{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:18Z","timestamp":1730213718636,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361404","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"1064-1071","source":"Crossref","is-referenced-by-count":0,"title":["LIDarknet: Experimenting the Power of Ensemble Learning in the Classification of Network Traffic"],"prefix":"10.1109","author":[{"given":"Nabil","family":"Marzoug","sequence":"first","affiliation":[{"name":"National School of Applied Sciences-Safi, Cadi Ayyad University,Morocco"}]},{"given":"Khidhr","family":"Halab","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences-Safi, Cadi Ayyad University,Morocco"}]},{"given":"Younes","family":"Mamma","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences-Safi, Cadi Ayyad University,Morocco"}]},{"given":"Fadoua","family":"Khennou","sequence":"additional","affiliation":[{"name":"Perception, Robotics, and Intelligent Machines, Université de Moncton,Canada"}]},{"given":"Othmane","family":"El Meslouhi","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences-Safi, Cadi Ayyad University,SARS Group,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA220323"},{"journal-title":"DNM Archive","year":"2023","author":"Branwen","key":"ref2"},{"issue":"4","key":"ref3","article-title":"A Mysterious and Darkside of The Darknet: A Qualitative Study","volume":"18","author":"Anjum","year":"2021","journal-title":"Webology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41287-6_5"},{"volume-title":"Machine Learning in Cybersecurity","year":"2023","key":"ref5"},{"volume-title":"Machine Learning in Cybersecurity","year":"2023","key":"ref6"},{"volume-title":"CIC Darknet2020 Dataset","year":"2020","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3442520.3442521"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105000"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MOCAST52088.2021.9493386"},{"volume-title":"Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural networks framework","year":"2021","author":"Demertzis","key":"ref11","doi-asserted-by":"crossref","DOI":"10.3390\/electronics10070781"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00064"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103098"},{"volume-title":"What is a Good F1 Score","year":"2023","author":"Allwright","key":"ref14"},{"volume-title":"Random Forest - Overview","year":"2023","key":"ref15"},{"journal-title":"Introduction to SHAP Values and Their Application in Machine Learning","year":"2023","key":"ref16"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361404.pdf?arnumber=10361404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:44:57Z","timestamp":1705092297000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361404\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361404","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}