{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T01:37:44Z","timestamp":1769045864672,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Department of Energy","award":["DE-AC02-05CH11231"],"award-info":[{"award-number":["DE-AC02-05CH11231"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,23]]},"DOI":"10.1145\/3391812.3396274","type":"proceedings-article","created":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T23:14:35Z","timestamp":1592349275000},"page":"19-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Feature Selection Improves Tree-based Classification for Wireless Intrusion Detection"],"prefix":"10.1145","author":[{"given":"Shilpa","family":"Bhandari","sequence":"first","affiliation":[{"name":"Youngstown State University, Youngstown, OH, USA"}]},{"given":"Avinash K.","family":"Kukreja","sequence":"additional","affiliation":[{"name":"Youngstown State University, Youngstown, OH, USA"}]},{"given":"Alina","family":"Lazar","sequence":"additional","affiliation":[{"name":"Youngstown State University, Youngstown, OH, USA"}]},{"given":"Alex","family":"Sim","sequence":"additional","affiliation":[{"name":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA"}]},{"given":"Kesheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762828"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977423"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Anil V Deorankar and Shiwani S Thakare. 2020. Survey on Anomaly Detection of (IoT)- Internet of Things Cyberattacks Using Machine Learning. In 2020 Fourth International Conference on Computing Methodologies and Communication(ICCMC). ieeexplore.ieee.org 115--117.  Anil V Deorankar and Shiwani S Thakare. 2020. Survey on Anomaly Detection of (IoT)- Internet of Things Cyberattacks Using Machine Learning. In 2020 Fourth International Conference on Computing Methodologies and Communication(ICCMC). ieeexplore.ieee.org 115--117.","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00023"},{"key":"e_1_3_2_1_6_1","unstructured":"Anna Veronika Dorogush Vasily Ershov and Andrey Gulin. 2018. CatBoost: gradient boosting with categorical features support. arXiv preprint arXiv:1810.11363(2018).  Anna Veronika Dorogush Vasily Ershov and Andrey Gulin. 2018. CatBoost: gradient boosting with categorical features support. arXiv preprint arXiv:1810.11363(2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"Extremely randomized trees. Machine learning63, 1","author":"Geurts Pierre","year":"2006"},{"key":"e_1_3_2_1_8_1","volume-title":"Impact of Biases in Big Data. (March","author":"Glauner Patrick","year":"2018"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yogita Hande and Akkalashmi Muddana. 2020. A Survey on Intrusion Detection System for Software Defined Networks (SDN). International Journal of Business Data(2020).  Yogita Hande and Akkalashmi Muddana. 2020. A Survey on Intrusion Detection System for Software Defined Networks (SDN). International Journal of Business Data(2020).","DOI":"10.4018\/978-1-7998-7705-9.ch023"},{"key":"e_1_3_2_1_10_1","volume-title":"Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. (Jan","author":"Hodo Elike","year":"2017"},{"key":"e_1_3_2_1_11_1","volume-title":"A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 92 (May","author":"Kasongo Sydney Mambwe","year":"2020"},{"key":"e_1_3_2_1_12_1","volume-title":"Advances in Neural Information Processing Systems 30, I Guyon,U V Luxburg, S Bengio, H Wallach, R Fergus, S Vishwanathan, and R Garnett(Eds.). Curran Associates","author":"Ke Guolin"},{"key":"e_1_3_2_1_13_1","volume-title":"Zeeshan Iqbal, and Wali Khan Mashwani.","author":"Khan Khalid","year":"2020"},{"key":"e_1_3_2_1_14_1","volume-title":"Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset","author":"Kolias Constantinos","year":"2016"},{"key":"e_1_3_2_1_15_1","unstructured":"Soman KP Mamoun Alazab etal2020. A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security. (2020).  Soman KP Mamoun Alazab et al.2020. A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security. (2020)."},{"key":"e_1_3_2_1_16_1","volume-title":"Predicting Network Traffic Using TCP Anomalies. Conference on Big Data (Big Data)(2018)","author":"Lazar Alina","year":"2018"},{"key":"e_1_3_2_1_17_1","volume-title":"Matthew Wiener, et al","author":"Liaw Andy","year":"2002"},{"key":"e_1_3_2_1_18_1","volume-title":"Explainable AI for Trees: From Local Explanations to Global Understanding. (May","author":"Lundberg Scott M","year":"2019"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0138-9"},{"key":"e_1_3_2_1_20_1","volume-title":"A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems. Appl. Soft Comput. 92 (July","author":"Masdari Mohammad","year":"2020"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.05.010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746576"},{"key":"e_1_3_2_1_23_1","volume-title":"Article Article 48 (May","author":"Alves Resende Paulo Angelo","year":"2018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8693059"},{"key":"e_1_3_2_1_25_1","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"Rezvy Shahadate"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Gaganjot Kaur Saini Malka N Halgamuge Pallavi Sharma and James Stephen Purkis. 2020. A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications. In Cyber Warfare and Terrorism: Concepts Methodologies Tools and Applications. IGI Global 98--126.  Gaganjot Kaur Saini Malka N Halgamuge Pallavi Sharma and James Stephen Purkis. 2020. A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications. In Cyber Warfare and Terrorism: Concepts Methodologies Tools and Applications. IGI Global 98--126.","DOI":"10.4018\/978-1-7998-2466-4.ch007"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Chris Sanders. 2017. Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press.  Chris Sanders. 2017. Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press.","DOI":"10.1016\/S1353-4858(17)30046-6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Astha Syal Alina Lazar Jinoh Kim Alexander Sim and Kesheng Wu. 2019. Automatic detection of network traffic anomalies and changes of the ACM Workshop on Systems ...(2019).  Astha Syal Alina Lazar Jinoh Kim Alexander Sim and Kesheng Wu. 2019. Automatic detection of network traffic anomalies and changes of the ACM Workshop on Systems ...(2019).","DOI":"10.1145\/3322798.3329255"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925567"},{"key":"e_1_3_2_1_32_1","volume-title":"Emmanuel Candes, and Aaditya Ramdas.","author":"Tibshirani Ryan J","year":"2019"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.35842\/ijicom.v1i1.7","article-title":"A Survey of Intrusion Detection System","volume":"1","author":"Wanda Putra","year":"2020","journal-title":"International Journal of Informatics and Computation"},{"key":"e_1_3_2_1_34_1","volume-title":"Wireless Internet","author":"Wang Shaoqian"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"}],"event":{"name":"HPDC '20: The 29th International Symposium on High-Performance Parallel and Distributed Computing","location":"Stockholm Sweden","acronym":"HPDC '20","sponsor":["University of Arizona University of Arizona","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3391812.3396274","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3391812.3396274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:41Z","timestamp":1750200101000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3391812.3396274"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,23]]},"references-count":35,"alternative-id":["10.1145\/3391812.3396274","10.1145\/3391812"],"URL":"https:\/\/doi.org\/10.1145\/3391812.3396274","relation":{},"subject":[],"published":{"date-parts":[[2020,6,23]]},"assertion":[{"value":"2020-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}