<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Novel Intrusion Detection System for 5G 1</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Maksim</forename><surname>Iavich</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Caucasus University</orgName>
								<address>
									<addrLine>1 Paata Saakadze St</addrLine>
									<postCode>0132</postCode>
									<settlement>Tbilisi</settlement>
									<country key="GE">Georgia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Avtandili</forename><surname>Gagnidze</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">East European University</orgName>
								<address>
									<addrLine>4 Shatili St</addrLine>
									<postCode>0178</postCode>
									<settlement>Tbilisi</settlement>
									<country key="GE">Georgia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giorgi</forename><surname>Iashvili</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Caucasus University</orgName>
								<address>
									<addrLine>1 Paata Saakadze St</addrLine>
									<postCode>0132</postCode>
									<settlement>Tbilisi</settlement>
									<country key="GE">Georgia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sergei</forename><surname>Simonov</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">East European University</orgName>
								<address>
									<addrLine>4 Shatili St</addrLine>
									<postCode>0178</postCode>
									<settlement>Tbilisi</settlement>
									<country key="GE">Georgia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Razvan</forename><surname>Bocu</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Transilvania University of Brasov</orgName>
								<address>
									<postCode>500036</postCode>
									<settlement>Brasov</settlement>
									<country key="RO">Romania</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Novel Intrusion Detection System for 5G 1</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">FB568C1327D8570637032335525CCB41</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T21:40+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>5G</term>
					<term>security</term>
					<term>intrusion detection systems</term>
					<term>ids</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The telecommunication industry is majorly transforming towards 5G networks. It needs to satisfy the needs of the new and existing users. The users and the customers need much better quality of the corresponding services and they need the corresponding security in order to secure the transmitting data and other services. Therefore, the mobile leading networks must provide much better quality of an experience and security, and they must improve the performance for the services they provide. Novel services envisioned by 5G, new networking, service deployment, the new processing technologies and the storage is required. The mentioned technologies will involve the new security problems for the 5G systems. The world scientists are seriously working on analyzing the 5G security. The researchers have identified the existing problems of 5G systems. Our analysis illustrates the basics reasons of security problems in 5G. The researchers have found the vulnerabilities in 5G, which give the attackers opportunity to integrate the malicious code and to run it. MiTM, MNmap and Battery drain attacks can be successfully implemented on 5G.</p><p>Our paper analyzes an existing security problems of 5G. As the result, we offer the new Intrusion Detection System using machine-learning approaches. The paper offers an integration of this intrusion detection systems into an existing 5G architecture. We offer the methodology and a pseudo code of this system.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The scale of the traffic needed for the wireless networks and the quantity of mobile and IoT devices are enhancing very fast, because of the different factors. The telecommunication industry is majorly transforming towards 5G networks and it has to satisfy the requirements of the target users. The 5G wireless networks must provide very high data rates and much higher coverage by means of dense base station deployment. It must have high capacity, much better QoS and it must have the very small latency. All this will involve the new technologies, and, as expected, these technologies cause new security problems for the 5G systems. The scientists are analyzing the security of 5G technology and they have successfully discovered some of the security problems.</p><p>5G will deal with the critical infrastructure, which requires rather high security level to ensure security of the critical infrastructure and of the whole society. For the instance, a security attack on the hypothetical online power supply system is critical for the electronic and electrical systems. As we can see, it is very important to analyze and emphasize the existing security problems in 5G networks and to offer the novel solution, which will make them secure. We have analyzed the difference between 5G and 4G security architecture These architectures are pretty much similar. The network nodes in 5G and 4G that are needed for security, and the communication links have very much in common. The security mechanisms of these systems can be grouped like following: One group contains the mechanisms used to offer users the safe access to the different services and to make the system safe against the vulnerabilities connected with an air interface, that can be located between some device and the radio node. The second group contains other safety mechanisms for the network access. These mechanisms are needed to transfer the signaling and user's data from the nodes of radio to the core network. The security architecture of 5G and 4G is shown on Fig. <ref type="figure">1</ref> Figure <ref type="figure">1</ref>: Security architecture of 5G and 4G</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Intrusion detection systems</head><p>Nowadays, ten years ago and even at the very beginning of "IT revolution", cyber-defense systems held special place and that's logical: nobody really wants to be hacked. Security specialists have used several different tools to provide users protection. Some of these tools are: antiviruses, firewalls, IDS (intrusion detection systems) and IPS (intrusion prevention systems). Let's take a brief look at each of