{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:05:59Z","timestamp":1756512359569,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T00:00:00Z","timestamp":1728518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,10]]},"DOI":"10.1145\/3686852.3686860","type":"proceedings-article","created":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T06:22:07Z","timestamp":1733638927000},"page":"7-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Study Using Microsoft Azure Auto Machine Learning to Detect Zero-Day Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7135-8884","authenticated-orcid":false,"given":"Joy","family":"Buuri","sequence":"first","affiliation":[{"name":"Grand Valley State University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6284-7472","authenticated-orcid":false,"given":"Samah","family":"Mansour","sequence":"additional","affiliation":[{"name":"Grand Valley State University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0368-7851","authenticated-orcid":false,"given":"Mostafa","family":"El-Said","sequence":"additional","affiliation":[{"name":"Grand Valley State University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0939-237X","authenticated-orcid":false,"given":"Xinli","family":"Wang","sequence":"additional","affiliation":[{"name":"Grand Valley State University, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Gilgit Baltistan, Pakistan: A comparative study of baseline, bayesian, and metaheuristic hyperparameter optimization techniques.\u00a0Sensors,\u00a023(15), 6843. https:\/\/www.mdpi.com\/1424-8220\/23\/15\/6843","author":"Abbas F.","year":"2023","unstructured":"Abbas, F., Zhang, F., Ismail, M., Khan, G., Iqbal, J., Alrefaei, A. F., & Albeshr, M. F. (2023). Optimizing machine-learning algorithms for landslide susceptibility mapping along the Karakoram Highway, Gilgit Baltistan, Pakistan: A comparative study of baseline, bayesian, and metaheuristic hyperparameter optimization techniques.\u00a0Sensors,\u00a023(15), 6843. https:\/\/www.mdpi.com\/1424-8220\/23\/15\/6843"},{"key":"e_1_3_2_1_2_1","volume-title":"Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline.\u00a0arXiv preprint arXiv:2403.03265. https:\/\/arxiv.org\/abs\/2403.03265","author":"Alevizos L.","year":"2024","unstructured":"Alevizos, L., & Dekker, M. (2024). Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline.\u00a0arXiv preprint arXiv:2403.03265. https:\/\/arxiv.org\/abs\/2403.03265"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Babu C. S. (2024). Adaptive AI for Dynamic Cybersecurity Systems: Enhancing Protection in a Rapidly Evolving Digital Landscape. In\u00a0Principles and Applications of Adaptive Artificial Intelligence\u00a0(pp. 52-72). IGI Global. https:\/\/www.igi-global.com\/chapter\/adaptive-ai-for-dynamic-cybersecurity-systems\/337688","DOI":"10.4018\/979-8-3693-0230-9.ch003"},{"key":"e_1_3_2_1_4_1","volume-title":"Machine learning in cybersecurity: Techniques and challenges.\u00a0European Journal of Technology,\u00a07(2), 1-14. https:\/\/www.ajpojournals.org\/journals\/index.php\/EJT\/article\/view\/1486","author":"Bharadiya J.","year":"2023","unstructured":"Bharadiya, J. (2023). Machine learning in cybersecurity: Techniques and challenges.\u00a0European Journal of Technology,\u00a07(2), 1-14. https:\/\/www.ajpojournals.org\/journals\/index.php\/EJT\/article\/view\/1486"},{"key":"e_1_3_2_1_5_1","volume-title":"The Role of Deceptive Defense in Cyber Strategy. https:\/\/apps.dtic.mil\/sti\/trecms\/pdf\/AD1213177.pdf","author":"Couillard M.","year":"2023","unstructured":"Couillard, M., Lindsay, J., & Arquilla, J. J. (2023). The Role of Deceptive Defense in Cyber Strategy. https:\/\/apps.dtic.mil\/sti\/trecms\/pdf\/AD1213177.pdf"},{"key":"e_1_3_2_1_6_1","volume-title":"Large Language Model Agent for Hyper-Parameter Optimization. arXiv preprint arXiv:2402.01881. https:\/\/arxiv.org\/abs\/2402.01881","author":"Liu S.","year":"2024","unstructured":"Liu, S., Gao, C., & Li, Y. (2024). Large Language Model Agent for Hyper-Parameter Optimization. arXiv preprint arXiv:2402.01881. https:\/\/arxiv.org\/abs\/2402.01881"},{"key":"e_1_3_2_1_7_1","volume-title":"Machine learning in cybersecurity: A review of threat detection and defense mechanisms. https:\/\/wjarr.com\/sites\/default\/files\/WJARR-2024-0315.pdf","author":"Okoli U. I.","year":"2024","unstructured":"Okoli, U. I., Obi, O. C., Adewusi, A. O., & Abrahams, T. O. (2024). Machine learning in cybersecurity: A review of threat detection and defense mechanisms. https:\/\/wjarr.com\/sites\/default\/files\/WJARR-2024-0315.pdf"},{"key":"e_1_3_2_1_8_1","volume-title":"A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems.\u00a0IEEE Access. