{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T08:01:44Z","timestamp":1764403304854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605772.3624004","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T17:10:01Z","timestamp":1700586601000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid Explainable Intrusion Detection System: Global vs. Local Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2668-559X","authenticated-orcid":false,"given":"Harry Chandra","family":"Tanuwidjaja","sequence":"first","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6477-7770","authenticated-orcid":false,"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5659-1194","authenticated-orcid":false,"given":"Tsung-Nan","family":"Lin","sequence":"additional","affiliation":[{"name":"National Taiwan University, Taipei, Taiwan Roc"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0913-4588","authenticated-orcid":false,"given":"Boyi","family":"Lee","sequence":"additional","affiliation":[{"name":"National Applied Research Laboratories, Taipei, Taiwan Roc"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9616-3212","authenticated-orcid":false,"given":"Tao","family":"Ban","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Service AAG IT","year":"2023","unstructured":"AAG IT Service . 2023 . The latest 2023 cyber crime statistics (updated may 2023) . Retrieved May 10, 2023 from http:\/\/https:\/\/aag-it.com\/the-latest-cybercrime-statistics\/. AAG IT Service. 2023. The latest 2023 cyber crime statistics (updated may 2023). Retrieved May 10, 2023 from http:\/\/https:\/\/aag-it.com\/the-latest-cybercrime-statistics\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud55333.2022.00011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3216617"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11193079"},{"key":"e_1_3_2_1_7_1","volume-title":"Azzam Mourad, Hadi Otrok, and Mohsen Guizani.","author":"Arisdakessian Sarhad","year":"2022","unstructured":"Sarhad Arisdakessian , Omar Abdel Wahab , Azzam Mourad, Hadi Otrok, and Mohsen Guizani. 2022 . A survey on iot intrusion detection: federated learning, game theory, social psychology and explainable ai as future directions. IEEE Internet of Things Journal . Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, and Mohsen Guizani. 2022. A survey on iot intrusion detection: federated learning, game theory, social psychology and explainable ai as future directions. IEEE Internet of Things Journal."},{"key":"e_1_3_2_1_8_1","volume-title":"Ernesto Damiani, Chan Yeob Yeun, and Fatma Taher.","author":"Zhang Zhibo","year":"2022","unstructured":"Zhibo Zhang , Hussam Al Hamadi , Ernesto Damiani, Chan Yeob Yeun, and Fatma Taher. 2022 . Explainable artificial intelligence applications in cyber security: state-of-the-art in research. IEEE Access . Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, and Fatma Taher. 2022. Explainable artificial intelligence applications in cyber security: state-of-the-art in research. IEEE Access."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Marwa Keshk Nickolaos Koroniotis Nam Pham Nour Moustafa Benjamin Turnbull and Albert Y Zomaya. 2023. An explainable deep learning-enabled intrusion detection framework in iot networks. Information Sciences 119000.  Marwa Keshk Nickolaos Koroniotis Nam Pham Nour Moustafa Benjamin Turnbull and Albert Y Zomaya. 2023. An explainable deep learning-enabled intrusion detection framework in iot networks. Information Sciences 119000.","DOI":"10.1016\/j.ins.2023.119000"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3186589"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208573"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00926-7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/6634811","article-title":"Explainable artificial intelligence (xai) to enhance trust management in intrusion detection systems using decision tree model","volume":"2021","author":"Mahbooba Basim","year":"2021","unstructured":"Basim Mahbooba , Mohan Timilsina , Radhya Sahal , and Martin Serrano . 2021 . Explainable artificial intelligence (xai) to enhance trust management in intrusion detection systems using decision tree model . Complexity , 2021 , 1 -- 11 . Basim Mahbooba, Mohan Timilsina, Radhya Sahal, and Martin Serrano. 2021. Explainable artificial intelligence (xai) to enhance trust management in intrusion detection systems using decision tree model. Complexity, 2021, 1--11.","journal-title":"Complexity"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Jesse Ables Thomas Kirby William Anderson Sudip Mittal Shahram Rahimi Ioana Banicescu and Maria Seale. 2022. Creating an explainable intrusion detection system using self organizing maps. arXiv preprint arXiv:2207.07465.  Jesse Ables Thomas Kirby William Anderson Sudip Mittal Shahram Rahimi Ioana Banicescu and Maria Seale. 2022. Creating an explainable intrusion detection system using self organizing maps. arXiv preprint arXiv:2207.07465.","DOI":"10.1109\/SSCI51031.2022.10022255"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3188750"},{"key":"e_1_3_2_1_17_1","unstructured":"Shraddha Mane and Dattaraj Rao. 2021. Explaining network intrusion detection system using explainable ai framework. arXiv preprint arXiv:2103.07110.  Shraddha Mane and Dattaraj Rao. 2021. Explaining network intrusion detection system using explainable ai framework. arXiv preprint arXiv:2103.07110."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117144"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96308-8_96"},{"key":"e_1_3_2_1_20_1","unstructured":"Christoph Molnar. 2020. Interpretable machine learning. Lulu. com.  Christoph Molnar. 2020. Interpretable machine learning. Lulu. com."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605772.3624004","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605772.3624004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:19Z","timestamp":1750178179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605772.3624004"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":20,"alternative-id":["10.1145\/3605772.3624004","10.1145\/3605772"],"URL":"https:\/\/doi.org\/10.1145\/3605772.3624004","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}