{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:18:24Z","timestamp":1761581904065},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030367077"},{"type":"electronic","value":"9783030367084"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36708-4_31","type":"book-chapter","created":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T15:24:22Z","timestamp":1576164262000},"page":"377-389","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Siamese Network Based Feature Learning for Improved Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Houda","family":"Jmila","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Ibn Khedher","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Blanc","sequence":"additional","affiliation":[]},{"given":"Mounim A.","family":"El Yacoubi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"31_CR1","unstructured":"UNSW-NB15, May 2015. \nhttps:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/"},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152\u2013160 (2018)","journal-title":"J. Comput. Sci."},{"issue":"3","key":"31_CR3","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S Axelsson","year":"2000","unstructured":"Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. (TISSEC) 3(3), 186\u2013205 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"8","key":"31_CR4","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio, Y., Courville, A., Vincent, P.: Representation learning: a review and new perspectives. IEEE Trans. Pattern Anal. Mach. Intell. 35(8), 1798\u20131828 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"31_CR5","unstructured":"Botes, F., Leenen, L., De La Harpe, R.: Ant colony induced decision trees for intrusion detection (2017)"},{"key":"31_CR6","first-page":"25","volume-title":"Series in Machine Perception and Artificial Intelligence","author":"JANE BROMLEY","year":"1994","unstructured":"Bromley, J., Guyon, I., LeCun, Y., S\u00e4ckinger, E., Shah, R.: Signature verification using a \u201cSiamese\u201d time delay neural network. In: Advances in Neural Information Processing Systems, pp. 737\u2013744 (1994)"},{"issue":"1","key":"31_CR7","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.eswa.2014.08.002","volume":"42","author":"S Elhag","year":"2015","unstructured":"Elhag, S., Fern\u00e1ndez, A., Bawakid, A., Alshomrani, S., Herrera, F.: On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert. Syst. Appl. 42(1), 193\u2013202 (2015)","journal-title":"Expert. Syst. Appl."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-05318-5_6","volume-title":"Automated Machine Learning","author":"M Feurer","year":"2019","unstructured":"Feurer, M., Klein, A., Eggensperger, K., Springenberg, J.T., Blum, M., Hutter, F.: Auto-sklearn: efficient and robust automated machine learning. In: Hutter, F., Kotthoff, L., Vanschoren, J. (eds.) Automated Machine Learning, pp. 113\u2013134. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-05318-5_6"},{"key":"31_CR9","unstructured":"Ghojogh, B., et al.: Feature selection and feature extraction in pattern analysis: a literature review. arXiv preprint \narXiv:1905.02845\n\n (2019)"},{"key":"31_CR10","unstructured":"Gulli, A., Pal, S.: Deep Learning with Keras. Packt Publishing Ltd. (2017)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Hou, J., Wu, T., Cao, R., Cheng, J.: Protein tertiary structure modeling driven by deep learning and contact distance prediction in CASP13. bioRxiv, p. 552422 (2019)","DOI":"10.1101\/552422"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","volume":"70","author":"C Khammassi","year":"2017","unstructured":"Khammassi, C., Krichen, S.: A GA-LR wrapper approach for feature selection in network intrusion detection. Comput. Secur. 70, 255\u2013277 (2017)","journal-title":"Comput. Secur."},{"key":"31_CR13","unstructured":"Koch, G., Zemel, R., Salakhutdinov, R.: Siamese neural networks for one-shot image recognition. In: ICML Deep Learning Workshop, vol. 2 (2015)"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","volume":"22","author":"D Kwon","year":"2017","unstructured":"Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., Kim, K.J.: A survey of deep learning-based network anomaly detection. Cluster Comput. 22, 949\u2013961 (2017)","journal-title":"Cluster Comput."},{"key":"31_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1007\/978-3-319-70139-4_87","volume-title":"Neural Information Processing","author":"Z Li","year":"2017","unstructured":"Li, Z., Qin, Z., Huang, K., Yang, X., Ye, S.: Intrusion detection using convolutional neural networks for representation learning. