{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T09:01:33Z","timestamp":1777021293510,"version":"3.51.4"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,31]]},"DOI":"10.23919\/cycon55549.2022.9811014","type":"proceedings-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:32Z","timestamp":1656965372000},"page":"367-383","source":"Crossref","is-referenced-by-count":6,"title":["Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal"],"prefix":"10.23919","author":[{"given":"Maj. Emre","family":"Halisdemir","sequence":"first","affiliation":[{"name":"Strategy Researcher CCDCOE,Tallinn,Estonia"}]},{"given":"Hacer","family":"Karacan","sequence":"additional","affiliation":[{"name":"Gazi University,Ankara,Turkey"}]},{"given":"Mauno","family":"Pihelgas","sequence":"additional","affiliation":[{"name":"Technology Researcher CCDCOE,Tallinn,Estonia"}]},{"given":"Toomas","family":"Lepik","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology,Information Security Expert,Tallinn,Estonia"}]},{"given":"Sungbaek","family":"Cho","sequence":"additional","affiliation":[{"name":"Strategy Researcher CCDCOE,Tallinn,Estonia"}]}],"member":"263","reference":[{"key":"ref33","article-title":"Dataset: Traffic and Log Data Captured During a Cyber Defense Exercise&#x2019;","author":"tovar?\u00e1k","year":"2020","journal-title":"Zenodo"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527923"},{"key":"ref31","article-title":"Traffic and log data captured during a cyber defense exercise&#x2019;","volume":"31","author":"tovar?\u00e1k","year":"2020","journal-title":"Data in Brief"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795423"},{"key":"ref37","article-title":"Cyber Grand Challenge (CGC)","year":"2021","journal-title":"DARPA"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon51939.2021.9467801"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/1548512919886163"},{"key":"ref34","first-page":"1","article-title":"Machine Learning-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise&#x2019;","author":"k\u00e4nzig","year":"2019","journal-title":"11th International Conference on Cyber Conflict (CyCon)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.119"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2020.9020003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3050917"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2019.08.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2019.8925239"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972627"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356522"},{"key":"ref28","article-title":"KDDCUP 1999 Data&#x2019;","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2011.101"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IITSI.2010.72"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2015.7293349"},{"key":"ref29","article-title":"Coburg Intrusion Detection Data Sets&#x2019;","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AICI.2010.98"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPRIME.2013.6496489"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2010.73"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICNTE.2015.7029925"},{"key":"ref1","article-title":"Computer Security Threat Monitoring and Surveillance&#x2019;","author":"anderson","year":"1980","journal-title":"Technical Report James P Anderson Company"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.20532\/cit.2016.1002701"},{"key":"ref24","first-page":"361","article-title":"Flow-based benchmark data sets for intrusion detection&#x2019;","author":"ring","year":"2017","journal-title":"14th European Conference on Cyber Warfare and Security (ECCWS)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref26","first-page":"1","article-title":"UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems&#x2019;","author":"moustafa","year":"2015","journal-title":"Military Communications and Information Systems Conference (MilCIS)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"}],"event":{"name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2022,5,31]]},"end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810978\/9810902\/09811014.pdf?arnumber=9811014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:49:51Z","timestamp":1661809791000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9811014\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,31]]},"references-count":37,"URL":"https:\/\/doi.org\/10.23919\/cycon55549.2022.9811014","relation":{},"subject":[],"published":{"date-parts":[[2022,5,31]]}}}