{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:10:01Z","timestamp":1755875401831,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,27]]},"DOI":"10.1145\/3640912.3640971","type":"proceedings-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T13:37:41Z","timestamp":1708609061000},"page":"294-297","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on SVM intrusion detection algorithm based on improved"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2302-0349","authenticated-orcid":false,"given":"Zihao","family":"Liu","sequence":"first","affiliation":[{"name":"Wuhan Research Institute of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8877-5173","authenticated-orcid":false,"given":"Yi","family":"Zhou","sequence":"additional","affiliation":[{"name":"Wuhan Research Institute of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"issue":"10","key":"e_1_3_2_1_1_1","first-page":"336","article-title":"Research on network intrusion detection algorithm based on machine learning [J]","volume":"39","author":"Zhifei WANG","year":"2022","unstructured":"ZHANG Zhifei, WANG Luman. Research on network intrusion detection algorithm based on machine learning [J]. Computer Applications and Software, 2022, 39(10): 336-343.","journal-title":"Computer Applications and Software"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14016\/j.cnki.1001-9227.2022.11.040"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.19753\/j.issn1001-1390.2022.12.023"},{"issue":"06","key":"e_1_3_2_1_4_1","first-page":"1011","volume":"45","author":"Junyan LU","year":"2023","unstructured":"CHEN Junyan, LU Xiantao, HUANG Xuefeng Heterogeneous Integrated Intrusion Detection Based on Double-Bagging Feature Dimensionality Reduction [J]. Computer Engineering and Science, 2023, 45(06):1011-1019.","journal-title":"Computer Engineering and Science"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"324","article-title":"An intrusion detection algorithm based on deep CNN [J]","volume":"37","author":"Yong","year":"2020","unstructured":"LI Yong, ZHANG Bo. An intrusion detection algorithm based on deep CNN [J]. Computer Applications and Software, 2020, 37(4):324-328.","journal-title":"Computer Applications and Software"},{"issue":"12","key":"e_1_3_2_1_6_1","first-page":"1258","article-title":"Network intrusion detection based on SMOTH and machine learning [J]","volume":"39","author":"Yang ZHANG","year":"2019","unstructured":"ZHANG Yang, ZHANG Tao, CHEN Jin, Network intrusion detection based on SMOTH and machine learning [J]. Transactions of Beijing Institute of Technology, 2019, 39(12):1258- 1262.","journal-title":"Transactions of Beijing Institute of Technology"},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"124","article-title":"Network intrusion detection based on machine learning algorithm [J]","volume":"41","author":"Zhang Xia","year":"2018","unstructured":"Zhang Xia. Network intrusion detection based on machine learning algorithm [J]. Modern Electronic Techniques, 2018, 41(3):124-127.","journal-title":"Modern Electronic Techniques"},{"issue":"3","key":"e_1_3_2_1_8_1","volume":"19","author":"Chen J","year":"2022","unstructured":"Chen J, Gao X, Deng R, Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(3).","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEI.2023.130704"},{"issue":"3","key":"e_1_3_2_1_10_1","volume":"19","author":"Chen J","year":"2022","unstructured":"Chen J, Gao X, Deng R, Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(3).","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_11_1","volume-title":"Computer Networks","author":"Christabelle A","year":"2021","unstructured":"Christabelle A, Dristi D, Syed A, Dataset of attacks on a live enterprise VoIP network for machine learning based intrusion detection and prevention systems [J]. Computer Networks, 2021, (prepublish)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2020.111128"}],"event":{"name":"CNML 2023: 2023 International Conference on Communication Network and Machine Learning","acronym":"CNML 2023","location":"Zhengzhou China"},"container-title":["Proceedings of the 2023 International Conference on Communication Network and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640912.3640971","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640912.3640971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:48:10Z","timestamp":1755874090000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640912.3640971"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,27]]},"references-count":12,"alternative-id":["10.1145\/3640912.3640971","10.1145\/3640912"],"URL":"https:\/\/doi.org\/10.1145\/3640912.3640971","relation":{},"subject":[],"published":{"date-parts":[[2023,10,27]]},"assertion":[{"value":"2024-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}