{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:20:53Z","timestamp":1762341653653,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1900187"],"award-info":[{"award-number":["1900187"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1145\/3409334.3452073","type":"proceedings-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T20:49:49Z","timestamp":1620679789000},"page":"180-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Implementing a network intrusion detection system using semi-supervised support vector machine and random forest"],"prefix":"10.1145","author":[{"given":"Sandeep","family":"Shah","sequence":"first","affiliation":[{"name":"North Carolina Agricultural and Technical State University"}]},{"given":"Pramita Sree","family":"Muhuri","sequence":"additional","affiliation":[{"name":"North Carolina Agricultural and Technical State University"}]},{"given":"Xiaohong","family":"Yuan","sequence":"additional","affiliation":[{"name":"North Carolina Agricultural and Technical State University"}]},{"given":"Kaushik","family":"Roy","sequence":"additional","affiliation":[{"name":"North Carolina Agricultural and Technical State University"}]},{"given":"Prosenjit","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"Military College"}]}],"member":"320","published-online":{"date-parts":[[2021,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"M. M. Adankon and M. Cheriet. 2010. Genetic Algorithm-based Training for Semi-supervised SVM. Neural Comput Applic (2010) 19 1197--1206 10.1007\/s00521-010-0358-8","DOI":"10.1007\/s00521-010-0358-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.9734\/BJAST\/2016\/23668"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63645-0_23"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.33851\/JMIS.2019.6.4.165"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459198"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/info11050243"},{"key":"e_1_3_2_1_8_1","volume-title":"Conference on Cybersecurity Education, Research and Practice","author":"Nadeem M.","year":"2016","unstructured":"M. Nadeem, O. Marshall, S. Singh, X. Fang, and X. Yuan. Semi-supervised Deep Neural Network for Network Intrusion Detection, Conference on Cybersecurity Education, Research and Practice, Kennesaw, GA, USA, October 29--30, 2016."},{"key":"e_1_3_2_1_9_1","unstructured":"NSL-KDD Dataset Available: https:\/\/www.unb.ca\/cic\/datasets\/index.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.7287\/peerj.preprints.1954v1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI.2017.8226392"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178582"},{"volume-title":"Proceedings of the 2018 International Conference on Computational Science and Computational Intelligence (CSCI'18), Symposium on Cyber Warfare, Cyber Defense, and Cyber Security (CSCI-ISCW).","author":"Shi N.","key":"e_1_3_2_1_13_1","unstructured":"N. Shi, X. Yuan, J. Hernandez, K. Roy, and A. Esterline. Self-learning Semi-supervised Machine Learning for Network Intrusion Detection. Proceedings of the 2018 International Conference on Computational Science and Computational Intelligence (CSCI'18), Symposium on Cyber Warfare, Cyber Defense, and Cyber Security (CSCI-ISCW)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/info11050243"}],"event":{"name":"ACM SE '21: 2021 ACM Southeast Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Virtual Event USA","acronym":"ACM SE '21"},"container-title":["Proceedings of the 2021 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409334.3452073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3409334.3452073","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3409334.3452073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:40Z","timestamp":1750199920000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409334.3452073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":14,"alternative-id":["10.1145\/3409334.3452073","10.1145\/3409334"],"URL":"https:\/\/doi.org\/10.1145\/3409334.3452073","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]},"assertion":[{"value":"2021-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}