{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:31:31Z","timestamp":1725766291168},"reference-count":0,"publisher":"SCITEPRESS - Science and Technology Publications","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.5220\/0012598400003705","type":"proceedings-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T19:14:53Z","timestamp":1714677293000},"page":"149-156","source":"Crossref","is-referenced-by-count":0,"title":["Data Sets for Cyber Security Machine Learning Models: A Methodological Approach"],"prefix":"10.5220","author":[{"given":"Innocent","family":"Mbona","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Pretoria, Lynwood Road, Pretoria, South Africa, --- Select a Country ---"}]},{"given":"Jan","family":"Eloff","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Pretoria, Lynwood Road, Pretoria, South Africa, --- Select a Country ---"}]}],"member":"3171","event":{"name":"9th International Conference on Internet of Things, Big Data and Security","start":{"date-parts":[[2024,4,28]]},"location":"Angers, France","end":{"date-parts":[[2024,4,30]]}},"container-title":["Proceedings of the 9th International Conference on Internet of Things, Big Data and Security"],"original-title":["Data Sets for Cyber Security Machine Learning Models: A Methodological Approach"],"deposited":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T16:41:58Z","timestamp":1717432918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0012598400003705"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":0,"URL":"https:\/\/doi.org\/10.5220\/0012598400003705","relation":{},"subject":[],"published":{"date-parts":[[2024]]}}}