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.-S.M. (eds.) ICONIP 2017. LNCS, vol. 10638, pp. 858\u2013866. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-70139-4_87"},{"key":"31_CR16","doi-asserted-by":"publisher","first-page":"59657","DOI":"10.1109\/ACCESS.2018.2875045","volume":"6","author":"N Marir","year":"2018","unstructured":"Marir, N., Wang, H., Feng, G., Li, B., Jia, M.: Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using Spark. IEEE Access 6, 59657\u201359671 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"31_CR17","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2019","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21(1), 686\u2013728 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jnca.2018.12.006","volume":"128","author":"N Moustafa","year":"2019","unstructured":"Moustafa, N., Hu, J., Slay, J.: A holistic review of network anomaly detection systems: a comprehensive survey. J. Netw. Comput. Appl. 128, 33\u201355 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"31_CR19","first-page":"1","volume":"99","author":"M Nicolau","year":"2018","unstructured":"Nicolau, M., McDermott, J., et al.: Learning neural representations for network anomaly detection. IEEE Trans. Cybern. 99, 1\u201314 (2018)","journal-title":"IEEE Trans. Cybern."},{"key":"31_CR20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-030-20257-6_40","volume-title":"Engineering Applications of Neural Networks","author":"D P\u00e9rez","year":"2019","unstructured":"P\u00e9rez, D., Alonso, S., Mor\u00e1n, A., Prada, M.A., Fuertes, J.J., Dom\u00ednguez, M.: Comparison of network intrusion detection performance using feature representation. In: Macintyre, J., Iliadis, L., Maglogiannis, I., Jayne, C. (eds.) EANN 2019. CCIS, vol. 1000, pp. 463\u2013475. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-20257-6_40"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Qi, Y., Song, Y.Z., Zhang, H., Liu, J.: Sketch-based image retrieval via Siamese convolutional neural network. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 2460\u20132464. IEEE (2016)","DOI":"10.1109\/ICIP.2016.7532801"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Riad, R., Dancette, C., Karadayi, J., Zeghidour, N., Schatz, T., Dupoux, E.: Sampling strategies in Siamese networks for unsupervised speech representation learning. arXiv preprint \narXiv:1804.11297\n\n (2018)","DOI":"10.21437\/Interspeech.2018-2384"},{"issue":"3","key":"31_CR23","doi-asserted-by":"publisher","first-page":"185","DOI":"10.2174\/1389200219666180820112457","volume":"20","author":"N Stephenson","year":"2019","unstructured":"Stephenson, N., Shane, E., Chase, J., Rowland, J., Ries, D., Justice, N., Zhang, J., Chan, L., Cao, R.: Survey of machine learning techniques in drug discovery. Curr. Drug Metab. 20(3), 185\u2013193 (2019)","journal-title":"Curr. Drug Metab."},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: DeepFace: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1701\u20131708 (2014)","DOI":"10.1109\/CVPR.2014.220"},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"31_CR26","unstructured":"Tschannen, M., Bachem, O., Lucic, M.: Recent advances in autoencoder-based representation learning. arXiv preprint \narXiv:1812.05069\n\n (2018)"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Yousefi-Azar, M., Varadharajan, V., Hamey, L., Tupakula, U.: Autoencoder-based feature learning for cyber security applications. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 3854\u20133861. IEEE (2017)","DOI":"10.1109\/IJCNN.2017.7966342"},{"issue":"1","key":"31_CR28","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/3152397","volume":"51","author":"B Zhou","year":"2018","unstructured":"Zhou, B., Buyya, R.: Augmentation techniques for mobile cloud computing: a taxonomy, survey, and future directions. ACM Comput. Surv. (CSUR) 51(1), 13 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36708-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T15:48:57Z","timestamp":1576165737000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36708-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030367077","9783030367084"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36708-4_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ajiips.com.au\/iconip2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}