{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:27:02Z","timestamp":1730305622543,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1109\/wincom59760.2023.10322902","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T14:07:27Z","timestamp":1700662047000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["K-means-dist: A Novel Approach for Enhanced Cybersecurity Clustering Using Combined Distance Metrics"],"prefix":"10.1109","author":[{"given":"Radi","family":"Khaoula","sequence":"first","affiliation":[{"name":"Sultan Moulay Slimane University,LaSTI Laboratory, National School of Applied Sciences,Khouribga,Morocco"}]},{"given":"Moughit","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Sultan Moulay Slimane University,LaSTI Laboratory, National School of Applied Sciences,Khouribga,Morocco"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.019067"},{"key":"ref12","first-page":"100","article-title":"Density-based clustering and unsupervised feature selection approach for network intrusion detection","volume":"139","author":"saeed","year":"2014","journal-title":"Neurocomputing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120753"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM55661.2022.9966426"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-019-05855-6"},{"key":"ref11","first-page":"132","article-title":"A survey on clustering algorithms for intrusion detection system","volume":"75","author":"gulshan","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"article-title":"On Clustering Time Series Using Euclidean Distance and Pearson Correlation","year":"0","author":"berthold","key":"ref22"},{"article-title":"Enhancing Cybersecurity Through Clustering Analysis Of DNS Queries","year":"2023","author":"radi","key":"ref10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10259"},{"key":"ref2","first-page":"166","article-title":"An ensemble approach for intrusion detection based on K-means and random forest","volume":"77","author":"chen","year":"2018","journal-title":"Computers & Security"},{"key":"ref1","article-title":"CICIDS2017: A benchmark dataset for intrusion detection in IoT","author":"moustafa","year":"2017","journal-title":"Proceedings of the 15th Australian Information Security Management Conference"},{"article-title":"Details of the Adjusted Rand index and Clustering algorithms Supplement to the paper &#x201C;An empirical study on Principal Component Analysis for clustering gene expression data&#x201D; (to appear in Bioinformatics)","year":"2001","author":"yeung","key":"ref17"},{"year":"0","key":"ref16"},{"article-title":"Painless Unsupervised Learning with Features","year":"0","author":"berg-kirkpatrick","key":"ref19"},{"article-title":"Feature Selection as a Preprocessing Step for Hierarchical Clustering","year":"0","author":"talavera","key":"ref18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref7","article-title":"An ensemble model for intrusion detection using K-means clustering and random forest","author":"pham","year":"2019","journal-title":"2019 IEEE International Conference on Big Data (Big Data)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDS47004.2019.8942345"},{"key":"ref4","first-page":"2203","article-title":"Deep learning for network intrusion detection: A survey","volume":"20","author":"wei","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref3","first-page":"57","article-title":"K-means clustering algorithm with an improved initial centroid","volume":"134","author":"mirjalili","year":"2019","journal-title":"Expert Systems with Applications"},{"key":"ref6","first-page":"1","article-title":"A comparative study of clustering algorithms for network flow-based intrusion detection systems","volume":"106","author":"mart\u00ednez-mateo","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"key":"ref5","article-title":"An unsupervised approach for malware detection using K-means clustering","author":"khan","year":"2018","journal-title":"Proceedings of the 11th International Conference on Security of Information and Networks"}],"event":{"name":"2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)","start":{"date-parts":[[2023,10,26]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,10,28]]}},"container-title":["2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10322877\/10322879\/10322902.pdf?arnumber=10322902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T19:08:48Z","timestamp":1701371328000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10322902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wincom59760.2023.10322902","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]}}}