{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:42:04Z","timestamp":1774975324130,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030005627","type":"print"},{"value":"9783030005634","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00563-4_74","type":"book-chapter","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T11:35:29Z","timestamp":1538739329000},"page":"759-769","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["Statistical Analysis Driven Optimized Deep Learning System for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Cosimo","family":"Ieracitano","sequence":"first","affiliation":[]},{"given":"Ahsan","family":"Adeel","sequence":"additional","affiliation":[]},{"given":"Mandar","family":"Gogate","sequence":"additional","affiliation":[]},{"given":"Kia","family":"Dashtipour","sequence":"additional","affiliation":[]},{"given":"Francesco Carlo","family":"Morabito","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Larijani","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Raza","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,6]]},"reference":[{"issue":"2","key":"74_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/MCOM.2018.1700332","volume":"56","author":"A Abeshu","year":"2018","unstructured":"Abeshu, A., Chilamkurti, N.: Deep learning: the frontier for distributed attack detection in Fog-to-Things computing. IEEE Commun. Mag. 56(2), 169\u2013175 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"74_CR2","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.phycom.2015.11.004","volume":"19","author":"A Adeel","year":"2016","unstructured":"Adeel, A., Larijani, H., Ahmadinia, A.: Random neural network based novel decision making framework for optimized and autonomous power control in lte uplink system. Phys. Commun. 19, 106\u2013117 (2016)","journal-title":"Phys. Commun."},{"key":"74_CR3","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, K., Purdy, C.: Toward an online anomaly intrusion detection system based on deep learning. In: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 195\u2013200. IEEE (2016)","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"74_CR4","doi-asserted-by":"crossref","unstructured":"Dashtipour, K., Gogate, M., Adeel, A., Algarafi, A., Howard, N., Hussain, A.: Persian named entity recognition. In: 2017 IEEE 16th International Conference on Cognitive Informatics and Cognitive Computing (ICCI* CC), pp. 79\u201383. IEEE (2017)","DOI":"10.1109\/ICCI-CC.2017.8109733"},{"key":"74_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-319-49685-6_28","volume-title":"Advances in Brain Inspired Cognitive Systems","author":"K Dashtipour","year":"2016","unstructured":"Dashtipour, K., Hussain, A., Zhou, Q., Gelbukh, A., Hawalah, A.Y.A., Cambria, E.: PerSent: a freely available persian sentiment lexicon. In: Liu, C.-L., Hussain, A., Luo, B., Tan, K.C., Zeng, Y., Zhang, Z. (eds.) BICS 2016. LNCS (LNAI), vol. 10023, pp. 310\u2013320. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49685-6_28"},{"issue":"1","key":"74_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10479-005-5724-z","volume":"134","author":"PT Boer De","year":"2005","unstructured":"De Boer, P.T., Kroese, D.P., Mannor, S., Rubinstein, R.Y.: A tutorial on the cross-entropy method. Ann. Oper. Res. 134(1), 19\u201367 (2005)","journal-title":"Ann. Oper. Res."},{"issue":"2","key":"74_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.3390\/e20020043","volume":"20","author":"S Gasparini","year":"2018","unstructured":"Gasparini, S., et al.: Information theoretic-based interpretation of a deep neural network approach in diagnosing psychogenic non-epileptic seizures. Entropy 20(2), 43 (2018)","journal-title":"Entropy"},{"key":"74_CR8","doi-asserted-by":"crossref","unstructured":"Huang, H., Khalid, R.S., Liu, W., Yu, H.: Work-in-progress: a fast online sequential learning accelerator for IoT network intrusion detection. In: 2017 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ ISSS), pp. 1\u20132. IEEE (2017)","DOI":"10.1145\/3125502.3125532"},{"key":"74_CR9","doi-asserted-by":"crossref","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-Inspired Information and Communications Technologies (Formerly BIONETICS), pp. 21\u201326. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2016)","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"74_CR10","doi-asserted-by":"crossref","unstructured":"Kim, J., Shin, N., Jo, S.Y., Kim, S.H.: Method of intrusion detection using deep neural network. In: 2017 IEEE International Conference on Big Data and Smart Computing (BigComp), pp. 313\u2013316. IEEE (2017)","DOI":"10.1109\/BIGCOMP.2017.7881684"},{"issue":"7553","key":"74_CR11","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436 (2015)","journal-title":"Nature"},{"issue":"1","key":"74_CR12","first-page":"85","volume":"58","author":"CF Morabito","year":"2000","unstructured":"Morabito, C.F.: Independent component analysis and feature extraction techniques for NDT data. Mater. Eval. 58(1), 85\u201392 (2000)","journal-title":"Mater. Eval."},{"key":"74_CR13","doi-asserted-by":"crossref","unstructured":"Morabito, F.C., et al.: Deep convolutional neural networks for classification of mild cognitive impaired and Alzheimer\u2019s disease patients from scalp EEG recordings. In: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/RTSI.2016.7740576"},{"issue":"1","key":"74_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-014-0007-7","volume":"2","author":"MM Najafabadi","year":"2015","unstructured":"Najafabadi, M.M., Villanustre, F., Khoshgoftaar, T.M., Seliya, N., Wald, R., Muharemagic, E.: Deep learning applications and challenges in big data analytics. J. Big Data 2(1), 1 (2015)","journal-title":"J. Big Data"},{"issue":"1","key":"74_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41\u201350 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"74_CR16","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258\u2013263. IEEE (2016)","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"74_CR17","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"74_CR18","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: NSL-KDD dataset (2012). http:\/\/www.unb.ca\/research\/iscx\/dataset\/iscx-NSL-KDD-dataset. html) . Accessed 28 Feb 2016"},{"issue":"10","key":"74_CR19","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert. Syst. Appl. 36(10), 11994\u201312000 (2009)","journal-title":"Expert. Syst. Appl."},{"key":"74_CR20","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.neucom.2018.01.076","volume":"287","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Ren, J., Zhang, D., Sun, M., Jiang, J.: A deep-learning based feature hybrid framework for spatiotemporal saliency detection inside videos. Neurocomputing 287, 68\u201383 (2018)","journal-title":"Neurocomputing"},{"key":"74_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.patcog.2018.02.004","volume":"79","author":"Y Yan","year":"2018","unstructured":"Yan, Y., et al.: Unsupervised image saliency detection with Gestalt-laws guided optimization and visual attention based refinement. Pattern Recogn. 79, 65\u201378 (2018)","journal-title":"Pattern Recogn."},{"key":"74_CR22","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Advances in Brain Inspired Cognitive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00563-4_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T15:09:46Z","timestamp":1774969786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00563-4_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030005627","9783030005634"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00563-4_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"BICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Brain Inspired Cognitive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bics2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bics2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}