{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T15:51:40Z","timestamp":1726501900476},"reference-count":184,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3000179","type":"journal-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T20:12:38Z","timestamp":1591301558000},"page":"104650-104675","source":"Crossref","is-referenced-by-count":129,"title":["A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5195-8193","authenticated-orcid":false,"given":"Hanan","family":"Hindy","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9677-1445","authenticated-orcid":false,"given":"David","family":"Brosset","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1853-2921","authenticated-orcid":false,"given":"Ethan","family":"Bayne","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8393-3214","authenticated-orcid":false,"given":"Amar Kumar","family":"Seeam","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9150-6805","authenticated-orcid":false,"given":"Christos","family":"Tachtatzis","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6206-2229","authenticated-orcid":false,"given":"Robert","family":"Atkinson","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1849-5788","authenticated-orcid":false,"given":"Xavier","family":"Bellekens","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820092"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491578"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.05.002"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2017.07.002"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2018.00051"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.11.007"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1109-8"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.010"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314439"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8350994"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2798626"},{"key":"ref39","year":"2009","journal-title":"The Waikoto Internet Trace Storage Project Dataset"},{"key":"ref38","year":"2012","journal-title":"Intrusion Detection Evaluation Dataset (ISCXIDS2012)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140298"},{"key":"ref32","first-page":"323","article-title":"Measuring the impact of DDoS attacks on Web services-a realtime experimentation","volume":"14","author":"behal","year":"2016","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref31","first-page":"1","article-title":"Unified host and network data set","author":"turcotte","year":"2017","journal-title":"arXiv 1708 07518"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref36","author":"tobi","year":"2018","journal-title":"STA2018"},{"key":"ref35","year":"2014","journal-title":"Botnet dataset"},{"key":"ref34","first-page":"683","article-title":"Towards generating real-life datasets for network intrusion detection","volume":"17","author":"bhuyan","year":"2015","journal-title":"Int J Netw Secur"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7564-4_5"},{"key":"ref180","first-page":"2","article-title":"Intrusion detection system using an optimized kernel extreme learning machine and efficient features","volume":"45","author":"ghasemi","year":"2019","journal-title":"S?dhan?"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.3390\/sym12020203"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0637-6_40"},{"key":"ref28","year":"2017","journal-title":"CIC DoS Dataset"},{"key":"ref27","year":"2017","journal-title":"Intrusion detection evaluation dataset (cicids2017)"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref29","author":"creech","year":"2017","journal-title":"ADFA IDS Dataset"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58424-9_2"},{"key":"ref21","first-page":"23","article-title":"Intrusion detection systems (IDS) taxonomy-a short review","volume":"13","author":"amer","year":"2010","journal-title":"Defense Cyber Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2415763"},{"key":"ref23","first-page":"1","article-title":"Machine learning in cyber-security–problems, challenges and data sets","author":"amit","year":"2018","journal-title":"arXiv 1812 07858"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.01.008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref100","first-page":"1546","article-title":"Stochastic models for generating synthetic HTTP source traffic","volume":"3","author":"cao","year":"2004","journal-title":"Proc IEEE InfoCom"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.013"},{"key":"ref50","year":"2019","journal-title":"SCADA \/ ICS PCAP Files From 4SICS"},{"key":"ref51","first-page":"1","article-title":"Kharon dataset: Android malware under a microscope","author":"kiss","year":"2016","journal-title":"Learning from Authoritative Security Experiment Results"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947776"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2016.7808050"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2016.7860069"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2015.7219794"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ACOSIS.2016.7843930"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/IntelCIS.2015.7397274"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.06.022"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.009"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/QiR.2015.7374895"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"ref59","year":"2000","journal-title":"Defcon 8 10 and 11"},{"key":"ref58","first-page":"1","article-title":"On generating network traffic datasets with synthetic attacks for intrusion detection","author":"cordero","year":"2019","journal-title":"arXiv 1905 00304"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346912"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.009"},{"key":"ref55","year":"2018","journal-title":"Andromalshare"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref53","year":"2015","journal-title":"Android Botnet Dataset"},{"key":"ref52","year":"2017","journal-title":"Android Adware and General Malware Dataset"},{"key":"ref40","year":"2007","journal-title":"The CAIDA UCSD “DDoS Attack 2007” Dataset"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ICSITech.2017.8257156"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.141"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.340"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3106068"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ICITISEE.2017.8285566"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/NAFOSTED.2017.8108056"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2017.8343013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659700"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.170"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4108\/tridentcom.2008.3225"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICTS.2017.8265667"},{"key":"ref8","first-page":"1","article-title":"Shallow and deep networks intrusion detection system: A taxonomy and survey","author":"hodo","year":"2017","journal-title":"arXiv 1701 02145"},{"key":"ref49","year":"2016","journal-title":"VPN-nonVPN Dataset"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2016.36"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_19"},{"key":"ref9","article-title":"Anomaly-based intrusion detection by modeling probability distributions of flow characteristics","author":"atli","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12786-2_1"},{"key":"ref45","first-page":"186","volume":"14","author":"laso","year":"2017","journal-title":"Dataset of anomalies and malicious acts in a cyber-physical subsystem"},{"key":"ref48","year":"2017","journal-title":"Tor-nonTor Dataset"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.284"},{"key":"ref42","author":"hettich","year":"1999","journal-title":"The UCI KDD Archive"},{"key":"ref41","year":"2009","journal-title":"NSL-KDD Dataset"},{"key":"ref44","first-page":"1","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","author":"koroniotis","year":"2018","journal-title":"arXiv 1811 00701"},{"key":"ref43","year":"2000","journal-title":"MIT Lincoln Laboratory DARPA Evaluation Intrusion