{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T16:03:38Z","timestamp":1769097818282,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,11]]},"DOI":"10.1145\/3436829.3436842","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T11:35:15Z","timestamp":1609846515000},"page":"185-189","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Novel Intrusion Detection Architecture using Artificial Intelligence"],"prefix":"10.1145","author":[{"given":"Salam","family":"Khanji","sequence":"first","affiliation":[{"name":"College of Technological Innovation Zayed University, Abu Dhabi, UAE"}]},{"given":"Asad","family":"Khattak","sequence":"additional","affiliation":[{"name":"College of Technological Innovation Zayed University, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Research Journal of Computer Science (IRJCS) ISSN, 2393--9842.","author":"Rajan H. M.","year":"2017","unstructured":"Rajan , H. M. , Dharani , S. , & Sagar , V. ( 2017 ). Artificial Intelligence in Cyber Security-an Investigation . International Research Journal of Computer Science (IRJCS) ISSN, 2393--9842. Rajan, H. M., Dharani, S., & Sagar, V. (2017). Artificial Intelligence in Cyber Security-an Investigation. International Research Journal of Computer Science (IRJCS) ISSN, 2393--9842."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3322706.3322734"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2967403"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT.2017.8284655"},{"key":"e_1_3_2_1_5_1","volume-title":"2017 IEEE International Conference on Big Data and Smart Computing (BigComp) (pp. 313--316)","author":"Kim J.","year":"2017","unstructured":"Kim , J. , Shin , N. , Jo , S. Y. , & Kim , S. H. ( 2017 , February). Method of intrusion detection using deep neural network . In 2017 IEEE International Conference on Big Data and Smart Computing (BigComp) (pp. 313--316) . IEEE. Kim, J., Shin, N., Jo, S. Y., & Kim, S. H. (2017, February). Method of intrusion detection using deep neural network. In 2017 IEEE International Conference on Big Data and Smart Computing (BigComp) (pp. 313--316). IEEE."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.011"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.06.006"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2019.07.012"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112845"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022948414856"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7130868"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_14_1","volume-title":"Naive bayes and text classification i-introduction and theory. arXiv preprint arXiv:1410.5329","author":"Raschka S.","year":"2014","unstructured":"Raschka , S. ( 2014 ). Naive bayes and text classification i-introduction and theory. arXiv preprint arXiv:1410.5329 . Raschka, S. (2014). Naive bayes and text classification i-introduction and theory. arXiv preprint arXiv:1410.5329."}],"event":{"name":"ICSIE 2020: 2020 9th International Conference on Software and Information Engineering","location":"Cairo Egypt","acronym":"ICSIE 2020","sponsor":["Ain Shams University Ain Shams University, Egypt"]},"container-title":["Proceedings of the 2020 9th International Conference on Software and Information Engineering (ICSIE)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3436829.3436842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3436829.3436842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:45:05Z","timestamp":1750268705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3436829.3436842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,11]]},"references-count":14,"alternative-id":["10.1145\/3436829.3436842","10.1145\/3436829"],"URL":"https:\/\/doi.org\/10.1145\/3436829.3436842","relation":{},"subject":[],"published":{"date-parts":[[2020,11,11]]},"assertion":[{"value":"2021-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}