them. Antivirus is a software which is installed on the host machine and is checking system processes for a suspicious activity. Firewall is a software which is, the most often, installed between two networks and analyses a network traffic blocking the suspicious one. As for the intrusion detection systems, these pieces of software are targeted on analyzing network traffic and checking if there is any suspicious activity in there. Intrusion detection systems are different from Firewall. Firewall controls traffic between two networks but if someone performs attack inside the network, the firewall will not be able to identify it. For a purpose of fortifying our network, we can add an intrusion detection system inside that network, which will sniff for traffic and send out an alert that something is wrong. By itself, an intrusion prevention system does not perform any action, it only can notify us about malicious traffic and log the incident to the file. The one who takes care "about" bad traffic is an IPS [], which stands for intrusion prevention system. This piece of software receives the alarm and perform corresponding action whether it will be dropping a packet or letting it to the quarantine. In addition, it is not necessary to have two separate devices for IDS and IPS, both of them can be integrated in the router. Therefore, as we can see, IDS and IPS are just a specific software, which help us extending our security. As for the IDS role in the 5G infrastructure, it can help us detecting DoS and software defined (brute force for example) attacks on the fly, even before the data is delivered to its destination. Of course, there will be some problems during the implementation, because such a system will require computing power, which is not really common if we speak about non-core segment of the system. A lot of concurrent traffic has to be analyzed at the one unit of time, that's why a deployment of the IDS is so important.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Novel Security mechanism</head><p>Our idea is to integrate the new server software with the IDS embedded into it to the 5G base station. The visualization of the approach is illustrated on the figure <ref type="figure" target="#fig_0">2</ref>. Modern 5G intrusion detection systems are well known for using a KDD99 <ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref> dataset and machine learning algorithms <ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref>. A few words about this technology: Machine learning is a methodology of receiving processed output based on the input, for example: we supply the model (model is specific neural network which processes the input and gives us an output) with images of animals and want it to guess if what is the animal it has received. Machine learning algorithms use datasets <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13]</ref>. Datasets are files that contain specific information about something, animals for example. Each line must contain parameters of this animal and, the most important, the conclusion about what that animal is. Using datasets, we can train our model to recognize and process information. An example of the dataset can be found on the figure <ref type="figure" target="#fig_1">3</ref> (each and every line contains an information about the attack and a name of the attack itself) To improve over existing approach, we offer adding a CIC-IDS datasets along with KDD99, which will help us to get protection not only from KDD99 attacks, but also from different denial of service attacks. Our intrusion detection system is trained to use two CIC-IDS style datasets. The first dataset contains the information about the following DOS <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13]</ref> attacks: 'MSSQL', 'LDAP', 'Syn', 'NetBIOS', 'UDPLag', 'UDP' and weights 341 MB, let us call it DOS1. As for the second database, it only contains the information about the reflected 'Portmap' attack and its size is 89 MB, let us call it DOS2. Also, KDD99 was separated in two different datasets, one for training and one for testing. The training one stores 90% of the information while the test dataset includes the remaining 10%. DOS1 and DOS2 datasets were also divided into two separate datasets, each of them. The training dataset stores 80% of the data, while the test dataset contains remaining 20%. Both of these datasets are split using the same method, which was chosen because of the best accuracy results after the training. The model itself is being trained with each dataset separately. In the case of the KDD99 dataset, model accuracy is 0.96670491252916389, in the case of DOS1 is 0.9942894736842107 and in the case of DOS2 is 0.9998966703182065.</p><p>When the training process is finished, the system asks for input, which is being extracted from the network sniffer. First, the input is checked for the attacks contained in the KDD99 dataset. If corresponding attack pattern is found, it sends a signal to the intrusion protection system. In the case when finding pattern for the attack fails, the system then trying to check data relative to the attack patterns which are stored in the DOS1 dataset. If an attack pattern is identified, a program sends a signal to the intrusion protection system. The same process is applied to the DOS2 dataset, if the attack pattern was not determined. If the attack pattern is failed to be identified, the intrusion detection system gives us an output that the traffic is legitimate and goes after processing the next input.</p><p>The algorithmic core of the intrusion detection system is explained by the following pseudo code.</p><p>The pseudo code of the idea is shown below:</p><p>1. Class NOVELIDS(): 2.</p><p>Initialization of variables 3.</p><p>Def __init__(self): 4.</p><p>Preprocessing the date 5.</p><p>Def new_model(self, type): 6.</p><p>Creating the model 7.</p><p>Return the new model 8.</p><p>Def train (self, model_type): 9.</p><p>Training the model 10.</p><p>Return the trained model 11.</p><p>Def test (self, model, type): 12. Testing 13.</p><p>Measuring accuracy 14.</p><p>Return the score 15.</p><p>Def predict(self, data): 16.</p><p>Predicting data by means of the module 17.</p><p>Return the result 18.</p><p>Def accuracy(self, type): 19.</p><p>Return NOVELIDS.test () 20. IDS_real = NOVELIDS (df1) # making the dos prediction model 21. IDS_real2 = NOVELIDS (df2) # making KDD99 prediction model 22. IF IDS_real2 (df) == 'KDD_attack' 23.