{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:07Z","timestamp":1750220107634,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010667","name":"H2020 Industrial Leadership","doi-asserted-by":"publisher","award":["957286"],"award-info":[{"award-number":["957286"]}],"id":[{"id":"10.13039\/100010667","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,15]]},"DOI":"10.1145\/3528580.3532840","type":"proceedings-article","created":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T16:22:40Z","timestamp":1658420560000},"page":"53-56","source":"Crossref","is-referenced-by-count":0,"title":["Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach"],"prefix":"10.1145","author":[{"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[{"name":"Institute of Telecommunications, Bydgoszcz University of Science and Technology, Poland and ITTI Sp z o.o., Poland"}]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, Bydgoszcz University of Science and Technology, Poland and ITTI Sp z o.o., Poland"}]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, Bydgoszcz University of Science and Technology, Poland and FernUniversitat, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100365"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"e_1_3_2_1_3_1","volume-title":"2016 International Research Conference on Engineering and Technology (2016 IRCET). Higher Education Forum.","author":"Aminanto Erza","year":"2016","unstructured":"Erza Aminanto and Kwangjo Kim . 2016 . Deep learning in intrusion detection system: An overview . In 2016 International Research Conference on Engineering and Technology (2016 IRCET). Higher Education Forum. Erza Aminanto and Kwangjo Kim. 2016. Deep learning in intrusion detection system: An overview. In 2016 International Research Conference on Engineering and Technology (2016 IRCET). Higher Education Forum."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048319"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02014-x"},{"key":"e_1_3_2_1_6_1","volume-title":"IoT Cybersecurity in 2022: Vulnerabilities & Countermeasures. AI Multiple","author":"Eshghi Bardia","year":"2022","unstructured":"Bardia Eshghi . 2022. IoT Cybersecurity in 2022: Vulnerabilities & Countermeasures. AI Multiple ( 2022 ). ( Accessed on 03\/11\/2022). Bardia Eshghi. 2022. IoT Cybersecurity in 2022: Vulnerabilities & Countermeasures. AI Multiple (2022). (Accessed on 03\/11\/2022)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"e_1_3_2_1_8_1","unstructured":"Elike Hodo Xavier Bellekens Andrew Hamilton Christos Tachtatzis and Robert Atkinson. 2017. Shallow and deep networks intrusion detection system: A taxonomy and survey. arXiv preprint arXiv:1701.02145(2017).  Elike Hodo Xavier Bellekens Andrew Hamilton Christos Tachtatzis and Robert Atkinson. 2017. Shallow and deep networks intrusion detection system: A taxonomy and survey. arXiv preprint arXiv:1701.02145(2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBIS.2017.8275095"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470091"},{"key":"e_1_3_2_1_11_1","first-page":"3","article-title":"Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.J","volume":"12","author":"Komisarek Mikolaj","year":"2021","unstructured":"Mikolaj Komisarek , Marek Pawlicki , Rafal Kozik , and Michal Choras . 2021 . Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.J . Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 , 1(2021), 3 \u2013 19 . Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, and Michal Choras. 2021. Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12, 1(2021), 3\u201319.","journal-title":"Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"e_1_3_2_1_12_1","volume-title":"Cost-sensitive distributed machine learning for netflow-based botnet activity detection. Security and Communication Networks 2018","author":"Kozik Rafa\u0142","year":"2018","unstructured":"Rafa\u0142 Kozik , Marek Pawlicki , and Micha\u0142 Chora\u015b . 2018. Cost-sensitive distributed machine learning for netflow-based botnet activity detection. Security and Communication Networks 2018 ( 2018 ). Rafa\u0142 Kozik, Marek Pawlicki, and Micha\u0142 Chora\u015b. 2018. Cost-sensitive distributed machine learning for netflow-based botnet activity detection. Security and Communication Networks 2018 (2018)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3122009.3242042"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782159"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 4th International Conference on Information Systems Security and Privacy -","volume":"116","author":"Sharafaldin Iman","unstructured":"Iman Sharafaldin ., Arash\u00a0Habibi Lashkari ., and Ali\u00a0 A. Ghorbani .2018. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization . In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,. INSTICC, SciTePress, 108\u2013 116 . https:\/\/doi.org\/10.5220\/0006639801080116 Iman Sharafaldin., Arash\u00a0Habibi Lashkari., and Ali\u00a0A. Ghorbani.2018. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,. INSTICC, SciTePress, 108\u2013116. https:\/\/doi.org\/10.5220\/0006639801080116"},{"key":"e_1_3_2_1_17_1","volume-title":"Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information. (Accessed on 03\/11\/2022).","author":"U.S. Department of Health and Human Services Office for Civil Rights.","year":"2022","unstructured":"U.S. Department of Health and Human Services Office for Civil Rights. 2022 . Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information. (Accessed on 03\/11\/2022). U.S. Department of Health and Human Services Office for Civil Rights. 2022. Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information. (Accessed on 03\/11\/2022)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Rahul Vigneswaran R. Vinayakumar K.\u00a0P. Soman and Prabaharan Poornachandran. 2018. Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security. 2018 9th International Conference on Computing Communication and Networking Technologies (ICCCNT)(2018) 1\u20136.  Rahul Vigneswaran R. Vinayakumar K.\u00a0P. Soman and Prabaharan Poornachandran. 2018. Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security. 2018 9th International Conference on Computing Communication and Networking Technologies (ICCCNT)(2018) 1\u20136.","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904620"}],"event":{"name":"EICC 2022: European Interdisciplinary Cybersecurity Conference","acronym":"EICC 2022","location":"Barcelona Spain"},"container-title":["EICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528580.3532840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3528580.3532840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:33Z","timestamp":1750183833000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528580.3532840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,15]]},"references-count":19,"alternative-id":["10.1145\/3528580.3532840","10.1145\/3528580"],"URL":"https:\/\/doi.org\/10.1145\/3528580.3532840","relation":{},"subject":[],"published":{"date-parts":[[2022,6,15]]}}}