{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:13Z","timestamp":1750219993850,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1145\/3508397.3564830","type":"proceedings-article","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T01:06:49Z","timestamp":1670548009000},"page":"110-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Attacks on Computer Networks Using Artificial Intelligence Algorithms"],"prefix":"10.1145","author":[{"given":"Lukasz","family":"Krolik","sequence":"first","affiliation":[{"name":"Wroclaw University of Science and Technology, Wroclaw, Poland"}]},{"given":"Michal","family":"Kedziora","sequence":"additional","affiliation":[{"name":"Wroclaw University of Science and Technology, Wroclaw, Poland"}]},{"given":"Jolanta","family":"Mizera-Pietraszko","sequence":"additional","affiliation":[{"name":"Military University of Land Forces, Wroclaw, Poland"}]},{"given":"Ireneusz","family":"Jozwiak","sequence":"additional","affiliation":[{"name":"Military University of Land Forces, Wroclaw, Poland"}]}],"member":"320","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4663-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2915940"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411620080052"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050111"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3022799"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2017.8071288"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.06.004"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2019.00035"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECIT54077.2021.9641471"},{"volume-title":"Advances in computer science and ubiquitous computing","author":"Ji Hyunjung","key":"e_1_3_2_1_10_1","unstructured":"Hyunjung Ji , Donghwa Kim , Dongkyoo Shin , and Dongil Shin . 2017. A study on comparison of KDD CUP 99 and NSL-KDD using artificial neural network . In Advances in computer science and ubiquitous computing . Springer , 452--457. Hyunjung Ji, Donghwa Kim, Dongkyoo Shin, and Dongil Shin. 2017. A study on comparison of KDD CUP 99 and NSL-KDD using artificial neural network. In Advances in computer science and ubiquitous computing. Springer, 452--457."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.00-36"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Mobile and Wireless Technology. Springer, 223--230","author":"Kedziora Michal","year":"2017","unstructured":"Michal Kedziora , Yang-Wai Chow , and Willy Susilo . 2017 . Improved threat models for the security of encrypted and deniable file systems . In International Conference on Mobile and Wireless Technology. Springer, 223--230 . Michal Kedziora, Yang-Wai Chow, and Willy Susilo. 2017. Improved threat models for the security of encrypted and deniable file systems. In International Conference on Mobile and Wireless Technology. Springer, 223--230."},{"key":"e_1_3_2_1_13_1","volume-title":"International Journal of Network Security & Its Applications (IJNSA) Vol 11","author":"Kedziora Michal","year":"2019","unstructured":"Michal Kedziora , Paulina Gawin , Michal Szczepanik , and Ireneusz Jozwiak . 2019. Malware detection using machine learning algorithms and reverse engineering of android java code . International Journal of Network Security & Its Applications (IJNSA) Vol 11 ( 2019 ). Michal Kedziora, Paulina Gawin, Michal Szczepanik, and Ireneusz Jozwiak. 2019. Malware detection using machine learning algorithms and reverse engineering of android java code. International Journal of Network Security & Its Applications (IJNSA) Vol 11 (2019)."},{"volume-title":"Anomaly-based network intrusion detection using machine learning. Ph. D. Dissertation","author":"Labonne Maxime","key":"e_1_3_2_1_14_1","unstructured":"Maxime Labonne . 2020. Anomaly-based network intrusion detection using machine learning. Ph. D. Dissertation . Institut Polytechnique de Paris. Maxime Labonne. 2020. Anomaly-based network intrusion detection using machine learning. Ph. D. Dissertation. Institut Polytechnique de Paris."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214304"},{"key":"e_1_3_2_1_16_1","article-title":"Enhancing Anomaly Based Intrusion Detection Techniques for Virtualization in Cloud Computing Using Machine Learning","volume":"18","author":"Taj Muhammad Salman","year":"2020","unstructured":"Muhammad Salman Taj , Syed Irfan Ullah , Dr Abdus Salam , and Wajid Ullah Khan . 2020 . Enhancing Anomaly Based Intrusion Detection Techniques for Virtualization in Cloud Computing Using Machine Learning . International Journal of Computer Science and Information Security 18 , 5 (2020). Muhammad Salman Taj, Syed Irfan Ullah, Dr Abdus Salam, and Wajid Ullah Khan. 2020. Enhancing Anomaly Based Intrusion Detection Techniques for Virtualization in Cloud Computing Using Machine Learning. International Journal of Computer Science and Information Security 18, 5 (2020).","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT.2017.8284655"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO51393.2021.9596222"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1142\/9789811223334_0117"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAC.2017.8244075"}],"event":{"name":"MEDES '22: International Conference on Management of Digital EcoSystems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Venice Italy","acronym":"MEDES '22"},"container-title":["Proceedings of the 14th International Conference on Management of Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508397.3564830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508397.3564830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:36Z","timestamp":1750182576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508397.3564830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":22,"alternative-id":["10.1145\/3508397.3564830","10.1145\/3508397"],"URL":"https:\/\/doi.org\/10.1145\/3508397.3564830","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]},"assertion":[{"value":"2022-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}