</p><p>Passing the information 24. Elif IDS_concrette.predict(df) == 'DOS': 25.</p><p>Passing the information 26. 27. Else: 28.</p><p>Print "not vulnerable" 29. Processing the new traffic</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Relevance of the research</head><p>Our analyses have shown us the concrete reasons, which can be the security concern for 5G networks <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>. These reasons are:</p><p> 5G system has a very large exposure to the different software attacks and it has a lot of entry points for the attackers, because of the virtualization 5G systems are mostly based on the software mechanisms. The software security attacks can be implemented on 5G.  Because of the new functionality, the parts of some network equipment and some network functions are very sensitive to the different attacks. Different base stations and the key management functions in the network are sensitive to the attacks.</p><p> Because network operators rely on concrete suppliers, the new attacks can be implemented.  The great number of IT applications need 5G network, it makes 5G sensitive to attacks, which influence on integrity and availability.  Because of large number of devices DoS and DDoS attacks are much more relevant.  Because of the network slicing, attackers can attack the different slices.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Experiments</head><p>We have created a small test laboratory using 20 RASPBERRY PI devices, we have also used 20 modems with sim cards. We installed our IDS software on the server. Attacks replicated by us are the following: BACK, LAND, POD, SMURF, NEPTUNE, NMAP, TEARDROP, BUFFER_OVERFLOW, LOADMODULE, ROOTKIT FTP_WRITE, GUESS_PASSWD, IMAP, MULTIHOP, PHF, SPY, PROBE, IPSWEEP, PORTSWEEP, SATAN, MSSQL, Portmap and LDAP.</p><p>It must be emphasized that 5G system can be vulnerable to these types of attacks.</p><p>We have simulated the attacks and wrote the traffic down using a network sniffer, then all the traffic was examined. parsed all the parameters that are relevant for our KDD99 and DOS <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref> samples were parsed, using the Python programming language. The output was transformed to the format of the original MSSQL 50 99 Portmap 50 97</p><p>These results prove that the IDS is rather useful and it can be used as the prototype version of the future real-world IDS system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Results</head><p>As the result, we received the novel IDS oriented on 5G attacks. The IDS is trained using machine learning algorithms. It is trained using KDD99 dataset and the DOS/DDOS attacks dataset.</p><p>The IDS is trained using the attacks vectors, which are vulnerable for 5G. These attacks vectors were identified based on our research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Discussion</head><p>After conducting the corresponding experiments, we have identified that IDS is doing its job rather well, but, unfortunately, it still has some efficiency problems. We are working on improving the efficiency, optimization and creating our own training patterns for IDS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Conclusion</head><p>5G networks give us more bandwidth and speed, which can also be a huge downside: Think about what hackers can do. DoS, DDoS, reflected DDoS and other volumetric attacks will become even stronger. Also, some critical infrastructure will hardly depend on the 5G, smart cars, hospitals, power plants, this means that any attack can on these can be critical: taking a digital hostage in the face of the hospital`s inner network is a joke no more.</p><p>5G is a modern, rapid technology that requires corresponding security systems to protect users and the critical infrastructure. Using neural networks and machine learning to create a smart and flexible software can help us in attacks mitigation and prevention</p><p>The offered IDS is aiming to provide a good level of security and accuracy, but it still has some efficiency problems. Certain work must be conducted in order to achieve the secure 5G services.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Secure architecture</figDesc><graphic coords="3,108.00,421.80,365.40,221.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: KDD99 dataset example</figDesc><graphic coords="4,72.00,159.96,534.84,236.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="2,72.00,281.76,514.80,280.20" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Copyright</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2021" xml:id="foot_1">for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9.">Acknowledgments</head><p>The work was finances by Shota Rustaveli National Science Foundation and was conducted in the frame of CARYS-19-121 grant.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://www-file.huawei.com/-/media/corporate/pdf/trust-center/huawei-5g-security-white-paper-4th.pdf" />
		<title level="m">Huawei 5G Security White Paper</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://www.5gamericas.org/files/4715/6450/22-67/5G_Security_White_Paper_07-26-19_FINAL.pdf" />
		<title level="m">5G Americas: The evolution of Security in 5G</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="https://ec.europa.eu/comm-ission/presscorner/detail/en/IP_19_6049" />
		<title level="m">Report on EU coordinated risk assessment of 5G</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Statistical Analysis of the UNSW-NB15 Dataset for Intrusion Detection</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sinha</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-981-13-9042-5_24</idno>
		<ptr target="https://doi.org/10.1007/978-981-13-9042-5_24" />
	</analytic>
	<monogr>
		<title level="m">Computational Intelligence in Pattern Recognition. Advances in Intelligent Systems and Computing</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Das</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Nayak</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Naik</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Pati</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Pelusi</surname></persName>
		</editor>
