{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:31:57Z","timestamp":1726014717299},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10650391","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["SG-RSRNN - Score Guided Robust Subspace Recovery-based Neural Network for Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Lu\u00eds","family":"Gon\u00e7alves","sequence":"first","affiliation":[{"name":"Universidade Federal de Pernambuco (UFPE),Centro de Informática,Recife,PE,Brazil,50740-560"}]},{"given":"Cleber","family":"Zanchettin","sequence":"additional","affiliation":[{"name":"Universidade Federal de Pernambuco (UFPE),Centro de Informática,Recife,PE,Brazil,50740-560"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/ett.4150"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/ett.4150"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s10489-021-02205-9"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICBDA49040.2020.9101325"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.knosys.2021.107086"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.5555\/1248547.1248548"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.jisa.2019.102419"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.2307\/2279372"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.jnca.2020.102767"},{"volume-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic","year":"2020","author":"Garcia","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1609\/aaai.v36i6.20629"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.ins.2019.10.069"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.3390\/electronics9101684"},{"key":"ref14","first-page":"277","article-title":"Deep autoencoder neural networks for detecting lateral movement in computer networks","volume-title":"Int. Conf. on Artificial Intelligence (ICAI)","author":"Holt"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.array.2023.100306"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/tnnls.2023.3281501"},{"volume-title":"ICLR","author":"Lai","article-title":"Robust subspace recovery layer for unsupervised anomaly detection","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/JPROC.2018.2853141"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICDM.2008.17"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ACCESS.2021.3056614"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.sciaf.2020.e00497"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.14722\/ndss.2018.23204"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/MilCIS.2015.7348942"},{"volume-title":"Distribution-free multiple comparisons","year":"1963","author":"Nemenyi","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/s11276-022-03214-3"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/3292500.3330871"},{"key":"ref27","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proceedings of the 35th International Conference on Machine Learning, volume 80 of Proceedings of Machine Learning Research","author":"Ruff"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.5220\/0006639801080116"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ICREST.2019.8644161"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ICCES48766.2020.9137987"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TKDE.2023.3270293"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.jnca.2022.103580"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ACCESS.2020.3001350"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/SIEDS.2017.7937701"},{"volume-title":"International conference on learning representations","author":"Zong","article-title":"Deep Autoencoding Gaussian Mixture Model for unsupervised anomaly detection","key":"ref35"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10650391.pdf?arnumber=10650391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T05:29:46Z","timestamp":1725946186000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10650391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10650391","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}