{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:28:44Z","timestamp":1767706124161,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,14]]},"DOI":"10.1145\/3314545.3314569","type":"proceedings-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T16:30:09Z","timestamp":1555518609000},"page":"31-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Machine Learning Algorithms on Botnet Traffic"],"prefix":"10.1145","author":[{"given":"Rob","family":"McKay","sequence":"first","affiliation":[{"name":"Marymount University, School of Business and Technology, Arlington, VA"}]},{"given":"Brian","family":"Pendleton","sequence":"additional","affiliation":[{"name":"Marymount University, School of Business and Technology, Arlington, VA"}]},{"given":"James","family":"Britt","sequence":"additional","affiliation":[{"name":"Marymount University, School of Business and Technology, Arlington, VA"}]},{"given":"Ben","family":"Nakhavanit","sequence":"additional","affiliation":[{"name":"Marymount University, School of Business and Technology, Arlington, VA"}]}],"member":"320","published-online":{"date-parts":[[2019,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_5"},{"key":"e_1_3_2_1_2_1","volume-title":"Intrusion Detection Evaluation Dataset (CICS2017){dataset}.","author":"Canadian Institute for Cybersecurity.","year":"2017","unstructured":"Canadian Institute for Cybersecurity. ( 2017 ). Intrusion Detection Evaluation Dataset (CICS2017){dataset}. Retrieved from https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html. Canadian Institute for Cybersecurity. (2017). Intrusion Detection Evaluation Dataset (CICS2017){dataset}. Retrieved from https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Council of Economic Advisers.\n   (\n  2018\n  ) Retrieved from https:\/\/www.whitehouse.gov\/wp-content\/uploads\/ 2018\/02\/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf.  Council of Economic Advisers. (2018) Retrieved from https:\/\/www.whitehouse.gov\/wp-content\/uploads\/ 2018\/02\/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf."},{"key":"e_1_3_2_1_4_1","volume-title":"The Department of Defense Cyber Strategy. https:\/\/www.defense.gov\/Portals\/ \/1\/features\/2015\/0415_cyberstrategy\/Final_2015_DoD_","author":"Department of Defense.","year":"2015","unstructured":"Department of Defense. ( 2015 ). The Department of Defense Cyber Strategy. https:\/\/www.defense.gov\/Portals\/ \/1\/features\/2015\/0415_cyberstrategy\/Final_2015_DoD_ Department of Defense. (2015). The Department of Defense Cyber Strategy. https:\/\/www.defense.gov\/Portals\/ \/1\/features\/2015\/0415_cyberstrategy\/Final_2015_DoD_"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.02.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_7"},{"key":"e_1_3_2_1_7_1","volume-title":"You need to know about the Matthews Correlation Coefficient.","author":"Letter","year":"2017","unstructured":"Letter , David. ( 2017 ). You need to know about the Matthews Correlation Coefficient. Retrieved from https:\/\/lettier.github.io\/posts\/2016-08-05-matthews-correlation-coefficient.html. Letter, David. (2017). You need to know about the Matthews Correlation Coefficient. Retrieved from https:\/\/lettier.github.io\/posts\/2016-08-05-matthews-correlation-coefficient.html."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3208440"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2015.105"},{"key":"e_1_3_2_1_10_1","unstructured":"Scikitlearn. (n.d.) sklearn.metrics.precision_score. Retrieved from https:\/\/scikit-learn.org\/stable\/modules\/generated\/ sklearn.metrics.precision_score.html  Scikitlearn. (n.d.) sklearn.metrics.precision_score. Retrieved from https:\/\/scikit-learn.org\/stable\/modules\/generated\/ sklearn.metrics.precision_score.html"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2113580.2113695"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_13_1","unstructured":"The Council of Economic Advisors. (2018 February). The Cost of Malicious Cyber Activity to the U.S. Economy. Retrieved from https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2018\/02\/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf  The Council of Economic Advisors. (2018 February). The Cost of Malicious Cyber Activity to the U.S. Economy. Retrieved from https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2018\/02\/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf"},{"key":"e_1_3_2_1_14_1","unstructured":"Thomas K. (2015 April 15). Nine of the worst botnets ever seen. Retrieved from https:\/\/www.welivesecurity.com\/2015\/ 02\/25\/nine-bad-botnets-damage\/.  Thomas K. (2015 April 15). Nine of the worst botnets ever seen. Retrieved from https:\/\/www.welivesecurity.com\/2015\/ 02\/25\/nine-bad-botnets-damage\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10050043"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831284"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2017.8284731"}],"event":{"name":"ICCDA 2019: 2019 The 3rd International Conference on Compute and Data Analysis","acronym":"ICCDA 2019","location":"Kahului HI USA"},"container-title":["Proceedings of the 2019 3rd International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314545.3314569","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314545.3314569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:30Z","timestamp":1750204410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314545.3314569"}},"subtitle":["Ensemble and Simple Algorithms"],"short-title":[],"issued":{"date-parts":[[2019,3,14]]},"references-count":17,"alternative-id":["10.1145\/3314545.3314569","10.1145\/3314545"],"URL":"https:\/\/doi.org\/10.1145\/3314545.3314569","relation":{},"subject":[],"published":{"date-parts":[[2019,3,14]]},"assertion":[{"value":"2019-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}