{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:18:50Z","timestamp":1742948330790,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030307080"},{"type":"electronic","value":"9783030307097"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30709-7_32","type":"book-chapter","created":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T18:25:28Z","timestamp":1569695128000},"page":"350-354","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["DAFL: Deep Adaptive Feature Learning for Network Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Shujian","family":"Ji","sequence":"first","affiliation":[]},{"given":"Tongzheng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Kejiang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Cheng-Zhong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,29]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Lin, P., Ye, K., Xu, C.-Z.: NetDetector: an anomaly detection platform for networked systems. In: IEEE International Conference on Real-time Computing and Robotics. IEEE (2019)","DOI":"10.1109\/RCAR47638.2019.9043964"},{"key":"32_CR2","unstructured":"Shon, T., Kim, Y., Lee, C., Moon, J.: A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, pp. 176\u2013183. IEEE (2005)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Amor, N.B., Benferhat, S., Elouedi, Z.: Naive Bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420\u2013424. ACM (2004)","DOI":"10.1145\/967900.967989"},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-23502-4_12","volume-title":"International Conference on Cloud Computing","author":"P Lin","year":"2019","unstructured":"Lin, P., Ye, K., Xu, C.-Z.: Dynamic network anomaly detection system by using deep learning techniques. In: Da Silva, D., Wang, Q., Zhang, L.J. (eds.) CLOUD 2019. LNCS, vol. 11513, pp. 161\u2013176. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23502-4_12"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-030-05677-3_13","volume-title":"Network and Parallel Computing","author":"M Zhu","year":"2018","unstructured":"Zhu, M., Ye, K., Wang, Y., Xu, C.-Z.: A deep learning approach for network anomaly detection based on AMF-LSTM. In: Zhang, F., Zhai, J., Snir, M., Jin, H., Kasahara, H., Valero, M. (eds.) NPC 2018. LNCS, vol. 11276, pp. 137\u2013141. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05677-3_13"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-94295-7_15","volume-title":"Cloud Computing \u2013 CLOUD 2018","author":"M Zhu","year":"2018","unstructured":"Zhu, M., Ye, K., Xu, C.-Z.: Network anomaly detection and\u00a0identification based on deep learning methods. In: Luo, M., Zhang, L.-J. (eds.) CLOUD 2018. LNCS, vol. 10967, pp. 219\u2013234. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94295-7_15"},{"key":"32_CR7","unstructured":"NSL-KDD (1999). https:\/\/iscxdownloads.cs.unb.ca\/iscxdownloads\/NSL-KDD"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Ibrahimi, K., Ouaddane, M.: Management of intrusion detection systems based-KDD99: analysis with LDA and PCA. In: 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/WINCOM.2017.8238171"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, K., Purdy, C.: Toward an online anomaly intrusion detection system based on deep learning. In: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 195\u2013200. IEEE (2016)","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Potluri, S., Diedrich, C.: Accelerated deep neural networks for enhanced intrusion detection system. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1\u20138. IEEE (2016)","DOI":"10.1109\/ETFA.2016.7733515"},{"issue":"6","key":"32_CR11","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"M-J Kang","year":"2016","unstructured":"Kang, M.-J., Kang, J.-W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS one 11(6), e0155781 (2016)","journal-title":"PloS one"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30709-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:05:41Z","timestamp":1695859541000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-30709-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030307080","9783030307097"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30709-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/epcc.sjtu.edu.cn\/NPC2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}