{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:08:17Z","timestamp":1730344097697,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.23919\/mipro55190.2022.9803555","type":"proceedings-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T17:03:21Z","timestamp":1656349401000},"page":"1472-1477","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion detection using data mining \u2013 an overview of methods and their success"],"prefix":"10.23919","author":[{"given":"M.","family":"Ilijanic","sequence":"first","affiliation":[{"name":"University of Rijeka,Department of Informatics,Rijeka,Croatia"}]},{"given":"D.","family":"Jaksic","sequence":"additional","affiliation":[{"name":"University of Rijeka,Department of Informatics,Rijeka,Croatia"}]},{"given":"P.","family":"Poscic","sequence":"additional","affiliation":[{"name":"University of Rijeka,Department of Informatics,Rijeka,Croatia"}]}],"member":"263","reference":[{"key":"ref39","article-title":"A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms","volume":"4","author":"dhanabal","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"article-title":"Understanding Random Forest","year":"2019","author":"yiu","key":"ref38"},{"key":"ref33","first-page":"93","article-title":"Survey on Data Mining Techniques for Intrusion Detection System","volume":"1","author":"patond","year":"2014","journal-title":"International Journal of Research Studies in Science Engineering and Technology [IJRSSET]"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30507-8_13"},{"year":"0","key":"ref31","article-title":"Support Vector Machine Algorithm"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.12.174"},{"article-title":"Decision Trees","year":"0","author":"miertschin","key":"ref37"},{"year":"0","key":"ref36","article-title":"Naive Bayes Classifier Algorithm"},{"year":"0","key":"ref35","article-title":"Naive Bayes classification"},{"key":"ref34","article-title":"Survey on Data Mining Techniques in Intrusion Detection","volume":"2","author":"chauhan","year":"2011","journal-title":"Int J Eng Sci Res"},{"article-title":"Association Rules","year":"0","author":"lutkevich","key":"ref28"},{"article-title":"Cluster Analysis in Data Mining: Applications, Methods & Requirements","year":"2020","author":"sharma","key":"ref27"},{"article-title":"Association Rule Mining","year":"2018","author":"remanan","key":"ref29"},{"key":"ref2","article-title":"Intrusion Detection System using Data Mining","volume":"2","author":"mishra","year":"2014","journal-title":"i-manager's Journal on Computer Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17148\/IJARCCE.2015.4253"},{"key":"ref20","first-page":"286","article-title":"Effective Data mining techniques for Intrusion Detection and Prevention System","volume":"1","author":"chalak","year":"2011","journal-title":"International Conference on Advanced Computing Communication and Networks&#x2019;11"},{"journal-title":"Principles of Data Mining","year":"2007","author":"bramer","key":"ref22"},{"key":"ref21","first-page":"34","article-title":"OLAP TOOLS IN EDUCATION","volume":"4","author":"suboti?","year":"2013","journal-title":"Media Culture and Public Relations"},{"article-title":"5 Classification","year":"0","author":"concepts","key":"ref24"},{"journal-title":"Data Mining Techniques","year":"2001","author":"pujari","key":"ref23"},{"article-title":"Difference between Classification and Prediction in Data Mining - An Easy Guide in Just 3 Points","year":"2021","author":"sarangam","key":"ref26"},{"year":"0","key":"ref25","article-title":"Prediction"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2015.7359266"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICICI.2017.8365277"},{"key":"ref11","article-title":"Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges","author":"eian","year":"2020","journal-title":"Preprints"},{"key":"ref40","article-title":"Naive Bayesian networks in intrusion detection systems","author":"amor","year":"2003","journal-title":"The Fourteenth European Conference on Machine Learning Workshop ECML03 on Probabilistic Graphical Models for Classification"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872784"},{"year":"2008","key":"ref13","article-title":"DDoS napad"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14445\/22312803\/IJCTT-V43P118"},{"key":"ref15","article-title":"Efficient Classfier for R2L and U2R Attacks","volume":"45","author":"jeya","year":"2012","journal-title":"International Journal of Computer Applications"},{"year":"0","key":"ref16","article-title":"Site Scanning\/Probing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2013.08.08"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2018.01.005"},{"key":"ref4","first-page":"614","author":"han","year":"2012","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICGTSPICC.2016.7955369"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFRKM.2010.5466919"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.220"},{"key":"ref7","article-title":"Intrusion Detection System: A Survey Using Data Mining and Learning Methods","volume":"8","author":"sharma","year":"2017","journal-title":"Computer Engineering and Intelligent Systems"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2012.6158822"},{"key":"ref9","article-title":"Data Mining Techniques for Intrusion Detection: A Review","volume":"3","author":"abhaya","year":"2014","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/PACC.2011.5978878"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SISY.2017.8080566"},{"article-title":"Application of Data Mining to Network Instrusion Detection: Classifier Selection Model","year":"1970","author":"nguyen","key":"ref47"},{"key":"ref42","article-title":"Application of Machine Learning Approaches in Intrusion Detection System: A Survey","volume":"4","author":"haq","year":"2015","journal-title":"International Journal of Advanced Research in Artificial Intelligence"},{"key":"ref41","article-title":"Random Forests and Decision Trees","volume":"9","author":"ali","year":"2012","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2017.8022711"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.016"}],"event":{"name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","start":{"date-parts":[[2022,5,23]]},"location":"Opatija, Croatia","end":{"date-parts":[[2022,5,27]]}},"container-title":["2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9803295\/9803050\/09803555.pdf?arnumber=9803555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T20:41:16Z","timestamp":1659645676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9803555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":50,"URL":"https:\/\/doi.org\/10.23919\/mipro55190.2022.9803555","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}