{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:33:01Z","timestamp":1730323981293,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,16]]},"DOI":"10.1145\/3474944.3474950","type":"proceedings-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T10:38:28Z","timestamp":1634294308000},"page":"35-39","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly Detection for Big Data Security: A Benchmark"],"prefix":"10.1145","author":[{"given":"Hamza","family":"Es-Samaali","sequence":"first","affiliation":[{"name":"Hassan II University, Morocco"}]},{"given":"Aissam","family":"Outchakoucht","sequence":"additional","affiliation":[{"name":"Hassan II University, Morocco"}]},{"given":"Siham","family":"Benhadou","sequence":"additional","affiliation":[{"name":"Hassan II University, Morocco"}]},{"given":"Oussama","family":"Mounnan","sequence":"additional","affiliation":[{"name":"Ibn Zohr University, Morocco"}]},{"given":"Anas","family":"Abou El Kalam","sequence":"additional","affiliation":[{"name":"Cadi Ayyad University, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"83","volume":"202","author":"Hamza Es-Samaali A.O.","unstructured":"1 . Hamza Es-Samaali , A.O. , Anas Abou El Kalam, Siham Benhadou, Machine Learning Enhanced Access Control for Big Data. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY , 202 0. 20(3): p. 83 - 91 . 1. Hamza Es-Samaali, A.O., Anas Abou El Kalam, Siham Benhadou, Machine Learning Enhanced Access Control for Big Data. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020. 20(3): p. 83-91.","journal-title":"Big Data. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993042.1993045"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"volume-title":"Practical machine learning: a new look at anomaly detection. 2014: \" O'Reilly Media","author":"Dunning T.","key":"e_1_3_2_1_4_1","unstructured":"4 . Dunning , T. and E. Friedman , Practical machine learning: a new look at anomaly detection. 2014: \" O'Reilly Media , Inc .\". 4. Dunning, T. and E. Friedman, Practical machine learning: a new look at anomaly detection. 2014: \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47578-3_5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"e_1_3_2_1_7_1","first-page":"179","volume":"197","author":"Hellman M.E.","unstructured":"7 . Hellman , M.E. , The nearest neighbor classification rule with a reject option. IEEE Transactions on Systems Science and Cybernetics , 197 0. 6(3): p. 179 - 185 . 7. Hellman, M.E., The nearest neighbor classification rule with a reject option. IEEE Transactions on Systems Science and Cybernetics, 1970. 6(3): p. 179-185.","journal-title":"Cybernetics"},{"key":"e_1_3_2_1_8_1","unstructured":"8\n . Zimmermann H.-J. Fuzzy set theory\u2014and its applications. 2011: Springer Science & Business Media. 8. Zimmermann H.-J. Fuzzy set theory\u2014and its applications. 2011: Springer Science & Business Media."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"volume-title":"IEEE INFOCOM 2004","year":"2004","author":"Kim Y.","key":"e_1_3_2_1_10_1","unstructured":"10 . Kim , Y. , PacketScore : Statistics-based overload control against distributed denial-of-service attacks . in IEEE INFOCOM 2004 . 2004 . IEEE. 10. Kim, Y., PacketScore: Statistics-based overload control against distributed denial-of-service attacks. in IEEE INFOCOM 2004. 2004. IEEE."},{"key":"e_1_3_2_1_11_1","first-page":"611","volume":"200","author":"He Z.","unstructured":"11 . He , Z. , X. Xu , and S. Deng , Squeezer: an efficient algorithm for clustering categorical data. Journal of Computer Science and Technology , 200 2. 17(5): p. 611 - 624 . 11. He, Z., X. Xu, and S. Deng, Squeezer: an efficient algorithm for clustering categorical data. Journal of Computer Science and Technology, 2002. 17(5): p. 611-624.","journal-title":"Technology"},{"key":"e_1_3_2_1_12_1","unstructured":"12\n . Amazon. Amazon EC2. 2020 [cited 2020 11\/28]; Available from: https:\/\/aws.amazon.com\/fr\/ec2\/instance-types\/p3\/. 12. Amazon. Amazon EC2. 2020 [cited 2020 11\/28]; Available from: https:\/\/aws.amazon.com\/fr\/ec2\/instance-types\/p3\/."},{"key":"e_1_3_2_1_13_1","unstructured":"13\n . GridSearchCV. [cited 2020 15\/06]; Available from: https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.model_selection.GridSearchCV.html. 13. GridSearchCV. [cited 2020 15\/06]; Available from: https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.model_selection.GridSearchCV.html."},{"key":"e_1_3_2_1_14_1","first-page":"29","volume":"198","author":"Hanley J.A.","unstructured":"14 . Hanley , J.A. and B.J. McNeil , The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology , 198 2. 143(1): p. 29 - 36 . 14. Hanley, J.A. and B.J. McNeil, The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology, 1982. 143(1): p. 29-36.","journal-title":"Radiology"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2011.45"}],"event":{"name":"BDET 2021: 2021 the 3rd International Conference on Big Data Engineering and Technology","acronym":"BDET 2021","location":"Singapore Singapore"},"container-title":["2021 the 3rd International Conference on Big Data Engineering and Technology (BDET)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474944.3474950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T13:25:45Z","timestamp":1673529945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474944.3474950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,16]]},"references-count":15,"alternative-id":["10.1145\/3474944.3474950","10.1145\/3474944"],"URL":"http:\/\/dx.doi.org\/10.1145\/3474944.3474950","relation":{},"subject":[],"published":{"date-parts":[[2021,1,16]]},"assertion":[{"value":"2021-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}