{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:29Z","timestamp":1750220969282,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T00:00:00Z","timestamp":1542931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DRPM Universitas Indonesia","award":["2490\/UN2.R3.1\/HKP.05.00\/2018"],"award-info":[{"award-number":["2490\/UN2.R3.1\/HKP.05.00\/2018"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,23]]},"DOI":"10.1145\/3293663.3293683","type":"proceedings-article","created":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T13:33:31Z","timestamp":1551706411000},"page":"20-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Anomaly based Detection Analysis for Intrusion Detection System using Big Data Technique with Learning Vector Quantization (LVQ) and Principal Component Analysis (PCA)"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Salman","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"}]},{"given":"Diyanatul","family":"Husna","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"}]},{"given":"Stella Gabriella","family":"Apriliani","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"}]},{"given":"Josua Geovani","family":"Pinem","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2018,11,23]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"202","volume-title":"London","author":"Terzi R.","year":"2015"},{"key":"e_1_3_2_1_2_1","unstructured":"R. Bloor. \"Why do Machine Learning on Big Data?\" (n.d.). {Online}. Available:http:\/\/www.skytree.net\/machine-learning\/why-do-machine-lear ning-big-data\/. {23 October 2016}  R. Bloor. \"Why do Machine Learning on Big Data?\" (n.d.). {Online}. Available:http:\/\/www.skytree.net\/machine-learning\/why-do-machine-lear ning-big-data\/. {23 October 2016}"},{"key":"e_1_3_2_1_3_1","first-page":"5","volume":"73","author":"Prathiba E.D.","year":"2013","journal-title":"\"Design of a Hybrid Intrusion Detection System using Snoort and Hadoop,\" in International Journal of Computer Applications"},{"key":"e_1_3_2_1_4_1","unstructured":"Apache Spark (n.d.) \"Apache Spark.\" {Online}. Available: http:\/\/spark.apach e.org\/ {23 October 2016}  Apache Spark (n.d.) \"Apache Spark.\" {Online}. Available: http:\/\/spark.apach e.org\/ {23 October 2016}"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Coimbatore","author":"Garg P.","year":"2016"},{"first-page":"4783","volume-title":"MA, 2017","author":"Merla Y.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"564","volume-title":"Telecommunications and Information Technology (ECTI-CON)","author":"Rattanaopas S.","year":"2017"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Sousse","author":"Chebbi W.","year":"2018"},{"key":"e_1_3_2_1_9_1","first-page":"10","volume":"2017","author":"Ratna A.A.P.","journal-title":"J. Cross-Language Plagiarism Detection System Using Latent Semantic Analysis and Learning Vector Quantization. Algorithms"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"D. S. Putra A. D. Wibawa and M. H. Purnomo \"Classification of EMG during walking using principal component analysis and learning vector quantization for biometrics study \" 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA) Lombok 2016 pp. 145--150.  D. S. Putra A. D. Wibawa and M. H. Purnomo \"Classification of EMG during walking using principal component analysis and learning vector quantization for biometrics study \" 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA) Lombok 2016 pp. 145--150.","DOI":"10.1109\/ISITIA.2016.7828649"},{"volume-title":"I. T. Jolliffe. \"Principal Component Analysis","year":"2002","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"\"Learning Vector Quantization \" {Online}. Available: http:\/\/ccy.dd.ncu. edu.tw\/~chen\/course\/neural\/ch4\/index.htm. {5 May 2017}.  \"Learning Vector Quantization \" {Online}. Available: http:\/\/ccy.dd.ncu. edu.tw\/~chen\/course\/neural\/ch4\/index.htm. {5 May 2017}."},{"key":"e_1_3_2_1_13_1","unstructured":"J. Schneider \"Cross Validation\" 7 Feb 1997. {Online}. Available: https: \/\/www.cs.cmu.edu\/~schneide\/tut5\/node42.html. {16 May 2017}  J. Schneider \"Cross Validation\" 7 Feb 1997. {Online}. Available: https: \/\/www.cs.cmu.edu\/~schneide\/tut5\/node42.html. {16 May 2017}"},{"key":"e_1_3_2_1_14_1","unstructured":"J. Hollmen \"Learning Rate\" 8 Maret 1996. {Online}. Available: http:\/\/us ers.ics.aalto.fi\/jhollmen\/dippa\/node22.html. {16 May 2017}  J. Hollmen \"Learning Rate\" 8 Maret 1996. {Online}. Available: http:\/\/us ers.ics.aalto.fi\/jhollmen\/dippa\/node22.html. {16 May 2017}"}],"event":{"name":"AIVR 2018: 2018 International Conference on Artificial Intelligence and Virtual Reality","sponsor":["University of Tsukuba University of Tsukuba"],"location":"Nagoya Japan","acronym":"AIVR 2018"},"container-title":["Proceedings of the 2018 International Conference on Artificial Intelligence and Virtual Reality"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293663.3293683","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3293663.3293683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:27Z","timestamp":1750204467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293663.3293683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,23]]},"references-count":14,"alternative-id":["10.1145\/3293663.3293683","10.1145\/3293663"],"URL":"https:\/\/doi.org\/10.1145\/3293663.3293683","relation":{},"subject":[],"published":{"date-parts":[[2018,11,23]]},"assertion":[{"value":"2018-11-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}