{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:27:59Z","timestamp":1762867679965},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030061579"},{"type":"electronic","value":"9783030061586"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-06158-6_9","type":"book-chapter","created":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T17:32:06Z","timestamp":1546623126000},"page":"86-94","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Chia-Ming","family":"Hsu","sequence":"first","affiliation":[]},{"given":"He-Yen","family":"Hsieh","sequence":"additional","affiliation":[]},{"given":"Setya Widyawan","family":"Prakosa","sequence":"additional","affiliation":[]},{"given":"Muhammad Zulfan","family":"Azhari","sequence":"additional","affiliation":[]},{"given":"Jenq-Shiou","family":"Leu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,5]]},"reference":[{"key":"9_CR1","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2, 1848\u20131853 (2013)","journal-title":"Int. J. Eng. Res. Technol."},{"unstructured":"Dhanabal, L., Shantharajah, S.P., Dr.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. In: International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, pp. 446\u2013452 (2015)","key":"9_CR2"},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.asoc.2014.01.028","volume":"18","author":"F Kuang","year":"2014","unstructured":"Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178\u2013184 (2014)","journal-title":"Appl. Soft Comput."},{"unstructured":"Hettich, S., Bay, S.D.: The UCI KDD Archive, University of California, Department of Information and Computer Science, Irvine, CA (1999). http:\/\/kdd.ics.uci.edu","key":"9_CR4"},{"doi-asserted-by":"crossref","unstructured":"Reddy, R.R., Ramadevi, Y., Sunitha, K.V.N.: Effective discriminant function for intrusion detection using SVM. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 11481153 (2016)","key":"9_CR5","DOI":"10.1109\/ICACCI.2016.7732199"},{"doi-asserted-by":"crossref","unstructured":"Ingre, B., Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: International Conference on Signal Processing and Communication Engineering Systems (SPACES), pp. 9296 (2015)","key":"9_CR6","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"9_CR7","doi-asserted-by":"crossref","first-page":"213217","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213217 (2016)","journal-title":"Procedia Comput. Sci."},{"unstructured":"Zhang, J., Zulkernine, M., Haque, A.: Random-forests-based network intrusion detection systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 38, 649\u2013659 (2008)","key":"9_CR8"},{"key":"9_CR9","first-page":"21","volume":"16","author":"Q Niyaz","year":"2015","unstructured":"Niyaz, Q., Sun, W., Javaid, A.Y., Alam, M.: A deep learning approach for network intrusion detection system. EAI Endorsed Trans. Secur. Saf. 16, 21\u201326 (2015)","journal-title":"EAI Endorsed Trans. Secur. Saf."},{"key":"9_CR10","doi-asserted-by":"crossref","first-page":"2207","DOI":"10.1049\/joe.2017.0722","volume":"2017","author":"Y Xu","year":"2017","unstructured":"Xu, Y., Shi, L., Ni, Y.: Deep-learning-based scenario generation strategy considering correlation between multiple wind farms. J. Eng. 2017, 2207\u20132210 (2017)","journal-title":"J. Eng."},{"key":"9_CR11","doi-asserted-by":"crossref","first-page":"12451","DOI":"10.1109\/ACCESS.2018.2805861","volume":"6","author":"B-F Wu","year":"2018","unstructured":"Wu, B.-F., Lin, C.-H.: Adaptive feature mapping for customizing deep learning based facial expression recognition model. IEEE Access 6, 12451\u201312461 (2018)","journal-title":"IEEE Access"},{"key":"9_CR12","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/CC.2017.8233654","volume":"14","author":"T Wang","year":"2017","unstructured":"Wang, T., Wen, C.-K., Wang, H., Gao, F., Jiang, T., Jin, S.: Deep learning for wireless physical layer: opportunities and challenges. China Commun. 14, 92\u2013111 (2017)","journal-title":"China Commun."},{"doi-asserted-by":"crossref","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","key":"9_CR13","DOI":"10.1109\/ACCESS.2017.2762418"},{"doi-asserted-by":"crossref","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735\u20131780 (1997)","key":"9_CR14","DOI":"10.1162\/neco.1997.9.8.1735"},{"unstructured":"Kaushik, S.S., Deshmukh, P.R., Dr. Prof.: Detection of attacks in an intrusion detection system. Int. J. Comput. Sci. Inf. Technol. 2(3), 982\u2013986 (2011)","key":"9_CR15"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-06158-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T15:37:16Z","timestamp":1662737836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-06158-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030061579","9783030061586"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-06158-6_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"WICON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Wireless Internet Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wicon2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wicon.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}