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10480709\/","author":"Ozdogan E.","year":"2024","unstructured":"Ozdogan, E. (2024). A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems.\u00a0IEEE Access. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10480709\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Rane N. Choudhary S. & Rane J. (2024). Artificial Intelligence-Driven Corporate Finance: Enhancing Efficiency and Decision-Making through Machine Learning Natural Language Processing and Robotic Process Automation in Corporate Governance and Sustainability.\u00a0Natural Language Processing and Robotic Process Automation in Corporate Governance and Sustainability (February 8 2024). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4720591","DOI":"10.2139\/ssrn.4720591"},{"key":"e_1_3_2_1_10_1","volume-title":"Adaptive monitoring, detection, and response for agile digital service chains.\u00a0Computers & Security,\u00a0132, 103343. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404823002535","author":"Repetto M.","year":"2023","unstructured":"Repetto, M. (2023). Adaptive monitoring, detection, and response for agile digital service chains.\u00a0Computers & Security,\u00a0132, 103343. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404823002535"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Salehin I. Islam M. S. Saha P. Noman S. M. Tuni A. Hasan M. M. & Baten M. A. (2024). AutoML: A systematic review on automated machine learning with neural architecture search.\u00a0Journal of Information and Intelligence \u00a02(1) 52-81. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2949715923000604","DOI":"10.1016\/j.jiixd.2023.10.002"},{"key":"e_1_3_2_1_12_1","volume-title":"From zero-shot machine learning to zero-day attack detection.\u00a0International Journal of Information Security,\u00a022(4), 947-959. https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00676-0","author":"Sarhan M.","year":"2023","unstructured":"Sarhan, M., Layeghy, S., Gallagher, M., & Portmann, M. (2023). From zero-shot machine learning to zero-day attack detection.\u00a0International Journal of Information Security,\u00a022(4), 947-959. https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00676-0"},{"key":"e_1_3_2_1_13_1","volume-title":"End-to-end MLOps integration: a case study with ISS telemetry data. https:\/\/openhsu.ub.hsu-hh.de\/handle\/10.24405\/15316","author":"Steude H. S.","year":"2024","unstructured":"Steude, H. S., Geier, C., Moddemann, L., Creutzenberg, M., Pfeifer, J., Turk, S., & Niggemann, O. (2024). End-to-end MLOps integration: a case study with ISS telemetry data. https:\/\/openhsu.ub.hsu-hh.de\/handle\/10.24405\/15316"},{"key":"e_1_3_2_1_14_1","volume-title":"\u00a0\u201cArchitecting IoT Solutions on Azure. \" O'Reilly Media","author":"Stewart B.","year":"2024","unstructured":"Stewart, B. (2024).\u00a0\u201cArchitecting IoT Solutions on Azure. \" O'Reilly Media, Inc.TUG 2017. Institutional members of the LaTeX Users Group. Retrieved May 27, 2017 from http:\/\/wwtug.org\/instmem.html"},{"key":"e_1_3_2_1_15_1","volume-title":"A Review of Machine Learning Techniques in Agroclimatic Studies.\u00a0Agriculture,\u00a014(3), 481. https:\/\/www.mdpi.com\/2077-0472\/14\/3\/481","author":"Tamayo-Vera D.","year":"2024","unstructured":"Tamayo-Vera, D., Wang, X., & Mesbah, M. (2024). A Review of Machine Learning Techniques in Agroclimatic Studies.\u00a0Agriculture,\u00a014(3), 481. https:\/\/www.mdpi.com\/2077-0472\/14\/3\/481"},{"key":"e_1_3_2_1_16_1","volume-title":"An Empirical Study of Challenges in Machine Learning Asset Management.\u00a0arXiv preprint arXiv:2402.15990. https:\/\/arxiv.org\/abs\/2402.15990","author":"Zhao Z.","year":"2024","unstructured":"Zhao, Z., Chen, Y., Bangash, A. A., Adams, B., & Hassan, A. E. (2024). An Empirical Study of Challenges in Machine Learning Asset Management.\u00a0arXiv preprint arXiv:2402.15990. https:\/\/arxiv.org\/abs\/2402.15990"}],"event":{"name":"SIGITE '24: The 25th Annual Conference on Information Technology Education","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"El Paso TX USA","acronym":"SIGITE '24"},"container-title":["The 25th Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686852.3686860","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686852.3686860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T13:10:00Z","timestamp":1756473000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686852.3686860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,10]]},"references-count":16,"alternative-id":["10.1145\/3686852.3686860","10.1145\/3686852"],"URL":"https:\/\/doi.org\/10.1145\/3686852.3686860","relation":{},"subject":[],"published":{"date-parts":[[2024,10,10]]},"assertion":[{"value":"2024-12-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}