{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T15:51:51Z","timestamp":1770565911312,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030129415","type":"print"},{"value":"9783030129422","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12942-2_18","type":"book-chapter","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T08:26:50Z","timestamp":1549355210000},"page":"234-246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders"],"prefix":"10.1007","author":[{"given":"Samir","family":"Puuska","sequence":"first","affiliation":[]},{"given":"Tero","family":"Kokkonen","sequence":"additional","affiliation":[]},{"given":"Janne","family":"Alatalo","sequence":"additional","affiliation":[]},{"given":"Eppu","family":"Heilimo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"key":"18_CR1","unstructured":"Apache Kafka: Apache kafka a distributed streaming platform. \n                    https:\/\/kafka.apache.org\/\n                    \n                  . Accessed 31 Aug 2018"},{"key":"18_CR2","unstructured":"Apache Spark: Apache Spark lightning-fast unified analytics engine. \n                    https:\/\/spark.apache.org\/\n                    \n                   Accessed 31 Aug 2018"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Chan, K., Fu, W.: Efficient time series matching by wavelets. In: Proceedings 15th International Conference on Data Engineering (Cat. No. 99CB36337), pp. 126\u2013133, March 1999. \n                    https:\/\/doi.org\/10.1109\/ICDE.1999.754915","DOI":"10.1109\/ICDE.1999.754915"},{"issue":"3","key":"18_CR4","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1\u201315:58 (2009). \n                    https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput. Surv."},{"issue":"5","key":"18_CR5","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/18.57199","volume":"36","author":"I Daubechies","year":"1990","unstructured":"Daubechies, I.: The wavelet transform, time-frequency localization and signal analysis. IEEE Trans. Inf. Theory 36(5), 961\u20131005 (1990). \n                    https:\/\/doi.org\/10.1109\/18.57199","journal-title":"IEEE Trans. Inf. Theory"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Dhingra, M., Jain, M., Jadon, R.S.: Role of artificial intelligence in enterprise information security: a review. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 188\u2013191, December 2016. \n                    https:\/\/doi.org\/10.1109\/PDGC.2016.7913142","DOI":"10.1109\/PDGC.2016.7913142"},{"key":"18_CR7","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol. 27, pp. 2672\u20132680. Curran Associates, Inc. (2014)"},{"issue":"3","key":"18_CR8","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/BF01456326","volume":"69","author":"A Haar","year":"1910","unstructured":"Haar, A.: Zur theorie der orthogonalen funktionensysteme. Mathematische Annalen 69(3), 331\u2013371 (1910). \n                    https:\/\/doi.org\/10.1007\/BF01456326","journal-title":"Mathematische Annalen"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Hendler, D., Kels, S., Rubin, A.: Detecting malicious powershell commands using deep neural networks. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS 2018, pp. 187\u2013197. ACM, New York (2018). \n                    https:\/\/doi.org\/10.1145\/3196494.3196511","DOI":"10.1145\/3196494.3196511"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s13635-016-0030-7","volume":"2016","author":"M Hus\u00e1k","year":"2016","unstructured":"Hus\u00e1k, M., \u010cerm\u00e1k, M., Jirs\u00edk, T., \u010celeda, P.: HTTPS traffic analysis and client identification using passive SSL\/TLS fingerprinting. EURASIP J. Inf. Secur. 2016(1), 6 (2016). \n                    https:\/\/doi.org\/10.1186\/s13635-016-0030-7","journal-title":"EURASIP J. Inf. Secur."},{"key":"18_CR11","unstructured":"JAMK University of Applied Sciences, Institute of Information Technology, JYVSECTEC: Rgce cyber range. \n                    http:\/\/www.jyvsectec.fi\/en\/rgce\/\n                    \n                  . Accessed 23 Aug 2018"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-030-01168-0_26","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems","author":"T Kokkonen","year":"2018","unstructured":"Kokkonen, T., Puuska, S.: Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN\/ruSMART -2018. LNCS, vol. 11118, pp. 277\u2013288. