{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T16:40:17Z","timestamp":1762015217183,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342004","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Behavior-Based Outlier Detection for Network Access Control Systems"],"prefix":"10.1145","author":[{"given":"Musa Abubakar","family":"Muhammad","sequence":"first","affiliation":[{"name":"Mobile Cognitive Systems (MCS) Research Group, Cyber Technology Institute, De Montfort University, The Gateway, Leicester, United Kingdom"}]},{"given":"Aladdin","family":"Ayesh","sequence":"additional","affiliation":[{"name":"Mobile Cognitive Systems (MCS) Research Group, Cyber Technology Institute, De Montfort University, The Gateway, Leicester, United Kingdom"}]},{"given":"Isabel","family":"Wagner","sequence":"additional","affiliation":[{"name":"Cyber Security Center, Cyber Technology Institute, De Montfort University, The Gateway, Leicester, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500853.2500857"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTAIS.2018.8600824"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_4_1","article-title":"Vulnerabilities & Attacks in Mobile Adhoc Networks (MANET)","volume":"8","author":"Dhillon Gurjeet Singh","year":"2017","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.12.002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-008-0371-9"},{"volume-title":"Applications of data mining in computer security","author":"Eskin Eleazar","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2014.7010235"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Markus Goldstein and Seiichi Uchida. 2016. A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data. PLOS ONE 11 4 (04 2016) 1--31.  Markus Goldstein and Seiichi Uchida. 2016. A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data. PLOS ONE 11 4 (04 2016) 1--31.","DOI":"10.1371\/journal.pone.0152173"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00003-5"},{"volume-title":"International Workshop on Information Security Applications. Springer, 165--176","year":"2014","author":"Kang Dongwan","key":"e_1_3_2_1_11_1"},{"volume-title":"Information and Communication Technology Convergence (ICTC), 2015 International Conference on. 1288--1293","author":"Kim T.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16060790"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2010.26"},{"key":"e_1_3_2_1_15_1","unstructured":"Jos\u00e9 Mar\u00eda Luna-Romera Jorge Garc\u00eda-Guti\u00e9rrez Mar\u00eda Mart\u00ednez-Ballesteros and Jos\u00e9 C Riquelme Santos. 2018. An approach to validity indices for clustering techniques in Big Data. Progress in Artificial Intelligence (2018) 1--14.  Jos\u00e9 Mar\u00eda Luna-Romera Jorge Garc\u00eda-Guti\u00e9rrez Mar\u00eda Mart\u00ednez-Ballesteros and Jos\u00e9 C Riquelme Santos. 2018. An approach to validity indices for clustering techniques in Big Data. Progress in Artificial Intelligence (2018) 1--14."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150531"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.17781\/P002537"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3105573"},{"key":"e_1_3_2_1_19_1","unstructured":"Danny Palmer. 2017. Your failure to apply critical cybersecurity updates is putting your company at risk from the next WannaCry or Petya. (Aug 2017). https:\/\/www.zdnet.com\/article\/your-failure-to-apply-critical-cyber-security-updates-puts-your-company-at-risk-from-the-next\/  Danny Palmer. 2017. Your failure to apply critical cybersecurity updates is putting your company at risk from the next WannaCry or Petya. (Aug 2017). https:\/\/www.zdnet.com\/article\/your-failure-to-apply-critical-cyber-security-updates-puts-your-company-at-risk-from-the-next\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Vaishali R Patel and Rupa G Mehta. 2012. Data clustering: integrating different distance measures with modified k-means algorithm. (2012) 691--700.  Vaishali R Patel and Rupa G Mehta. 2012. Data clustering: integrating different distance measures with modified k-means algorithm. (2012) 691--700.","DOI":"10.1007\/978-81-322-0491-6_63"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Manmeet Mahinderjit Singh Soh Sin Siang Oh Ying San Nurul Hashimah Ahamed Hassain Malim and Azizul Rahman Mohd Shariff. 2014. Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol 4 (2014).  Manmeet Mahinderjit Singh Soh Sin Siang Oh Ying San Nurul Hashimah Ahamed Hassain Malim and Azizul Rahman Mohd Shariff. 2014. Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol 4 (2014).","DOI":"10.5121\/ijmnct.2014.4501"},{"key":"e_1_3_2_1_23_1","unstructured":"A. Uluagac. 2018. CRAWDAD dataset gatech\/fingerprinting (v.2014-06-09). (2018). https:\/\/crawdad.org\/gatech\/fingerprinting\/20140609\/  A. Uluagac. 2018. CRAWDAD dataset gatech\/fingerprinting (v.2014-06-09). (2018). https:\/\/crawdad.org\/gatech\/fingerprinting\/20140609\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682720"}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"],"location":"Paris France","acronym":"ICFNDS '19"},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342004","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342004"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":24,"alternative-id":["10.1145\/3341325.3342004","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342004","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}