","author":[{"given":"Radi","family":"Khaoula","sequence":"first","affiliation":[{"name":"National School of Applied Sciences, Sultan Moulay Slimane University,LaSTI Laboratory,Khouribga,Morocco"}]},{"given":"Moughit","family":"Mohamed","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences, Sultan Moulay Slimane University,LaSTI Laboratory,Khouribga,Morocco"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8797-4_21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IFITA.2009.34"},{"key":"ref10","first-page":"225","article-title":"The Impact of distance metrics on K-means clustering algorithm using in network intrusion detection data","volume":"3","author":"hadi","year":"2015","journal-title":"International Journal on Computer Network and Communication Security"},{"key":"ref6","article-title":"K- Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset","volume":"3","author":"kumar","year":"2013","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"key":"ref11","article-title":"Canopy clustering: a review on pre-clustering approach to K-Means clustering","volume":"3","author":"amresh","year":"2014","journal-title":"International Journal of Innovations and Advancement in Computer Science"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2012.6194493"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/9781108679930"},{"key":"ref8","article-title":"Some methods for classification and analysis of multivariate observations","author":"macqueen","year":"1967","journal-title":"Proceedings of the Fifth Berkeley Symposium on Mathematical"},{"key":"ref7","first-page":"225","article-title":"The Impact of Distance Metrics on K-means Clustering Algorithm Using in Network Intrusion Detection Data","volume":"3","author":"nasooti","year":"2015","journal-title":"International Journal of Computer Networks and Communications Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017912719"},{"key":"ref9","first-page":"193","article-title":"Analysis of NSL-KDD Dataset Using K-Means and Canopy Clustering Algorithms Based on Distance Metrics","author":"vinutha","year":"0","journal-title":"Integrated Intelligent Computing Communication and Security"},{"key":"ref1","first-page":"143","article-title":"A STUDY ON INTRUSION DETECTION","volume":"10","author":"fatima","year":"2019","journal-title":"International Journal of Advanced Research in Engineering and Technology (IJARET)"}],"event":{"name":"2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)","start":{"date-parts":[[2022,10,26]]},"location":"Rabat, Morocco","end":{"date-parts":[[2022,10,29]]}},"container-title":["2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9966415\/9966416\/09966426.pdf?arnumber=9966426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:24:24Z","timestamp":1673299464000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9966426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wincom55661.2022.9966426","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]}}}