{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:04:12Z","timestamp":1777043052029,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1145\/3454127.3456576","type":"proceedings-article","created":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T05:13:07Z","timestamp":1637989987000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Review of Intrusion Detection Systems: Datasets and machine learning methods"],"prefix":"10.1145","author":[{"given":"Aouatif","family":"Arqane","sequence":"first","affiliation":[{"name":"Chouaib Doukkali University, Morocco"}]},{"given":"Omar","family":"Boutkhoum","sequence":"additional","affiliation":[{"name":"Chouaib Doukkali University, Morocco"}]},{"given":"Hicham","family":"Boukhriss","sequence":"additional","affiliation":[{"name":"Chouaib Doukkali University, Morocco"}]},{"given":"Abdelmajid","family":"El Moutaouakkil","sequence":"additional","affiliation":[{"name":"Chouaib Doukkali University, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2021,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"102582","article-title":"Pescap\u00e8, \u00ab\u00a0Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues\u00a0\u00bb","volume":"55","author":"Shamshirband S.","year":"2020","unstructured":"S. Shamshirband , M. Fathi , A. T. Chronopoulos , A. Montieri , F. Palumbo , et A . Pescap\u00e8, \u00ab\u00a0Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues\u00a0\u00bb , J. Inf. Secur. Appl. , vol. 55 , p. 102582 , d\u00e9c. 2020 , doi: 10.1016\/j.jisa.2020.102582. 10.1016\/j.jisa.2020.102582 S. Shamshirband, M. Fathi, A. T. Chronopoulos, A. Montieri, F. Palumbo, et A. Pescap\u00e8, \u00ab\u00a0Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues\u00a0\u00bb, J. Inf. Secur. Appl., vol. 55, p. 102582, d\u00e9c. 2020, doi: 10.1016\/j.jisa.2020.102582.","journal-title":"J. Inf. Secur. Appl."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15032-7_39"},{"key":"e_1_3_2_1_3_1","volume-title":"IDC: The premier global market intelligence company. https:\/\/www.idc.com\/tracker\/showproductinfo.jsp?prod_id=1843 (consult\u00e9 le f\u00e9vr. 17","author":"Smart Cities Spending Guide\u00a0\u00bb \u00ab\u00a0Worldwide","year":"2021","unstructured":"\u00ab\u00a0Worldwide Smart Cities Spending Guide\u00a0\u00bb , IDC: The premier global market intelligence company. https:\/\/www.idc.com\/tracker\/showproductinfo.jsp?prod_id=1843 (consult\u00e9 le f\u00e9vr. 17 , 2021 ). \u00ab\u00a0Worldwide Smart Cities Spending Guide\u00a0\u00bb, IDC: The premier global market intelligence company. https:\/\/www.idc.com\/tracker\/showproductinfo.jsp?prod_id=1843 (consult\u00e9 le f\u00e9vr. 17, 2021)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411617080168"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_1_7_1","volume-title":"techniques, datasets and challenges | Cybersecurity | Full Text\u00a0\u00bb. https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-019-0038-7 (consult\u00e9 le nov. 28","author":"\u00ab\u00a0Survey","year":"2020","unstructured":"\u00ab\u00a0Survey of intrusion detection systems : techniques, datasets and challenges | Cybersecurity | Full Text\u00a0\u00bb. https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-019-0038-7 (consult\u00e9 le nov. 28 , 2020 ). \u00ab\u00a0Survey of intrusion detection systems: techniques, datasets and challenges | Cybersecurity | Full Text\u00a0\u00bb. https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-019-0038-7 (consult\u00e9 le nov. 28, 2020)."},{"key":"e_1_3_2_1_8_1","first-page":"560","volume-title":"Procedia Comput. Sci.","volume":"175","author":"Serinelli B. M.","year":"1999","unstructured":"B. M. Serinelli , A. Collen , et N. A. Nijdam , \u00ab\u00a0Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System\u00a0\u00bb , Procedia Comput. Sci. , vol. 175 , p. 560 - 565 , janv. 2020, doi: 10.1016\/j.procs.2020.07.080. 10.1016\/j.procs.2020.07.080 B. M. Serinelli, A. Collen, et N. A. Nijdam, \u00ab\u00a0Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System\u00a0\u00bb, Procedia Comput. Sci., vol. 175, p. 560-565, janv. 2020, doi: 10.1016\/j.procs.2020.07.080."