{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:56Z","timestamp":1742914016944,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030409067"},{"type":"electronic","value":"9783030409074"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-40907-4_25","type":"book-chapter","created":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T15:02:54Z","timestamp":1581519774000},"page":"229-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DeepNet: A Deep Learning Architecture for Network-Based Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Javad","family":"Zabihi","sequence":"first","affiliation":[]},{"given":"Vandana","family":"Janeja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,12]]},"reference":[{"key":"25_CR1","unstructured":"The UNSW-NB12 dataset. \nhttps:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"6","author":"N Moustafa","year":"2018","unstructured":"Moustafa, N., Turnbull, B., Choo, K.R.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. 6, 4815\u20134830 (2018)","journal-title":"IEEE Internet Things J."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Misra, G., Slay, J.: Generalized outlier gaussian mixture technique based on automated association features for simulating and detecting web application attacks. IEEE Trans. Sustain. Comput. (2018)","DOI":"10.1109\/TSUSC.2018.2808430"},{"issue":"7-9","key":"25_CR4","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.neucom.2006.10.146","volume":"70","author":"G Liu","year":"2007","unstructured":"Liu, G., Yi, Z., Yang, S.: A hierarchical intrusion detection model based on the PCA neural networks. Neurocomputing 70(7-9), 1561\u20131568 (2007)","journal-title":"Neurocomputing"},{"issue":"1","key":"25_CR5","first-page":"37","volume":"39","author":"A Sharma","year":"2012","unstructured":"Sharma, A., Panigrahi, P.K.: A review of financial accounting fraud detection based on data mining techniques. Int. J. Comput. Appl. 39(1), 37\u201347 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"25_CR6","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/SURV.2013.030713.00201","volume":"15","author":"A Nadeem","year":"2013","unstructured":"Nadeem, A., Howarth, M.P.: A survey of MANET intrusion detection amp; prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027\u20132045 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"VJ Hodge","year":"2004","unstructured":"Hodge, V.J., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22, 85\u2013126 (2004)","journal-title":"Artif. Intell. Rev."},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.neucom.2014.04.073","volume":"149, Part A","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Li, D., Du, Y., Pan, Z.: Anomaly detection in traffic using l1-norm minimization extreme learning machine. Neurocomputing 149, Part A, 415\u2013425 (2015)","journal-title":"Neurocomputing"},{"key":"25_CR9","first-page":"144","volume":"143","author":"D Xu","year":"2014","unstructured":"Xu, D., Song, R., Wu, X., Li, N., Feng, W., Qian, H.: Video anomaly detection based on a hierarchical activity discovery within spatio-temporal contexts. Neuro-Computing 143, 144\u2013152 (2014)","journal-title":"Neuro-Computing"},{"key":"25_CR10","unstructured":"Wang, J., Xu, Z.: Crowd anomaly detection for automated video surveillance. In: Proceedings of the ICDP, pp. 1\u20136 (2015)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Cui, X., Liu, Q., Gao, M., Metaxas, D.N.: Abnormal detection using interaction energy potentials. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3161\u20133167. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995558"},{"issue":"11","key":"25_CR12","doi-asserted-by":"publisher","first-page":"3639","DOI":"10.1109\/TIE.2009.2027926","volume":"57","author":"X Li","year":"2010","unstructured":"Li, X., Bowers, C.P., Schnier, T.: Classification of energy consumption in buildings with outlier detection. IEEE Trans. Ind. Electron. 57(11), 3639\u20133644 (2010)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"25_CR13","unstructured":"MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics, pp. 281\u2013297 (1967)"},{"key":"25_CR14","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise, pp. 226\u2013231. AAAI Press (1996)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-46145-0_17","volume-title":"Data Warehousing and Knowledge Discovery","author":"S Hawkins","year":"2002","unstructured":"Hawkins, S., He, H., Williams, G., Baxter, R.: Outlier detection using replicator neural networks. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol. 2454, pp. 170\u2013180. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-46145-0_17"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Sakurada, M., Yairi, T.: Anomaly detection using autoencoders with nonlinear dimensionality reduction. In: Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, p. 4. ACM (2014)","DOI":"10.1145\/2689746.2689747"},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121\u2013134 (2016)","journal-title":"Pattern Recogn."}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2019 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-40907-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T01:48:29Z","timestamp":1581558509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-40907-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030409067","9783030409074"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-40907-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"OTM Confederated International Conferences \"On the Move to Meaningful Internet Systems\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"otm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.otmconferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}