Detection"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.033"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2012.6252449"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.08.068"},{"key":"ref124","first-page":"37","article-title":"The combined approach for anomaly detection using neural networks and clustering techniques","volume":"2","author":"aneetha","year":"2012","journal-title":"International Journal of Computational Engineering Science"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.092"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-018-0074-y"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.05.004"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.009"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_42"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.013"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2011.5716518"},{"key":"ref74","article-title":"A database of computer attacks for the evaluation of intrusion detection systems","author":"kendall","year":"1999"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232404"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2013.391.403"},{"key":"ref134","first-page":"305","article-title":"A hybrid framework based on neural network MLP and k-means clustering for intrusion detection system","author":"lisehroodi","year":"2013","journal-title":"Proc 4th Int Conf Comput Inf"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.032"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.004"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2013.5106"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1192520"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.057"},{"key":"ref135","first-page":"338","article-title":"Detection of accuracy for intrusion detection system using neural network classifier","volume":"3","author":"devaraju","year":"2013","journal-title":"Int J Emerg Technol Adv Eng"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.05.021"},{"key":"ref137","first-page":"298","article-title":"Anomaly-based intrusion detection through k-means clustering and naives Bayes classification","author":"yassin","year":"2013","journal-title":"Proc 4th Int Conf Comput Inf"},{"key":"ref60","year":"2016","journal-title":"CAIDA DATA"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.03.008"},{"key":"ref62","first-page":"1","article-title":"Toward instrumenting network warfare competitions to generate labeled datasets","author":"sangster","year":"2009","journal-title":"Proceedings of CSEET"},{"key":"ref61","year":"2005","journal-title":"LBNL\/ICSI Enterprise Tracing Project"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04968-2_4"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523809"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046731"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666664"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.5120\/17447-5392"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"key":"ref68","first-page":"1","article-title":"KDD 1999 generation faults: A review and analysis","author":"tobi","year":"2018","journal-title":"Technical cyber security"},{"key":"ref144","first-page":"29","article-title":"A new clustering approach for anomaly intrusion detection","volume":"4","author":"ranjan","year":"2014","journal-title":"arXiv 1404 2772"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2888764"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.027"},{"key":"ref1","year":"2017","journal-title":"Cisco Visual Networking Index Forecast and Methodology 2016–2021"},{"key":"ref109","first-page":"83","article-title":"Novel intrusion detection using probabilistic neural network and adaptive boosting","volume":"6","author":"phuoc tran","year":"2009","journal-title":"arXiv 0911 0485"},{"key":"ref95","first-page":"1","article-title":"FLAME: A flow-level anomaly modeling engine","author":"brauckhoff","year":"2008","journal-title":"Proceedings of CSEET"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.06.138"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.036"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.3390\/s19143119"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.001"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3309194.3309199"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2008.06.001"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799854"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","article-title":"AdaBoost-based algorithm for network intrusion detection","volume":"38","author":"hu","year":"2008","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401915"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2006.10.002"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04843-2_32"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpc.2009.05.004"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2013.6649445"},{"key":"ref99","first-page":"1","article-title":"How real can synthetic network traffic be?","author":"hern\u00e1ndez-campos","year":"2004","journal-title":"ACM SigComm (Poster Session)"},{"key":"ref96","year":"2019","journal-title":"Official ID2T Repository ID2T Creates Labeled IT Network Datasets That Contain User Defined Synthetic Attacks"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502989"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762828"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref13","author":"narkhede","year":"2018","journal-title":"Understanding AUC—ROC Curve"},{"key":"ref14","first-page":"179","article-title":"Addressing the curse of imbalanced training sets: One-sided selection","volume":"97","author":"kubat","year":"1997","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref15","first-page":"1","article-title":"TESSERACT: Eliminating experimental bias in malware classification across space and time","author":"pendlebury","year":"2018","journal-title":"arXiv 1807 07838"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"key":"ref82","author":"mcclure","year":"2009","journal-title":"Hacking Exposed Network Security Secrets and Solutions"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.137"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11937807_13"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/511483.511485"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0244-0"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.07.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7871-2_75"},{"key":"ref83","first-page":"74","article-title":"Camouflage in malware: From encryption to metamorphism","volume":"12","author":"rad","year":"2012","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref114","first-page":"285","article-title":"Design network intrusion detection system using hybrid fuzzy-neural network","volume":"4","author":"jawhar","year":"2010","journal-title":"Int J Comput Sci Secur"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.017"},{"key":"ref116","first-page":"11","article-title":"Adaptive intrusion detection based on boosting and naive Bayesian classifier","volume":"24","author":"rahman","year":"2011","journal-title":"Int J Comput Appl"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20757-0_3"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.05.058"},{"key":"ref89","year":"2018","journal-title":"The Top 9 Network Security Threats of 2019"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.05.076"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.141"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2011.648.655"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.31"},{"key":"ref86","year":"2018","journal-title":"Malware Vs Viruses What’s the Difference?"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.02.003"},{"key":"ref88","author":"neely","year":"2017","journal-title":"2017 Threat Landscape Survey Users on the Front Line"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09108270.pdf?arnumber=9108270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:09:34Z","timestamp":1641949774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":184,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3000179","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}