{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:12:16Z","timestamp":1746072736198,"version":"3.40.4"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,12]]},"DOI":"10.1109\/ocit65031.2024.00128","type":"proceedings-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:29:52Z","timestamp":1745947792000},"page":"708-713","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Network Intrusion Detection Systems with Machine Learning: A Comparative Study with intrusion datasets"],"prefix":"10.1109","author":[{"given":"Akash","family":"Shrivastava","sequence":"first","affiliation":[{"name":"Information Technology National Institute of Technology,Raipur"}]},{"given":"Jitendra","family":"Kumar Rout","sequence":"additional","affiliation":[{"name":"National Institute of Technology,Computer Science and Engineering,Raipur,India"}]},{"given":"Santosh","family":"Kumar Sahu","sequence":"additional","affiliation":[{"name":"Oil and Natural Gas Corporation Limited (ONGC),Dehradun,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3233793"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.01.032"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13518"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i1.pp275-287"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v25.i2.pp1140-1150"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v12i2.4466"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v11i4.3835"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v11i3.3688"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i6.pp5216-5228"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i2.pp1498-1509"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i2.pp1599-1611"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v12i2.pp1869-1880"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1993\/1\/012029"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5753\/sbrc.2019.7413"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cybersecurity49315.2020.9138871"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v13.i1.pp711-721"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2014.6779523"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107720"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0201"}],"event":{"name":"2024 OITS International Conference on Information Technology (OCIT)","start":{"date-parts":[[2024,12,12]]},"location":"Vijayawada, India","end":{"date-parts":[[2024,12,14]]}},"container-title":["2024 OITS International Conference on Information Technology (OCIT)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx8\/10973619\/10973620\/10973753.pdf?arnumber=10973753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:55:48Z","timestamp":1745988948000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/10973753\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"references-count":21,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ocit65031.2024.00128","relation":{},"subject":[],"published":{"date-parts":[[2024,12,12]]}}}