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3250-4_36"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103261"},{"key":"e_1_3_2_1_11_1","first-page":"e00497","article-title":"Adetunmbi, \u00ab\u00a0Network intrusion detection system using supervised learning paradigm\u00a0\u00bb","volume":"9","author":"Mebawondu J. O.","year":"2020","unstructured":"J. O. Mebawondu , O. D. Alowolodu , J. O. Mebawondu , et A. O . Adetunmbi, \u00ab\u00a0Network intrusion detection system using supervised learning paradigm\u00a0\u00bb , Sci. Afr. , vol. 9 , p. e00497 , sept. 2020 , doi: 10.1016\/j.sciaf.2020.e00497. 10.1016\/j.sciaf.2020.e00497 J. O. Mebawondu, O. D. Alowolodu, J. O. Mebawondu, et A. O. Adetunmbi, \u00ab\u00a0Network intrusion detection system using supervised learning paradigm\u00a0\u00bb, Sci. Afr., vol. 9, p. e00497, sept. 2020, doi: 10.1016\/j.sciaf.2020.e00497.","journal-title":"Sci. Afr."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02805-w"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63820-7_6"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1847-2"},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03082-6 (consult\u00e9 le nov. 29","author":"SpringerLink\u00a0\u00bb M\u2013SVM","year":"2020","unstructured":"\u00ab\u00a0FC M\u2013SVM based intrusion detection system for cloud computing environment | SpringerLink\u00a0\u00bb . https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03082-6 (consult\u00e9 le nov. 29 , 2020 ). \u00ab\u00a0FCM\u2013SVM based intrusion detection system for cloud computing environment | SpringerLink\u00a0\u00bb. https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03082-6 (consult\u00e9 le nov. 29, 2020)."},{"key":"e_1_3_2_1_16_1","first-page":"187","volume-title":"Proceedings of the Third International Conference on Computational Intelligence and Informatics","author":"Shashi N. Sameera","year":"2020","unstructured":"N. Sameera et M. Shashi , \u00ab\u00a0Encoding Approach for Intrusion Detection Using PCA and KNN Classifier\u00a0\u00bb , in Proceedings of the Third International Conference on Computational Intelligence and Informatics , Singapore , 2020 , p. 187 - 199 , doi: 10.1007\/978-981-15-1480-7_15. 10.1007\/978-981-15-1480-7_15 N. Sameera et M. Shashi, \u00ab\u00a0Encoding Approach for Intrusion Detection Using PCA and KNN Classifier\u00a0\u00bb, in Proceedings of the Third International Conference on Computational Intelligence and Informatics, Singapore, 2020, p. 187-199, doi: 10.1007\/978-981-15-1480-7_15."},{"key":"e_1_3_2_1_17_1","volume-title":"Mater. Today Proc., oct.","author":"J. K.","year":"2020","unstructured":"J. K. Samriya et N. Kumar, \u00ab\u00a0A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing\u00a0\u00bb , Mater. Today Proc., oct. 2020 , doi: 10.1016\/j.matpr.2020.09.614. 10.1016\/j.matpr.2020.09.614 J. K. Samriya et N. Kumar, \u00ab\u00a0A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing\u00a0\u00bb, Mater. Today Proc., oct. 2020, doi: 10.1016\/j.matpr.2020.09.614."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/link.springer.com\/article\/10.1186\/s12860-019-0237-9 (consult\u00e9 le nov. 29","author":"SpringerLink\u00a0\u00bb \u00ab\u00a0Recognizing","year":"2020","unstructured":"\u00ab\u00a0Recognizing ion ligand binding sites by SMO algorithm | SpringerLink\u00a0\u00bb . https:\/\/link.springer.com\/article\/10.1186\/s12860-019-0237-9 (consult\u00e9 le nov. 29 , 2020 ). \u00ab\u00a0Recognizing ion ligand binding sites by SMO algorithm | SpringerLink\u00a0\u00bb. https:\/\/link.springer.com\/article\/10.1186\/s12860-019-0237-9 (consult\u00e9 le nov. 29, 2020)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.013"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9042-5_75"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.271"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2019.03.003"}],"event":{"name":"NISS2021: The 4th International Conference on Networking, Information Systems & Security.","location":"KENITRA AA Morocco","acronym":"NISS2021"},"container-title":["Proceedings of the 4th International Conference on Networking, Information Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3454127.3456576","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3454127.3456576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:51Z","timestamp":1750193271000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3454127.3456576"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":22,"alternative-id":["10.1145\/3454127.3456576","10.1145\/3454127"],"URL":"https:\/\/doi.org\/10.1145\/3454127.3456576","relation":{},"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"2021-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}