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-030-01168-0_26"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Komar, M., et al.: High performance adaptive system for cyber attacks detection. In: 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 2, pp. 853\u2013858, September 2017. \n                    https:\/\/doi.org\/10.1109\/IDAACS.2017.8095208","DOI":"10.1109\/IDAACS.2017.8095208"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"Le, T., Kim, J., Kim, H.: An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In: 2017 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20136, February 2017. \n                    https:\/\/doi.org\/10.1109\/PlatCon.2017.7883684","DOI":"10.1109\/PlatCon.2017.7883684"},{"key":"18_CR15","doi-asserted-by":"publisher","unstructured":"Lin, J., Keogh, E., Lonardi, S., Chiu, B.: A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2003, pp. 2\u201311. ACM, New York (2003). \n                    https:\/\/doi.org\/10.1145\/882082.882086","DOI":"10.1145\/882082.882086"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Lippmann, R.P., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings DARPA Information Survivability Conference and Exposition, DISCEX 2000, vol. 2, pp. 12\u201326, January 2000. \n                    https:\/\/doi.org\/10.1109\/DISCEX.2000.821506","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"18_CR17","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I.: Adversarial autoencoders. In: International Conference on Learning Representations (2016). \n                    http:\/\/arxiv.org\/abs\/1511.05644"},{"key":"18_CR18","unstructured":"Ministry of Defence Finland: The national cyber security exercises is organised in Jyv\u00e4skyl\u00e4 - Kansallinen kyberturvallisuusharjoitus kyha18 j\u00e4rjestet\u00e4\u00e4n Jyv\u00e4skyl\u00e4ss\u00e4, official bulletin 11th of May 2018, May 2018. \n                    https:\/\/valtioneuvosto.fi\/artikkeli\/-\/asset_publisher\/kansallinen-kyberturvallisuusharjoitus-kyha18-jarjestetaan-jyvaskylassa\n                    \n                  . Accessed 23 Aug 2018"},{"issue":"10","key":"18_CR19","first-page":"128","volume":"13","author":"A Mokarian","year":"2013","unstructured":"Mokarian, A., Faraahi, A., Delavar, A.G.: False positives reduction techniques in intrusion detection systems-a review. IJCSNS Int. J. Comput. Sci. Netw. Secur. 13(10), 128\u2013134 (2013)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Pham, T.S., Hoang, T.H., Vu, V.C.: Machine learning techniques for web intrusion detection \u2013 a comparison. In: 2016 Eighth International Conference on Knowledge and Systems Engineering (KSE), pp. 291\u2013297, October 2016. \n                    https:\/\/doi.org\/10.1109\/KSE.2016.7758069","DOI":"10.1109\/KSE.2016.7758069"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Dierks, T.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, August 2008. \n                    https:\/\/doi.org\/10.17487\/RFC5246","DOI":"10.17487\/rfc5246"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305\u2013316, May 2010. \n                    https:\/\/doi.org\/10.1109\/SP.2010.25","DOI":"10.1109\/SP.2010.25"},{"key":"18_CR23","unstructured":"Suricata: Suricata Open Source IDS\/IPS\/NSM engine. \n                    https:\/\/suricata-ids.org\/\n                    \n                  . Accessed 31 Aug 2018"},{"key":"18_CR24","doi-asserted-by":"publisher","unstructured":"Suyal, P., Pant, J., Dwivedi, A., Lohani, M.C.: Performance evaluation of rough set based classification models to intrusion detection system. In: 2016 2nd International Conference on Advances in Computing, Communication, Automation (ICACCA) (Fall), pp. 1\u20136, September 2016. \n                    https:\/\/doi.org\/10.1109\/ICACCAF.2016.7748991","DOI":"10.1109\/ICACCAF.2016.7748991"},{"key":"18_CR25","doi-asserted-by":"publisher","unstructured":"Vartouni, A.M., Kashi, S.S., Teshnehlab, M.: An anomaly detection method to detect web attacks using stacked auto-encoder. In: 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), pp. 131\u2013134, February 2018. \n                    https:\/\/doi.org\/10.1109\/CFIS.2018.8336654","DOI":"10.1109\/CFIS.2018.8336654"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12942-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:38:54Z","timestamp":1558478334000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12942-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129415","9783030129422"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12942-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SECITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security for Information Technology and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucharest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.secitc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Three papers of invited keynote speakers are included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}