{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:30Z","timestamp":1750309590385,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723239","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"460-465","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Advancements in Machine Learning for Adaptive Intrusion Detection: A Comprehensive Review"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6947-4003","authenticated-orcid":false,"given":"Mirza Asif","family":"Mahmud","sequence":"first","affiliation":[{"name":"Department Of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9849-5720","authenticated-orcid":false,"given":"Khandaker Tabin","family":"Hasan","sequence":"additional","affiliation":[{"name":"Department Of Computer Science, American International University - Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9345-6450","authenticated-orcid":false,"given":"Razuan","family":"Karim","sequence":"additional","affiliation":[{"name":"Department Of Computer Science, American International University - Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MTICTI53925.2021.9664772"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Mousa Alalhareth and Sung-Chul Hong. 2023. An Adaptive Intrusion Detection System in the Internet of Medical Things Using Fuzzy-Based Learning. Sensors 23 22 (2023). 10.3390\/s23229247","DOI":"10.3390\/s23229247"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/HONET50430.2020.9322813"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Parthiban Aravamudhan and Kanimozhi T. 2023. A novel adaptive network intrusion detection system for internet of things. PLOS ONE 18 4 (04 2023) 1\u201329. 10.1371\/journal.pone.0283725","DOI":"10.1371\/journal.pone.0283725"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Lirim Ashiku and Cihan Dagli. 2021. Network Intrusion Detection System using Deep Learning. Procedia Computer Science 185 (2021) 239\u2013247. 10.1016\/j.procs.2021.05.025 Big Data IoT and AI for a Smarter Future.","DOI":"10.1016\/j.procs.2021.05.025"},{"key":"e_1_3_3_1_7_2","volume-title":"IFIP World Computer Congress - Security in Information Systems","author":"Bonif\u00e1cio\u00a0J\u00fanior Jos\u00e9\u00a0Maur\u00edcio","year":"1998","unstructured":"Jos\u00e9\u00a0Maur\u00edcio Bonif\u00e1cio\u00a0J\u00fanior, Edson dos\u00a0Santos Moreira, Adriano\u00a0Mauro Cansian, and Andr\u00e9 Carlos Ponce de Leon Ferreira\u00a0de Carvalho. 1998. An adaptive intrusion detection system using neural networks. In IFIP World Computer Congress - Security in Information Systems."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Alebachew Chiche and Million Meshesha. 2021. Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection. Journal of Computer Networks and Communications 2021 1 (2021) 8845540. 10.1155\/2021\/8845540 arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8845540","DOI":"10.1155\/2021\/8845540"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3487923.3487938"},{"key":"e_1_3_3_1_10_2","unstructured":"Dewan Farid N. Harbi E. Bahri Mohammad Zahidur\u00a0Rahman and C.\u00a0M. Rahman. [n. d.]. Attacks Classification in Adaptive Intrusion Detection Using Decision Tree. International Journal of Computer Science Issues (IJCSI) ([n. d.])."},{"key":"e_1_3_3_1_11_2","unstructured":"Heba\u00a0Ezzat Ibrahim Sherif\u00a0M. Badr and Mohamed\u00a0A. Shaheen. 2012. Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems. CoRR abs\/1210.7650 (2012). arXiv:https:\/\/arXiv.org\/abs\/1210.7650http:\/\/arxiv.org\/abs\/1210.7650"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149250"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2012.6421346"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I56241.2022.10072478"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/GCIoT47977.2019.9058410"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Hamid H.\u00a0Jebur Salima\u00a0Omar Asri\u00a0Ngadi. 2013. An Adaptive Intrusion Detection Model based on Machine Learning Techniques. International Journal of Computer Applications 70 7 (May 2013) 1\u20135. 10.5120\/11971-6640","DOI":"10.5120\/11971-6640"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNWC57852.2023.10127375"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/PARC59193.2024.10486386"},{"key":"e_1_3_3_1_20_2","unstructured":"Mahdi Soltani Khashayar Khajavi Mahdi\u00a0Jafari Siavoshani and Amir\u00a0Hossein Jahangir. 2023. A Multi-Agent Adaptive Deep Learning Framework for Online Intrusion Detection. arxiv:https:\/\/arXiv.org\/abs\/2303.02622\u00a0[cs. CR] https:\/\/arxiv.org\/abs\/2303.02622"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9344911"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:47Z","timestamp":1750298207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":20,"alternative-id":["10.1145\/3723178.3723239","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723239","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}