{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T16:19:19Z","timestamp":1764260359547,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2055557"],"award-info":[{"award-number":["2055557"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,2]]},"DOI":"10.1145\/3651671.3651738","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T18:55:50Z","timestamp":1717786550000},"page":"211-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Unlocking Deeper Understanding: Leveraging Explainable AI for API Anomaly Detection Insights"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9653-5887","authenticated-orcid":false,"given":"Mike","family":"Jones","sequence":"first","affiliation":[{"name":"Berryhill High School, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0755-9351","authenticated-orcid":false,"given":"Masrufa","family":"Bayesh","sequence":"additional","affiliation":[{"name":"Department of Computer Science , Oklahoma State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1306-4591","authenticated-orcid":false,"given":"Sharmin","family":"Jahan","sequence":"additional","affiliation":[{"name":"Department of Computer Science , Oklahoma State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTPE.2019.9778101"},{"volume-title":"Api security in large enterprises: Leveraging machine learning for anomaly detection. 2021 international symposium on networks, computers and communications (ISNCC)","author":"Gaspard Baye","key":"e_1_3_2_1_2_1","unstructured":"Gaspard Baye 2021. Api security in large enterprises: Leveraging machine learning for anomaly detection. 2021 international symposium on networks, computers and communications (ISNCC). IEEE."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Peter Kromkowski 2019. Evaluating statistical models for network traffic anomaly detection. In 2019 systems and information engineering design symposium (SIEDS).","DOI":"10.1109\/SIEDS.2019.8735594"},{"key":"e_1_3_2_1_4_1","volume-title":"Retracted: Network Anomaly Traffic Detection Method Based on Support Vector Machine. In 2016 International Conference on Smart City and Systems Engineering (ICSCSE).","author":"Yan Gao","year":"2016","unstructured":"Gao Yan. 2016. Retracted: Network Anomaly Traffic Detection Method Based on Support Vector Machine. In 2016 International Conference on Smart City and Systems Engineering (ICSCSE)."},{"key":"e_1_3_2_1_5_1","unstructured":"Tiko Huizinga. 2019. Using machine learning in network traffic analysis for penetration testing auditability. Available at: https:\/\/rp.os3.nl\/2018-2019\/p39\/report.pdf"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533378"},{"key":"e_1_3_2_1_8_1","unstructured":"Ravi Guntur. API security: Access behavior anomaly dataset. Available at: https:\/\/www.kaggle.com\/datasets\/tangodelta\/api-access-behaviour-anomaly-dataset"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03146-6_86"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32236-6_51"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00926-7"},{"key":"e_1_3_2_1_12_1","unstructured":"G. Vilone and L. Longo. 2020. Explainable artificial intelligence: a systematic review. arXiv preprint arXiv:2006.00093."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2018.8574124"},{"volume-title":"Proc. 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1135\u20131144","author":"Ribeiro M. T.","key":"e_1_3_2_1_14_1","unstructured":"M. T. Ribeiro, S. Singh, S., and C. Guestrin. 2016. Why should i trust you?: Explaining the predictions of any classife, In Proc. 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1135\u20131144."},{"key":"e_1_3_2_1_15_1","unstructured":"S. M. Lundberg G. E. Gabriel G. Erion and S. Lee. 2018. Consistent individualized feature attribution for tree ensembles arXiv preprint arXiv:1802.03888 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"C. Rudin. 2019. Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nature machine intelligence 1.5 206-215.","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Israel Cohen 2009. Pearson correlation coefficient. Noise reduction in speech processing 1-4.","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3587716.3587790"}],"event":{"name":"ICMLC 2024: 2024 16th International Conference on Machine Learning and Computing","acronym":"ICMLC 2024","location":"Shenzhen China"},"container-title":["Proceedings of the 2024 16th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651671.3651738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:18:27Z","timestamp":1755861507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,2]]},"references-count":18,"alternative-id":["10.1145\/3651671.3651738","10.1145\/3651671"],"URL":"https:\/\/doi.org\/10.1145\/3651671.3651738","relation":{},"subject":[],"published":{"date-parts":[[2024,2,2]]},"assertion":[{"value":"2024-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}