{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T23:46:16Z","timestamp":1747266376186,"version":"3.37.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_28","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"368-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A New Intrusion Detection System Based on Gated Recurrent Unit (GRU) and Genetic Algorithm"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4379-3568","authenticated-orcid":false,"given":"Mahdi","family":"Manavi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6208-9571","authenticated-orcid":false,"given":"Yunpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jnca.2016.10.015","volume":"77","author":"P Mishraa","year":"2017","unstructured":"Mishraa, P., Varadharajan, V., Pilli, E., Varadharajan, V., Tupakulab, U.: Intrusion detection techniques in cloud environment: a survey. J. Netw. Comput. Appl. 77, 18\u201347 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"28_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0953-0","volume-title":"Applications of Data Mining in Computer Security","author":"D Barbara","year":"2002","unstructured":"Barbara, D., Jordia, S.: Applications of Data Mining in Computer Security, vol. 6. Springer, New York (2002). \n                    https:\/\/doi.org\/10.1007\/978-1-4615-0953-0"},{"issue":"1","key":"28_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2808691","volume":"48","author":"A Milenkoski","year":"2015","unstructured":"Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A., Payne, B.D.: Evaluating computer intrusion detection systems: a survey of common practices. ACM Comput. Surv. (CSUR) 48(1), 12 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. In: EMNLP (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Subba, B., Biswas, S., Karmakar, S.: A neural network based system for intrusion detection and attack classification. In: Twenty Second National Conference on Communication (NCC). IEEE, India (2016)","DOI":"10.1109\/NCC.2016.7561088"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"48697","DOI":"10.1109\/ACCESS.2018.2867564","volume":"6","author":"C Xu","year":"2018","unstructured":"Xu, C., Shen, J., Du, X., Zhang, F.: An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6, 48697\u201348707 (2018)","journal-title":"IEEE Access"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Nguyen, S., Nguyen, V., Choi, J., Kim, K.: Design and implementation of intrusion detection system using convolutional neural network for DoS detection. In: Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, ICMLSC 2018. ACM, Vietnam (2018)","DOI":"10.1145\/3184066.3184089"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Fu, Y., Lou, F., Meng, F., Tian, Z., Zhang, H., Jiang, F.: An intelligent network attack detection method based on RNN. In: Third International Conference on Data Science in Cyberspace (DSC). IEEE, China (2018)","DOI":"10.1109\/DSC.2018.00078"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Cluster Comput. 1\u201313 (2017)","DOI":"10.1007\/s10586-017-1187-7"},{"key":"28_CR10","unstructured":"Kim, J., Shin, N., Jo, S., Kim, S.: Method of intrusion detection using deep neural network. In: International Conference on Big Data and Smart Computing (BigComp). IEEE, South Korea (2017)"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1016\/j.procs.2015.05.108","volume":"52","author":"Y Maleh","year":"2015","unstructured":"Maleh, Y., Ezzati, A., Qasmaoui, Y., Mbida, M.: A global hybrid intrusion detection system for wireless sensor networks. Procedia Comput. Sci. 52, 1047\u20131052 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J, Thu, HLT., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: International Conference on Platform Technology and Service. IEEE, South Korea (2016)","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Ishitaki, R.T., Obukata, Y., Oda, T., Barolli, L.: Application of deep recurrent neural networks for prediction of user behavior in Tor networks. In: 31st International Conference on Advanced Information Networking and Applications Workshops. IEEE, Taiwan (2017)","DOI":"10.1109\/WAINA.2017.63"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Dong, B., Wang, X.: Comparison deep learning method to traditional methods using for network intrusion detection. In: 8th IEEE International Conference on Communication Software and Networks. IEEE, China (2016)","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"28_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-981-10-4642-1_5","volume-title":"Mathematics and Computing","author":"SS Roy","year":"2017","unstructured":"Roy, S.S., Mallik, A., Gulati, R., Obaidat, M.S., Krishna, P.V.: A deep learning based artificial neural network approach for intrusion detection. In: Giri, D., Mohapatra, R.N., Begehr, H., Obaidat, M.S. (eds.) ICMC 2017. CCIS, vol. 655, pp. 44\u201353. Springer, Singapore (2017). \n                    https:\/\/doi.org\/10.1007\/978-981-10-4642-1_5"},{"key":"28_CR16","unstructured":"Kingma, D., Ba, J.: Adam: a method for stochastic optimization. In: 3rd International Conference for Learning Representations. arXiv, USA (2015)"},{"issue":"4","key":"28_CR17","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.jksus.2017.05.013","volume":"29","author":"IS Thaseen","year":"2017","unstructured":"Thaseen, I.S., Kumar, C.A.: Intrusion detection model using fusion of chi-square feature selection and multi class SVM. J. King Saud Univ. Comput. Inf. Sci. 29(4), 462\u2013472 (2017)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"20255","DOI":"10.1109\/ACCESS.2018.2820092","volume":"6","author":"MH Ali","year":"2018","unstructured":"Ali, M.H., Al Mohammed, B.A.D., Ismail, A., Zolkipli, M.F.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255\u201320261 (2018)","journal-title":"IEEE Access"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Agarap, A.F.M.: A neural network architecture combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for intrusion detection in network traffic data. In: Proceedings of the 2018 10th International Conference on Machine Learning and Computing, ICMLC 2018. ACM, China (2018)","DOI":"10.1145\/3195106.3195117"},{"key":"28_CR20","volume-title":"Intrusion Detection","author":"R Gurley Bace","year":"2000","unstructured":"Gurley Bace, R.: Intrusion Detection. Sams Publishing, USA (2000)"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Yao, J., Zhao, S., V. Saxton, L.: A study on fuzzy intrusion detection. In: Proceedings Volume 5812, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2005)","DOI":"10.1117\/12.604465"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:07:21Z","timestamp":1562771241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}