{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:28Z","timestamp":1750220968276,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T00:00:00Z","timestamp":1541980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,12]]},"DOI":"10.1145\/3293614.3293642","type":"proceedings-article","created":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T13:37:58Z","timestamp":1554730678000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Intrusion Detection via Multilayer Perceptron using a Low Power Device"],"prefix":"10.1145","author":[{"given":"Felipe de Almeida","family":"Florencio","sequence":"first","affiliation":[{"name":"Universidade Federal de Sergipe, S\u00e3o Cristov\u00e3o, Sergipe, Brazil"}]},{"given":"Edward David","family":"Moreno","sequence":"additional","affiliation":[{"name":"Universidade Federal de Sergipe, S\u00e3o Cristov\u00e3o, Sergipe, Brazil"}]},{"given":"Hendrik","family":"Macedo","sequence":"additional","affiliation":[{"name":"Universidade Federal de Sergipe, S\u00e3o Cristov\u00e3o, Sergipe, Brazil"}]},{"given":"Ricardo J. P.","family":"de B. Salgueiro","sequence":"additional","affiliation":[{"name":"Universidade Federal de Sergipe, S\u00e3o Cristov\u00e3o, Sergipe, Brazil"}]},{"given":"Filipe Barreto","family":"do Nascimento","sequence":"additional","affiliation":[{"name":"Universidade Federal de Sergipe, S\u00e3o Cristov\u00e3o, Sergipe, Brazil"}]},{"given":"Flavio Arthur Oliveira","family":"Santos","sequence":"additional","affiliation":[{"name":"Universidade Federal de Sergipe, S\u00e3o Cristov\u00e3o, Sergipe, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2018,11,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.05.003"},{"key":"e_1_3_2_1_2_1","unstructured":"Atmel Corporation 2016. ATmega328\/P. Atmel Corporation San Jose CA EUA. https:\/\/www.microchip.com\/  Atmel Corporation 2016. ATmega328\/P. Atmel Corporation San Jose CA EUA. https:\/\/www.microchip.com\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.11.028"},{"key":"e_1_3_2_1_5_1","volume-title":"Ant Colony Induced Decision Trees for Intrusion Detection. In 16th European Conference on Cyber Warfare and Security. ACPI, 53--62","author":"Botes Frans","year":"2017","unstructured":"Frans Botes , Louise Leenen , and Retha De La Harpe . 2017 . Ant Colony Induced Decision Trees for Intrusion Detection. In 16th European Conference on Cyber Warfare and Security. ACPI, 53--62 . Frans Botes, Louise Leenen, and Retha De La Harpe. 2017. Ant Colony Induced Decision Trees for Intrusion Detection. In 16th European Conference on Cyber Warfare and Security. ACPI, 53--62."},{"key":"e_1_3_2_1_6_1","unstructured":"Frans Hendrik Botes. 2017. NSL-KDD Dataset for WEKA. https:\/\/github.com\/FransHBotes\/NSLKDD-Dataset  Frans Hendrik Botes. 2017. NSL-KDD Dataset for WEKA. https:\/\/github.com\/FransHBotes\/NSLKDD-Dataset"},{"volume-title":"The Twelfth Advanced International Conference on Telecommunications. 82--87","author":"de Almeida Fernando M.","key":"e_1_3_2_1_7_1","unstructured":"Fernando M. de Almeida , Admilson de R. L. Ribeiro , Edward D. Moreno , and Carlos A. E. Montesco . 2016. Performance evaluation of an artificial neuralnetwork multilayer perceptron with limited weights for detecting denial of service attack on internet of things . In The Twelfth Advanced International Conference on Telecommunications. 82--87 . Fernando M. de Almeida, Admilson de R. L. Ribeiro, Edward D. Moreno, and Carlos A. E. Montesco. 2016. Performance evaluation of an artificial neuralnetwork multilayer perceptron with limited weights for detecting denial of service attack on internet of things. In The Twelfth Advanced International Conference on Telecommunications. 82--87."},{"volume-title":"The organization of behavior: A neuropsychological theory","author":"Hebb Donald O.","key":"e_1_3_2_1_8_1","unstructured":"Donald O. Hebb . 1949. The organization of behavior: A neuropsychological theory . Wiley , New York . Donald O. Hebb. 1949. The organization of behavior: A neuropsychological theory. Wiley, New York."},{"volume-title":"2004 Symposium on Computational Intelligence in Bioinformatics and Computational Biology. 41--48","author":"Jong K.","key":"e_1_3_2_1_9_1","unstructured":"K. Jong , E. Marchiori , M. Sebag , and A. van der Vaart. 2004. Feature selection in proteomic pattern data with support vector machines . In 2004 Symposium on Computational Intelligence in Bioinformatics and Computational Biology. 41--48 . K. Jong, E. Marchiori, M. Sebag, and A. van der Vaart. 2004. Feature selection in proteomic pattern data with support vector machines. In 2004 Symposium on Computational Intelligence in Bioinformatics and Computational Biology. 41--48."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/998669.998896"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2010.03.021"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070419"},{"volume-title":"2016 International Joint Conference on Neural Networks (IJCNN). 206--212","author":"Parker G.","key":"e_1_3_2_1_13_1","unstructured":"G. Parker and M. Khan . 2016. Distributed neural network: Dynamic learning via backpropagation with hardware neurons using arduino chips . In 2016 International Joint Conference on Neural Networks (IJCNN). 206--212 . G. Parker and M. Khan. 2016. Distributed neural network: Dynamic learning via backpropagation with hardware neurons using arduino chips. In 2016 International Joint Conference on Neural Networks (IJCNN). 206--212."},{"volume-title":"Python Machine Learning","author":"Raschka Sebastian","key":"e_1_3_2_1_14_1","unstructured":"Sebastian Raschka . 2015. Python Machine Learning . Packt Publishing . Sebastian Raschka. 2015. Python Machine Learning. Packt Publishing."},{"volume-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 1--6.","author":"Tavallaee M.","key":"e_1_3_2_1_15_1","unstructured":"M. Tavallaee , E. Bagheri , W. Lu , and A. A. Ghorbani . 2009. A detailed analysis of the KDD CUP 99 data set . In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 1--6. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 1--6."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_1_18_1","volume-title":"2010 3rd International Conference on Computer Science and Information Technology","volume":"1","author":"Yan K. Q.","unstructured":"K. Q. Yan , S. C. Wang , S. S. Wang , and C. W. Liu . 2010. Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network . In 2010 3rd International Conference on Computer Science and Information Technology , Vol. 1 . 114--118. K. Q. Yan, S. C. Wang, S. S. Wang, and C. W. Liu. 2010. Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network. In 2010 3rd International Conference on Computer Science and Information Technology, Vol. 1. 114--118."}],"event":{"name":"EATIS '18: Euro American Conference on Telematics and Information Systems","sponsor":["EATIS Euro American Association on Telematics and Information Systems"],"location":"Fortaleza Brazil","acronym":"EATIS '18"},"container-title":["Proceedings of the Euro American Conference on Telematics and Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293614.3293642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3293614.3293642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:26Z","timestamp":1750204466000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293614.3293642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,12]]},"references-count":18,"alternative-id":["10.1145\/3293614.3293642","10.1145\/3293614"],"URL":"https:\/\/doi.org\/10.1145\/3293614.3293642","relation":{},"subject":[],"published":{"date-parts":[[2018,11,12]]},"assertion":[{"value":"2018-11-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}