{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:37:41Z","timestamp":1730209061394,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T00:00:00Z","timestamp":1670803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T00:00:00Z","timestamp":1670803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,12]]},"DOI":"10.1109\/commnet56067.2022.9993869","type":"proceedings-article","created":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T19:03:14Z","timestamp":1672426994000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Improving the IDS for BoT-IoT Dataset-Based Machine Learning Classifiers"],"prefix":"10.1109","author":[{"given":"Khalil","family":"Ibrahimi","sequence":"first","affiliation":[{"name":"Ibn Tofail University, Laboratory of Research in Informatics (LaRI),Faculty of Sciences,Kenitra,Morocco"}]},{"given":"Hafsa","family":"Benaddi","sequence":"additional","affiliation":[{"name":"Ibn Tofail University, Laboratory of Research in Informatics (LaRI),Faculty of Sciences,Kenitra,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2022.3186834"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2023.3274934"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA55076.2022.9782043"},{"issue":"3","key":"ref4","first-page":"155","article-title":"Role of machine learning in intrusion detection system: A systematic review","volume":"22","author":"Alhasani","year":"2022","journal-title":"International Journal of Computer Science & Network Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2018.8474576"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2019.8822120"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0971-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040524"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00103-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.30630\/joiv.6.2.990"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET-SIP-2254415.2022.9791586"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3078252"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1627-1_10"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/wincom.2018.8629718"},{"volume-title":"towards effective detection of botnet attacks using bot-iot dataset","year":"2021","author":"Srinivasa Gopalan","key":"ref16"},{"key":"ref17","article-title":"Spreading factor and rssi for localization in lora networks: A deep reinforcement learning approach","author":"Etiabi","year":"2022","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIBT52874.2022.9807766"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130276"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/nigercon54645.2022.9803086"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3161566"}],"event":{"name":"2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet)","start":{"date-parts":[[2022,12,12]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2022,12,14]]}},"container-title":["2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9993809\/9993813\/09993869.pdf?arnumber=9993869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T11:58:13Z","timestamp":1706788693000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9993869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/commnet56067.2022.9993869","relation":{},"subject":[],"published":{"date-parts":[[2022,12,12]]}}}