{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:43:52Z","timestamp":1761324232749,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030267629"},{"type":"electronic","value":"9783030267636"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26763-6_72","type":"book-chapter","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T23:18:04Z","timestamp":1564442284000},"page":"749-760","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"issue":"5","key":"72_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/52.877857","volume":"17","author":"G McGraw","year":"2000","unstructured":"McGraw, G., Morrisett, G.: Attacking malicious code: a report to the Infosec Research Council. IEEE Softw. 17(5), 33\u201341 (2000)","journal-title":"IEEE Softw."},{"key":"72_CR2","unstructured":"Bielec, A.: Analysis of a polish bankbot (2018)"},{"key":"72_CR3","unstructured":"Kelion, L.: eBay redirect attack puts buyers\u2019 credentials at risk (2014)"},{"key":"72_CR4","unstructured":"Mutton, P.: Hackers still exploiting eBay\u2019s stored XSS vulnerabilities in 2017 (2017)"},{"key":"72_CR5","unstructured":"Lee, D.: MyFitnessPal breach affects millions of under armour users (2018)"},{"key":"72_CR6","unstructured":"Idika, N., Mathur, A.: A survey of malware detection techniques. Purdue University, March 2007"},{"key":"72_CR7","doi-asserted-by":"crossref","unstructured":"Canfora, G., Di Sorbo, A., Mercaldo, F., Visaggio, C.A.: Obfuscation techniques against signature-based detection: a case study. In: 2015 Mobile Systems Technologies Workshop (MST), pp. 21\u201326, May 2015","DOI":"10.1109\/MST.2015.8"},{"key":"72_CR8","doi-asserted-by":"crossref","unstructured":"Sani, Y., Mohamedou, A., Ali, K., Farjamfar, A., Azman, M., Shamsuddin, S.: An overview of neural networks use in anomaly intrusion detection systems. In: 2009 IEEE Student Conference on Research and Development (SCOReD), pp. 89\u201392, November 2009","DOI":"10.1109\/SCORED.2009.5443289"},{"key":"72_CR9","doi-asserted-by":"crossref","unstructured":"Haddadi, F., Khanchi, S., Shetabi, M., Derhami, V.: Intrusion detection and attack classification using feed-forward neural network. In: 2010 Second International Conference on Computer and Network Technology, pp. 262\u2013266, April 2010","DOI":"10.1109\/ICCNT.2010.28"},{"key":"72_CR10","doi-asserted-by":"crossref","unstructured":"Gong, W., Fu, W., Cai, L.: A neural network based intrusion detection data fusion model. In: 2010 Third International Joint Conference on Computational Science and Optimization, vol. 2, pp. 410\u2013414, May 2010","DOI":"10.1109\/CSO.2010.62"},{"key":"72_CR11","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, I., Chakraborty, M., Chakrabarti, S., Chatterjee, T.: Back propagation neural network approach to intrusion detection system. In: 2011 International Conference on Recent Trends in Information Systems, pp. 303\u2013308, December 2011","DOI":"10.1109\/ReTIS.2011.6146886"},{"key":"72_CR12","doi-asserted-by":"crossref","unstructured":"Sonawane, H.A., Pattewar, T.A.: A comparative performance evaluation of intrusion detection based on neural network and PCA. In: 2015 International Conference on Communications and Signal Processing (ICCSP), pp. 0841\u20130845, April 2015","DOI":"10.1109\/ICCSP.2015.7322612"},{"key":"72_CR13","doi-asserted-by":"crossref","unstructured":"Pattewar, T.M., Sonawane, H.A.: Neural network based intrusion detection using Bayesian with PCA and KPCA feature extraction. In: 2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS), pp. 83\u201388, November 2015","DOI":"10.1109\/CGVIS.2015.7449898"},{"key":"72_CR14","unstructured":"Van, N.T.T., Thinh, T.N.: Accelerating anomaly-based IDS using neural network on GPU. In: 2015 International Conference on Advanced Computing and Applications (ACOMP), pp. 67\u201374, November 2015"},{"key":"72_CR15","doi-asserted-by":"crossref","unstructured":"Subba, B., Biswas, S., Karmakar, S.: A neural network based system for intrusion detection and attack classification. In: 2016 Twenty Second National Conference on Communication (NCC), pp. 1\u20136, March 2016","DOI":"10.1109\/NCC.2016.7561088"},{"key":"72_CR16","doi-asserted-by":"crossref","unstructured":"Potluri, S., Diedrich, C.: Accelerated deep neural networks for enhanced intrusion detection system. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1\u20138, September 2016","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"72_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"O Maimon","year":"2010","unstructured":"Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook, 2nd edn. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-09823-4","edition":"2"},{"key":"72_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43162-8","volume-title":"Artificial Neural Networks A Practical Course","author":"I Nunes","year":"2017","unstructured":"Nunes, I., et al.: Artificial Neural Networks A Practical Course. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-43162-8"},{"key":"72_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18164-6","volume-title":"Advances in Neural Networks","author":"S Bassis","year":"2016","unstructured":"Bassis, S., Esposito, A., Morabito, F.C., Pasero, E.: Advances in Neural Networks. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-18164-6"},{"key":"72_CR20","unstructured":"Charu, C.A.: Neural Networks and Deep Learning a Textbook (2018)"},{"key":"72_CR21","unstructured":"Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). Software: tensorflow.org"},{"key":"72_CR22","unstructured":"Chollet, F., et al.: Keras (2015). https:\/\/github.com\/fchollet\/keras"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26763-6_72","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T13:20:34Z","timestamp":1617283234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-26763-6_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030267629","9783030267636"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26763-6_72","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanchang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2019\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ICIC Website","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"609","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"217","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.43","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}