{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T09:04:36Z","timestamp":1759741476260,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030519704"},{"type":"electronic","value":"9783030519711"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51971-1_24","type":"book-chapter","created":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T17:03:00Z","timestamp":1596906180000},"page":"297-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Novel Approach for Intrusion Detection Based on Deep Belief Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5271-2382","authenticated-orcid":false,"given":"Cao Tien","family":"Thanh","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,9]]},"reference":[{"issue":"3","key":"24_CR1","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1109\/SURV.2013.102913.00020","volume":"16","author":"E Bou-Harb","year":"2014","unstructured":"Bou-Harb, E., Debbabi, M., Assi, C., Scanning, C.: A comprehensive survey. IEEE Commun. Surv. Tutorials 16(3), 1496\u20131519 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Gao, M., Tian, J., Xia, M.: Intrusion detection method based on classify support vector machine. In: Second International Conference on Intelligent Computation Technology and Automation, ICICTA 2009, vol. 2, pp. 391\u2013394 (2009)","DOI":"10.1109\/ICICTA.2009.330"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Vidhya, M.: Efficient classification of portscan attacks using support vector machine, green high performance computing (ICGHPC). In: 2013 IEEE International Conference (2013)","DOI":"10.1109\/ICGHPC.2013.6533915"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Lee, S.Y, Kim, Y.S., Lee, B.H., Kang, S.H., Youn, C.H.: A probe detection model using the analysis of the fuzzy cognitive maps. In: Computational Science and Its Applications ICCSA 2005, pp. 287\u2013291 (2005)","DOI":"10.1007\/11424758_34"},{"key":"24_CR5","unstructured":"Dr. Revathi, S., Malathi, A.: A detailed analysis on NSLKDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT), 2, 1848\u20131853 (2013)"},{"key":"24_CR6","unstructured":"Elleithy, K.M., Blagovic, D., Cheng, W.K., Sideleau, P.: Denial of service attack techniques: analysis, implementation and comparison, January 2006"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bica.2018.04.009","volume":"24","author":"M Fatahi","year":"2018","unstructured":"Fatahi, M., Shahsavari, M., Ahmadi, M., Ahmadi, A., Boulet, P., Devienne, P.: Rate-coded DBN: an online strategy for spike-based deep belief networks. Biological. Inspired Cogn. Archit. 24, 59\u201369 (2018)","journal-title":"Biological. Inspired Cogn. Archit."},{"issue":"6","key":"24_CR8","first-page":"339","volume":"14","author":"MH Bhuyan","year":"2012","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: AOCD: an adaptive outlier based coordinated scan detection approach. IJ Netw. Secur. 14(6), 339\u2013351 (2012)","journal-title":"IJ Netw. Secur."},{"key":"24_CR9","doi-asserted-by":"publisher","unstructured":"Hinton, G.E.: Learning multiple layers of representation, Trends Cogn. Sci. 11, 428\u2013434 (2007). https:\/\/doi.org\/10.1016\/j.tics.2007.09.004","DOI":"10.1016\/j.tics.2007.09.004"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"GE Hinton","year":"2016","unstructured":"Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18, 1527\u20131554 (2016)","journal-title":"Neural Comput."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS). IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"24_CR12","doi-asserted-by":"publisher","unstructured":"Wei, P., Li, Y., Zhang, Z., Hu, T., Li, Z., Liu, D.: An optimization method for intrusion detection classification model based on deep belief network, IEEE Access, 7, 87593\u201387605 (2019). https:\/\/doi.org\/10.1109\/access.2019.2925828","DOI":"10.1109\/access.2019.2925828"},{"key":"24_CR13","unstructured":"Dr. Revathi, S., Malathi. A.: A detailed analysis on NSLKDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT), 2, 1848\u20131853 (2013)"},{"issue":"3","key":"24_CR14","first-page":"25","volume":"2","author":"C Ambedkar","year":"2015","unstructured":"Ambedkar, C., Kishore Babu, V.: Detection of probe attacks using machine learning techniques. Int. J. Res. Stud. Comput. Sci. Eng. (IJRSCSE) 2(3), 25\u201329 (2015)","journal-title":"Int. J. Res. Stud. Comput. Sci. Eng. (IJRSCSE)"},{"key":"24_CR15","doi-asserted-by":"publisher","unstructured":"Verma A., Mehta, S.: A comparative study of ensemble learning methods for classification in bioinformatics. In: 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, pp. 155\u2013158 (2017). https:\/\/doi.org\/10.1109\/confluence.2017.7943141","DOI":"10.1109\/confluence.2017.7943141"},{"key":"24_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/493931","volume":"2013","author":"G Xie","year":"2013","unstructured":"Xie, G., Zhao, Y., Jiang, M., Zhang, N.: A novel ensemble learning approach for corporate financial distress forecasting in fashion and textiles supply chains. Math. Probl. Eng. 2013, 1\u20139 (2013). https:\/\/doi.org\/10.1155\/2013\/493931","journal-title":"Math. Probl. Eng."},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.ins.2015.10.011","volume":"330","author":"Y Li","year":"2016","unstructured":"Li, Y., Bai, C., Reddy, C.K.: A distributed ensemble approach for mining healthcare data under privacy constraints. Inf. Sci. (Ny) 330, 245\u2013259 (2016). https:\/\/doi.org\/10.1016\/j.ins.2015.10.011","journal-title":"Inf. Sci. (Ny)"},{"issue":"1","key":"24_CR18","doi-asserted-by":"publisher","first-page":"967","DOI":"10.3233\/JIFS-172053","volume":"35","author":"TK Tran","year":"2018","unstructured":"Tran, T.K., Phan, T.T.: A hybrid approach for building a Vietnamese sentiment dictionary. J. Intell. Fuzzy Syst. 35(1), 967\u2013978 (2018). https:\/\/doi.org\/10.3233\/JIFS-172053","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"13","key":"24_CR19","doi-asserted-by":"publisher","first-page":"2760","DOI":"10.3390\/app9132760","volume":"9","author":"TK Tran","year":"2019","unstructured":"Tran, T.K., Phan, T.T.: Deep learning application to ensemble learning\u2014the simple, but effective, approach to sentiment classifying. Appl. Sci. 9(13), 2760 (2019). https:\/\/doi.org\/10.3390\/app9132760","journal-title":"Appl. Sci."},{"issue":"3","key":"24_CR20","first-page":"239","volume":"9","author":"TK Tran","year":"2017","unstructured":"Tran, T.K., Phan, T.T.: Mining opinion targets and opinion words from online reviews. Int. J. Inf. Technol. 9(3), 239\u2013249 (2017)","journal-title":"Int. J. Inf. Technol."}],"container-title":["Advances in Intelligent Systems and Computing","Artificial Intelligence and Bioinspired Computational Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51971-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T19:20:50Z","timestamp":1618255250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51971-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030519704","9783030519711"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51971-1_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}