{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:53:08Z","timestamp":1764053588197},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030141172"},{"type":"electronic","value":"9783030141189"}],"license":[{"start":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T00:00:00Z","timestamp":1552780800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-14118-9_60","type":"book-chapter","created":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T15:02:59Z","timestamp":1552748579000},"page":"599-608","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Applications of Machine Learning in Cyber Security - A Review and a Conceptual Framework for a University Setup"],"prefix":"10.1007","author":[{"given":"Rishabh","family":"Jain","sequence":"first","affiliation":[]},{"given":"Roheet","family":"Bhatnagar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,17]]},"reference":[{"key":"60_CR1","unstructured":"Veiga, A.P.: Applications of artificial intelligence to network security. arXiv preprint \n                    arXiv:1803.09992\n                    \n                   (2018)"},{"key":"60_CR2","unstructured":"Ford, V., Siraj, A.: Applications of machine learning in cyber security. In: Proceedings of the 27th International Conference on Computer Applications in Industry and Engineering (2014)"},{"key":"60_CR3","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Draper-Gil, G., Mamun, M.S.I., Ghorbani, A.A.: Characterization of TOR traffic using time based features. In: ICISSP, pp. 253\u2013262 (2017)","DOI":"10.5220\/0005740704070414"},{"key":"60_CR4","first-page":"80","volume":"3","author":"P Kobojek","year":"2016","unstructured":"Kobojek, P., Saeed, K.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 3, 80\u201390 (2016)","journal-title":"J. Telecommun. Inf. Technol."},{"key":"60_CR5","unstructured":"Gibert, D.: Convolutional neural networks for malware classification. Ph.D. thesis, MS Thesis, Department of Computer Science, UPC (2016)"},{"issue":"10","key":"60_CR6","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.3390\/s16101701","volume":"16","author":"T Ma","year":"2016","unstructured":"Ma, T., Wang, F., Cheng, J., Yu, Y., Chen, X.: A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors 16(10), 1701 (2016)","journal-title":"Sensors"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Torres, P., Catania, C., Garcia, S., Garino, C.G.: An analysis of recurrent neural networks for botnet detection behavior. In: 2016 IEEE Biennial Congress of Argentina (ARGENCON), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ARGENCON.2016.7585247"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Rui, C., Jing, Y., Rong-gui, H., Shu-guang, H.: A novel LSTM-RNN decoding algorithm in captcha recognition. In: 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), pp. 766\u2013771. IEEE (2013)","DOI":"10.1109\/IMCCC.2013.171"},{"key":"60_CR9","doi-asserted-by":"crossref","unstructured":"Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., Yagi, T.: Malware detection with deep neural network using process behavior. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol.\u00a02, pp. 577\u2013582. IEEE (2016)","DOI":"10.1109\/COMPSAC.2016.151"}],"container-title":["Advances in Intelligent Systems and Computing","The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14118-9_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T06:56:18Z","timestamp":1558162578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14118-9_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,17]]},"ISBN":["9783030141172","9783030141189"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14118-9_60","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,17]]},"assertion":[{"value":"17 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AMLTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Machine Learning Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Egypt","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"amlta2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/egyptscience.net\/AMLTA19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}