{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:04:29Z","timestamp":1730343869338,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728832","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:02Z","timestamp":1647030422000},"page":"279-284","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion Representation and Classification using Learning Algorithm"],"prefix":"10.23919","author":[{"given":"Babu Kaji","family":"Baniya","sequence":"first","affiliation":[{"name":"Grambling State University,College of Arts and Sciences,Department of Computer Science and Digital Technologies,Grambling,Louisiana,71245"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-030-17798-0_7"},{"key":"ref11","first-page":"1130","article-title":"Costbased modeling for fraud and intrusion detection: Results from the jam project","volume":"2","author":"stolfo","year":"2000","journal-title":"DISCEX"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/SMC.2014.6973950"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1155\/2020\/8617430"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICACT.2015.7224907"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1097\/JTO.0b013e3181ec173d"},{"key":"ref16","article-title":"Significance of reduced features for subcellular bioimage classification","author":"baniya","year":"2016","journal-title":"International Symposium on Bioinformatics Research and Applications (ISBRA)"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICMLA.2013.103"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/BLISS.2008.17"},{"key":"ref6","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","volume":"160","author":"kotsiantis","year":"2007","journal-title":"Emerging Artificial Intelligence Applications in Computer Engineering"},{"key":"ref5","article-title":"Machine Learning for Cyber Defense and Attack","author":"rege","year":"2018","journal-title":"7th International conference of Data Analytics Athens Greece"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s11042-014-2418-z"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine learning and deep learning methods for cybersecurity","volume":"6","author":"xin","year":"2018","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/CSAC.1999.816048"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/COMST.2018.2847722"},{"key":"ref9","article-title":"A Detailed Analysis of the KDD CUP 99 Data Set","author":"tavallaee","year":"2009","journal-title":"2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2022,2,13]]},"location":"PyeongChang Kwangwoon_Do, Korea, Republic of","end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728832.pdf?arnumber=9728832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:29:15Z","timestamp":1653341355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728832","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}