{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T15:56:20Z","timestamp":1762012580349,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,6]],"date-time":"2019-04-06T00:00:00Z","timestamp":1554508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,6]]},"DOI":"10.1145\/3325917.3325939","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"27-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Hybrid Learning Approach of Combining Cluster-Based Partitioning and Hidden Markov Model for IoT Intrusion Detection"],"prefix":"10.1145","author":[{"given":"Sulaiman","family":"Alhaidari","sequence":"first","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, MI, U.S.A"}]},{"given":"Mohamed","family":"Zohdy","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, MI, U.S.A"}]}],"member":"320","published-online":{"date-parts":[[2019,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2490802"},{"key":"e_1_3_2_1_4_1","volume-title":"2016 IEEE International Conference on (pp. 001827--001832)","author":"Corrales D. C.","year":"2016","unstructured":"Corrales , D. C. , Corrales , J. C. , Sanchis , A. , & Ledezma , A. ( 2016 , October). Sequential classifiers for network intrusion detection based on data selection process. In Systems, Man, and Cybernetics (SMC) , 2016 IEEE International Conference on (pp. 001827--001832) . IEEE. Corrales, D. C., Corrales, J. C., Sanchis, A., & Ledezma, A. (2016, October). Sequential classifiers for network intrusion detection based on data selection process. In Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on (pp. 001827--001832). IEEE."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"e_1_3_2_1_6_1","volume-title":"Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm. Procedia Engineering, 30, 174--182","author":"Muniyandi A. P.","year":"2012","unstructured":"Muniyandi , A. P. , Rajeswari , R. , & Rajaram , R. ( 2012 ). Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm. Procedia Engineering, 30, 174--182 Muniyandi, A. P., Rajeswari, R., & Rajaram, R. (2012). Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm. Procedia Engineering, 30, 174--182"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Anomaly based Intrusion Detection using Hybrid Learning Approach of combining k-Medoids Clustering and Na\u00efve Bayes Classification","author":"Chitrakar H.","year":"2012","unstructured":"R. Chitrakar , H. Chuanhe \" Anomaly based Intrusion Detection using Hybrid Learning Approach of combining k-Medoids Clustering and Na\u00efve Bayes Classification \" In Proceedings of 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM); ( 2012 ), pp. 1 -- 5 R. Chitrakar, H. Chuanhe \"Anomaly based Intrusion Detection using Hybrid Learning Approach of combining k-Medoids Clustering and Na\u00efve Bayes Classification\" In Proceedings of 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM); (2012), pp. 1--5","journal-title":"Proceedings of 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM); ("},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.204"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2005.17"},{"key":"e_1_3_2_1_10_1","volume-title":"Springer","author":"Syarif","year":"2012","unstructured":"Syarif , Iwan, Adam Prugel-Bennett , and Gary Wills. \"Unsupervised clustering approach for network anomaly detection.\" International Conference on Networked Digital Technologies . Springer , Berlin, Heidelberg , 2012 . Syarif, Iwan, Adam Prugel-Bennett, and Gary Wills. \"Unsupervised clustering approach for network anomaly detection.\" International Conference on Networked Digital Technologies. Springer, Berlin, Heidelberg, 2012."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/505741.505743"},{"key":"e_1_3_2_1_12_1","unstructured":"L. E. Baum and T. Petrie \"Statistical inference for probabilistic functions of finite state markov chains \" in The Anna  L. E. Baum and T. Petrie \"Statistical inference for probabilistic functions of finite state markov chains \" in The Anna"},{"issue":"5","key":"e_1_3_2_1_13_1","first-page":"12300","article-title":"Detecting Distributed Denial of Service Attacks Using Hidden Markov Models","volume":"15","author":"Sulaiman Alhaidari","year":"2018","unstructured":"Sulaiman Alhaidari , Ali Alharbi and Mohamed Zohdy. \" Detecting Distributed Denial of Service Attacks Using Hidden Markov Models .\" International Journal of Computer Science Issues (IJCSI) 15 . 5 ( 2018 ): 12300 . Sulaiman Alhaidari, Ali Alharbi and Mohamed Zohdy. \"Detecting Distributed Denial of Service Attacks Using Hidden Markov Models.\" International Journal of Computer Science Issues (IJCSI) 15.5 (2018): 12300.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"key":"e_1_3_2_1_15_1","volume-title":"HOW TO: Calculating Flow Statistics Using NetMate","author":"Arndt","year":"2016","unstructured":"Arndt , Daniel . HOW TO: Calculating Flow Statistics Using NetMate . 4 Dec. 2016 , dan.arndt.ca\/nims\/calculating-flow-statistics-using-netmate\/. Arndt, Daniel. HOW TO: Calculating Flow Statistics Using NetMate. 4 Dec. 2016, dan.arndt.ca\/nims\/calculating-flow-statistics-using-netmate\/."},{"key":"e_1_3_2_1_16_1","article-title":"Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models","author":"Alharbi A.","year":"2018","unstructured":"Alharbi , A. , Alhaidari , S. , Zohdy , M. \" Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models \" International Journal of Computer and Information Technology ( 2018 ). Alharbi, A., Alhaidari, S., Zohdy, M.\"Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models\" International Journal of Computer and Information Technology (2018).","journal-title":"International Journal of Computer and Information Technology ("},{"issue":"3","key":"e_1_3_2_1_17_1","first-page":"175","article-title":"feature pruning method for hidden markov model-based anomaly detection: a comparison of performance","volume":"4","author":"Alhaidari","year":"2018","unstructured":"Alhaidari , Sulaiman, and Zohdy , Mohamed. \" feature pruning method for hidden markov model-based anomaly detection: a comparison of performance .\" Jordanian Journal of Computers and Information Technology (JJCIT) 4 . 3 ( 2018 ): 175 -- 184 . Alhaidari, Sulaiman, and Zohdy, Mohamed. \" feature pruning method for hidden markov model-based anomaly detection: a comparison of performance.\" Jordanian Journal of Computers and Information Technology (JJCIT) 4.3 (2018): 175--184.","journal-title":"Jordanian Journal of Computers and Information Technology (JJCIT)"}],"event":{"name":"ICISDM 2019: 2019 The 3rd International Conference on Information System and Data Mining","sponsor":["University of Houston"],"location":"Houston TX USA","acronym":"ICISDM 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3325917.3325939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:08Z","timestamp":1750204388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,6]]},"references-count":17,"alternative-id":["10.1145\/3325917.3325939","10.1145\/3325917"],"URL":"https:\/\/doi.org\/10.1145\/3325917.3325939","relation":{},"subject":[],"published":{"date-parts":[[2019,4,6]]},"assertion":[{"value":"2019-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}