{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:33:40Z","timestamp":1778693620003,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3484824.3484891","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T23:09:15Z","timestamp":1642115355000},"page":"48-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Honeypot Behaviour Patterns Learning for Mass Email Marketing Detection"],"prefix":"10.1145","author":[{"given":"Toivo Herman","family":"Kamati","sequence":"first","affiliation":[{"name":"Computer Science Department, Namibia University of Science and Technology, Windhoek Namibia"}]},{"given":"Dharm Singh","family":"Jat","sequence":"additional","affiliation":[{"name":"Computer Science Department, Namibia University of Science and Technology, Windhoek Namibia"}]}],"member":"320","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","first-page":"139","article-title":"Flow-Based Approach on Bro Intrusion Detection","volume":"9","author":"Alaidaros H.","year":"2017","unstructured":"Alaidaros , H. , & Mahmuddin , M. ( 2017 ). Flow-Based Approach on Bro Intrusion Detection . Journal of Telecommunication, Electronic and Computer Engineering (JTEC) , 9 ( 2-2 ), 139 -- 145 . Retrieved from https:\/\/jtec.utem.edu.my\/jtec\/article\/view\/2234 Alaidaros, H., & Mahmuddin, M. (2017). Flow-Based Approach on Bro Intrusion Detection. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-2), 139--145. Retrieved from https:\/\/jtec.utem.edu.my\/jtec\/article\/view\/2234","journal-title":"Journal of Telecommunication, Electronic and Computer Engineering (JTEC)"},{"key":"e_1_3_2_1_2_1","volume-title":"Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 2019(D1)","author":"Albahar M. A.","year":"2019","unstructured":"Albahar , M. A. ( 2019 ). Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 2019(D1) . Albahar, M. A. (2019). Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 2019(D1)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23496-5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijssci.2018100102"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0370-2693(93)90272-J"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9163414"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"e_1_3_2_1_8_1","volume-title":"PST 2005 - 3rd Annual Conference on Privacy, Security and Trust, Conference Proceedings, 3--8.","author":"Kayacik H. G.","year":"2005","unstructured":"Kayacik , H. G. , Zincir-Heywood , A. N. , & Heywood , M. I. ( 2005 ). Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets . PST 2005 - 3rd Annual Conference on Privacy, Security and Trust, Conference Proceedings, 3--8. Kayacik, H. G., Zincir-Heywood, A. N., & Heywood, M. I. (2005). Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets. PST 2005 - 3rd Annual Conference on Privacy, Security and Trust, Conference Proceedings, 3--8."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060916"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50127-7_11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5120\/18961-0290"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2015.12.003"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.038"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3383-9_54"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"e_1_3_2_1_16_1","unstructured":"Microsoft. (n.d.). Outlook for business Stay connected and organised wherever you work best.  Microsoft. (n.d.). Outlook for business Stay connected and organised wherever you work best."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym10110648"},{"key":"e_1_3_2_1_18_1","unstructured":"Pereyra G. Zhang Y. & Bengio Y. (n.d.). Batch Normalized Recurrent Neural Networks. 1--9.  Pereyra G. Zhang Y. & Bengio Y. (n.d.). Batch Normalized Recurrent Neural Networks. 1--9."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 10th DFNCERT Workshop","author":"Provos N.","year":"2003","unstructured":"Provos , N. ( 2003 ). Honeyd: A Virtual Honeypot Daemon . Proceedings of the 10th DFNCERT Workshop , January 2003, 1--7. Provos, N. (2003). Honeyd: A Virtual Honeypot Daemon. Proceedings of the 10th DFNCERT Workshop, January 2003, 1--7."},{"key":"e_1_3_2_1_20_1","volume-title":"International Journal of Innovative Technology and Exploring Engineering, 8(2S), 272--279.","author":"Reddy S. V. G.","year":"2018","unstructured":"Reddy , S. V. G. , Thammi Reddy , K. , & Valli Kumari , V. ( 2018 ). Optimisation of deep learning using various optimisers, loss functions and dropout . International Journal of Innovative Technology and Exploring Engineering, 8(2S), 272--279. Reddy, S. V. G., Thammi Reddy, K., & Valli Kumari, V. (2018). Optimisation of deep learning using various optimisers, loss functions and dropout. International Journal of Innovative Technology and Exploring Engineering, 8(2S), 272--279."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2018.8587975"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343255"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.15961\/j.jsuese.2017.01.002"}],"event":{"name":"DSMLAI '21': International Conference on Data Science, Machine Learning and Artificial Intelligence","location":"Windhoek Namibia","acronym":"DSMLAI '21'"},"container-title":["Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484824.3484891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484824.3484891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:15Z","timestamp":1750191435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484824.3484891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":23,"alternative-id":["10.1145\/3484824.3484891","10.1145\/3484824"],"URL":"https:\/\/doi.org\/10.1145\/3484824.3484891","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2022-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}