{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:02Z","timestamp":1750220882652,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["830892"],"award-info":[{"award-number":["830892"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340335","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry"],"prefix":"10.1145","author":[{"given":"Jorge Maestre","family":"Vidal","sequence":"first","affiliation":[{"name":"Indra, Digital Lab, Alcobendas, Madrid, Spain"}]},{"given":"Marco Antonio Sotelo","family":"Monge","sequence":"additional","affiliation":[{"name":"Complutense University of Madrid, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.004"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"L.E. Bantis C.T. Nakas and B. Reiser. 2014. Construction of confidence regions in the ROC space after the estimation of the optimal Youden index-based cut-off point. Biometrics 70(1) (2014) 212--223.  L.E. Bantis C.T. Nakas and B. Reiser. 2014. Construction of confidence regions in the ROC space after the estimation of the optimal Youden index-based cut-off point. Biometrics 70(1) (2014) 212--223.","DOI":"10.1111\/biom.12107"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2006.18"},{"key":"e_1_3_2_1_5_1","unstructured":"E. Cohen and H. Kaplan. 2013. 16th International Workshop on Approximation Randomization and Combinatorial Optimization and 17th International Workshop Randomization and Computation. In Proceedings of the 15th International Symposium on Recent Advances in Intrusion Detection (RAID). Berkeley CA USA 452--467.  E. Cohen and H. Kaplan. 2013. 16th International Workshop on Approximation Randomization and Combinatorial Optimization and 17th International Workshop Randomization and Computation. In Proceedings of the 15th International Symposium on Recent Advances in Intrusion Detection (RAID). Berkeley CA USA 452--467."},{"volume-title":"Proceedings of the 15th USENIX Security Symposium","author":"Fogla P.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.007"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"R. Green I. Staffell and N. Vasilakos. 2014. Divide and Conquer? k-Means Clustering of Demand Data Allows Rapid and Accurate Simulations of the British Electricity System. IEEE Transactions on Engineering Management 61(2) (2014) 251--260.  R. Green I. Staffell and N. Vasilakos. 2014. Divide and Conquer? k-Means Clustering of Demand Data Allows Rapid and Accurate Simulations of the British Electricity System. IEEE Transactions on Engineering Management 61(2) (2014) 251--260.","DOI":"10.1109\/TEM.2013.2284386"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_18"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_18"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.04.038"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.05.036"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.032"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.010"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.11.006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2306060"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.186"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.015"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.07.036"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.55"},{"key":"e_1_3_2_1_27_1","unstructured":"S.A. Thorat A.K. Khandelwal B. Bruhadeshwar and K. Kishore. 2009. Anomalous packet detection using partitioned payload. Journal of Information Assurance and Security 3(3) (2009) 195--220.  S.A. Thorat A.K. Khandelwal B. Bruhadeshwar and K. Kishore. 2009. Anomalous packet detection using partitioned payload. Journal of Information Assurance and Security 3(3) (2009) 195--220."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_15"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_12"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_12"},{"volume-title":"Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID)","author":"Wang K.","key":"e_1_3_2_1_31_1"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":31,"alternative-id":["10.1145\/3339252.3340335","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340335","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}