{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:15Z","timestamp":1750309395736,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,24]]},"DOI":"10.1145\/3696673.3723092","type":"proceedings-article","created":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T15:11:23Z","timestamp":1746717083000},"page":"297-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Study of Deep learning Architectures for Network Intrusion Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8717-3779","authenticated-orcid":false,"given":"Bimal","family":"Parakkal","sequence":"first","affiliation":[{"name":"Engineering Management and Systems Engineering, The George Washington University, Washington, DC, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4584-4018","authenticated-orcid":false,"given":"Thomas","family":"Mazzuchi","sequence":"additional","affiliation":[{"name":"Engineering Management and Systems Engineering, The George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7287-4415","authenticated-orcid":false,"given":"Shahram","family":"Sarkani","sequence":"additional","affiliation":[{"name":"Engineering Management and Systems Engineering, The George Washington University, Washington, DC, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC48513.2020.9064976"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3085194"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114520"},{"key":"e_1_3_2_1_5_1","unstructured":"Yury Gorishniy Ivan Rubachev Valentin Khrulkov and Artem Babenko. 2023. Revisiting Deep Learning Models for Tabular Data. arXiv:2106.11959 https:\/\/arxiv.org\/abs\/2106.11959"},{"key":"e_1_3_2_1_6_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2015. Deep Residual Learning for Image Recognition. arXiv:1512.03385 https:\/\/arxiv.org\/abs\/1512.03385"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_1_8_1","volume-title":"Anna Veronika Dorogush, and Andrey Gulin","author":"Prokhorenkova Liudmila","year":"2018","unstructured":"Liudmila Prokhorenkova, Gleb Gusev, Aleksandr Vorobev, Anna Veronika Dorogush, and Andrey Gulin. 2018. CatBoost: Unbiased Boosting with Categorical Features. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_1_9_1","volume-title":"Tabular Data: Deep Learning is Not All You Need. arXiv:2106.03253 https:\/\/arxiv.org\/abs\/2106.03253","author":"Shwartz-Ziv Ravid","year":"2021","unstructured":"Ravid Shwartz-Ziv and Amitai Armon. 2021. Tabular Data: Deep Learning is Not All You Need. arXiv:2106.03253 https:\/\/arxiv.org\/abs\/2106.03253"},{"volume-title":"Computer Networks and Inventive Communication Technologies, S. Smys, Ram Palanisamy, \u00c1lvaro Rocha, and Grigorios N","author":"Usha G.","key":"e_1_3_2_1_10_1","unstructured":"G. Usha, Mohak Narang, and Akash Kumar. 2021. Detection and Classification of Distributed DoS Attacks Using Machine Learning. In Computer Networks and Inventive Communication Technologies, S. Smys, Ram Palanisamy, \u00c1lvaro Rocha, and Grigorios N. Beligiannis (Eds.). Springer Nature Singapore, Singapore, 985--1000."}],"event":{"name":"ACMSE 2025: 2025 ACM Southeast Conference","acronym":"ACMSE 2025","location":"Southeast Missouri State University Cape Girardeau MO USA"},"container-title":["Proceedings of the 2025 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696673.3723092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696673.3723092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:44Z","timestamp":1750294664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696673.3723092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,24]]},"references-count":10,"alternative-id":["10.1145\/3696673.3723092","10.1145\/3696673"],"URL":"https:\/\/doi.org\/10.1145\/3696673.3723092","relation":{},"subject":[],"published":{"date-parts":[[2025,4,24]]},"assertion":[{"value":"2025-05-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}