		<meeting><address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">999</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><forename type="middle">H</forename><surname>Mahmoud</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-47358-7_52</idno>
		<ptr target="https://doi.org/10.1007/978-3-030-47358-7_52" />
	</analytic>
	<monogr>
		<title level="m">Advances in Artificial Intelligence. Canadian AI 2020</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">C</forename><surname>Goutte</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Zhu</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">12109</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset</title>
		<author>
			<persName><forename type="first">C</forename><surname>Luo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lu</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-00006-6_29</idno>
		<ptr target="https://doi.org/10.1007/978-3-030-00006-6_29" />
	</analytic>
	<monogr>
		<title level="m">Cloud Computing and Security. ICCCS 2018</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">X</forename><surname>Sun</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Z</forename><surname>Pan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Bertino</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">11063</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Design a Hybrid Algorithm Based on Tabu Search and Misuse Detection for Intrusion Dataset (KDD99 10%)</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">I</forename><surname>Ibrahim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Remo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S</forename><surname>Younis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JUBPAS</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="337" to="351" />
			<date type="published" when="2019-12">Dec. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">How machine-learning recommendations influence clinician treatment selections: the example of the antidepressant selection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jacobs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Pradier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Mccoy</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41398-021-01224-x</idno>
		<ptr target="https://doi.org/10.1038/s41398-021-01224-x" />
	</analytic>
	<monogr>
		<title level="j">Transl Psychiatry</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">108</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Conservation machine learning: a case study of random forests</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sipper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Moore</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41598-021-83247-4</idno>
		<ptr target="https://doi.org/10.1038/s41598-021-83247-4" />
	</analytic>
	<monogr>
		<title level="j">Sci Rep</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">3629</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A review of machine learning applications in human resource management</title>
		<author>
			<persName><forename type="first">S</forename><surname>Garg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sinha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Kar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mani</surname></persName>
		</author>
		<idno type="DOI">10.1108/IJPPM-08-2020-0427</idno>
		<ptr target="https://doi.org/10.1108/IJPPM-08-2020-0427" />
	</analytic>
	<monogr>
		<title level="s">International Journal of Productivity and Performance Management</title>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note type="report_type">ahead-of-print</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Machine Learning: An Applied Econometric Approach</title>
		<author>
			<persName><forename type="first">Sendhil</forename><surname>Mullainathan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jann</forename><surname>Spiess</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Economic Perspectives</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="87" to="106" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A strategy to apply machine learning to small datasets in materials science</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ling</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41524-018-0081-z</idno>
		<ptr target="https://doi.org/10.1038/s41524-018-0081-z" />
	</analytic>
	<monogr>
		<title level="j">npj Comput Mater</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page">25</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Medical Image Data and Datasets in the Era of Machine Learning-Whitepaper from the 2016 C-MIMI Meeting Dataset Session</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Kohli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Summers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Geis</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10278-017-9976-3</idno>
		<ptr target="https://doi.org/10.1007/s10278-017-9976-3" />
	</analytic>
	<monogr>
		<title level="j">J Digit Imaging</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="392" to="399" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions</title>
		<author>
			<persName><forename type="first">H</forename><surname>Monowar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Bhuyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Kashyap</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Bhattacharyya</surname></persName>
		</author>
		<author>
			<persName><surname>Kalita</surname></persName>
		</author>
		<idno type="DOI">10.1093/comjnl/bxt031</idno>
		<ptr target="https://doi.org/10.1093/comjnl/bxt031" />
	</analytic>
	<monogr>
		<title level="j">The Computer Journal</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="537" to="556" />
			<date type="published" when="2014-04">April 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Denial of service attacks at the MAC layer in wireless ad hoc networks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krishnamurthy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Faloutsos</surname></persName>
		</author>
		<idno type="DOI">10.1109/MILCOM.2002.1179634</idno>
	</analytic>
	<monogr>
		<title level="m">MILCOM 2002. Proceedings</title>
				<meeting><address><addrLine>Anaheim, CA, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1118" to="1123" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
