{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:41:30Z","timestamp":1730342490958,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,30]]},"DOI":"10.23919\/contel52528.2021.9495962","type":"proceedings-article","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T20:55:17Z","timestamp":1627678517000},"page":"129-133","source":"Crossref","is-referenced-by-count":0,"title":["Using Approximation of Standard Deviation and Variance in Flow Features for Efficient Intrusion Detection"],"prefix":"10.23919","author":[{"given":"Dora","family":"Puselj","sequence":"first","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]},{"given":"Lovro","family":"Katic","sequence":"additional","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]},{"given":"Dominik","family":"Ostroski","sequence":"additional","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]},{"given":"Ivona","family":"Brajdic","sequence":"additional","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]},{"given":"Karlo","family":"Slovenec","sequence":"additional","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666450"},{"journal-title":"Scikit-Learn","year":"2021","key":"ref12"},{"key":"ref13","first-page":"11","article-title":"Evaluation metrics for intrusion detection systems-a study","volume":"2","author":"kumar","year":"2014","journal-title":"EVAluation"},{"journal-title":"NSL-KDD Dataset","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"journal-title":"Intrusion Detection & Prevention","year":"2010","author":"scarfone","key":"ref4"},{"article-title":"Most companies take over six months to detect data breaches","year":"2015","author":"osborne","key":"ref3"},{"journal-title":"Data-Plane Development Kit","year":"2021","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031206"},{"article-title":"How to estimate the standard deviation with the range rule","year":"0","author":"taylor","key":"ref7"},{"article-title":"Cybercrime ramps up amid coronavirus chaos, costing companies billions","year":"2020","author":"sheng","key":"ref2"},{"article-title":"Covid-19 news: Fbi reports 300% increase in reported cybercrimes","year":"2020","author":"walter","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/fi12030044"}],"event":{"name":"2021 16th International Conference on Telecommunications (ConTEL)","start":{"date-parts":[[2021,6,30]]},"location":"Zagreb, Croatia","end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 16th International Conference on Telecommunications (ConTEL)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9495953\/9495954\/09495962.pdf?arnumber=9495962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:35:28Z","timestamp":1659483328000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9495962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/contel52528.2021.9495962","relation":{},"subject":[],"published":{"date-parts":[[2021,6,30]]}}}