{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:14:54Z","timestamp":1730283294007,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100014819","name":"U.S. Army Combat Capabilities Development Command (DEVCOM)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014819","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["USMA21050,USMA21056"],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9652959","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"1011-1016","source":"Crossref","is-referenced-by-count":8,"title":["A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models"],"prefix":"10.1109","author":[{"given":"Kevin","family":"Talty","sequence":"first","affiliation":[{"name":"United States Army,Germany"}]},{"given":"John","family":"Stockdale","sequence":"additional","affiliation":[{"name":"United States Army,Germany"}]},{"given":"Nathaniel D.","family":"Bastian","sequence":"additional","affiliation":[{"name":"Army Cyber Institute, U.S. Military Academy,New York"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2016.7496574"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2809665"},{"key":"ref3","first-page":"9","article-title":"An evaluation of native bayesian anti-spam filtering","volume":"11","author":"Androutsopoulos","year":"2000","journal-title":"Machine Learning in the New Information Age"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115782"},{"key":"ref6","article-title":"A taxonomy and terminology of adversarial machine learning, national institute of standard and technology","author":"Tabassi","year":"2019","journal-title":"arXiv"},{"key":"ref7","article-title":"Adversarial robustness toolbox v0.2.2","volume":"abs\/1807.01069","author":"Nicolae","year":"2018","journal-title":"CoRR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/0222052"},{"volume-title":"Designing, implementing, and analyzing a system for virus detection","year":"2006","author":"Nelson","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(97)00019-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44581-1_31"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:19990428"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1515\/9781400831050"},{"volume-title":"Linear Algebra and Learning from Data","year":"2019","author":"Strang","key":"ref15"},{"volume-title":"Python Machine Learning","year":"2019","author":"Raschka","key":"ref16"},{"issue":"6","key":"ref17","first-page":"446","article-title":"A study on nsl-kdd dataset for intrusion detection system based on classification algorithms","volume":"4","author":"Dhanabal","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"volume-title":"Towards deep learning models resistant to adversarial attacks","year":"2019","author":"Madry","key":"ref21"},{"volume-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","year":"2018","author":"Brendel","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09652959.pdf?arnumber=9652959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:21:52Z","timestamp":1727500912000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9652959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9652959","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}