{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:03:46Z","timestamp":1730343826829,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,7]]},"DOI":"10.23919\/icact51234.2021.9370933","type":"proceedings-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T16:59:49Z","timestamp":1615395589000},"page":"279-284","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion Representation and Classification using Learning Algorithm"],"prefix":"10.23919","author":[{"given":"Babu Kaji","family":"Baniya","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17798-0_7"},{"key":"ref11","first-page":"1130","article-title":"Cost-based modeling for fraud and intrusion detection: Results from the jam project","volume":"2","author":"stolfo","year":"2000","journal-title":"DISCEX"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2014.6973950"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8617430"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2015.7224907"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1097\/JTO.0b013e3181ec173d"},{"key":"ref16","article-title":"Significance of reduced features for subcellular bioimage classification","author":"baniya","year":"2016","journal-title":"International Symposium on Bioinformatics Research and Applications (ISBRA)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.103"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BLISS.2008.17"},{"key":"ref6","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","volume":"160","author":"kotsiantis","year":"2007","journal-title":"Emerging Artificial Intelligence Applications in Computer Engineering"},{"key":"ref5","article-title":"Machine Learning for Cyber Defense and Attack","author":"rege","year":"2018","journal-title":"7th International conference of Data Analytics"},{"key":"ref8","first-page":"3013","volume":"75","author":"baniya","year":"2016","journal-title":"Importance of audio feature reduction in automatic music genre classification"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816048"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2847722"},{"key":"ref9","article-title":"A Detailed Analysis of the KDD CUP 99 Data Set","author":"tavallaee","year":"0","journal-title":"2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"}],"event":{"name":"2021 23rd International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2021,2,7]]},"location":"PyeongChang, Korea (South)","end":{"date-parts":[[2021,2,10]]}},"container-title":["2021 23rd International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9370342\/9370365\/09370933.pdf?arnumber=9370933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T19:08:58Z","timestamp":1621278538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9370933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/icact51234.2021.9370933","relation":{},"subject":[],"published":{"date-parts":[[2021,2,7]]}}}