{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:45:34Z","timestamp":1767771934091,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030577957"},{"type":"electronic","value":"9783030577964"}],"license":[{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57796-4_20","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T05:22:44Z","timestamp":1597900964000},"page":"204-215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Accelerated Neural Intrusion Detection for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Tarek","family":"Batiha","sequence":"first","affiliation":[]},{"given":"Pavel","family":"Kr\u00f6mer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393\u2013422 (2002)","journal-title":"Comput. Netw."},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1186\/s40537-019-0248-6","volume":"6","author":"K Al Jallad","year":"2019","unstructured":"Al Jallad, K., Aljnidi, M., Desouki, M.S.: Big data analysis and distributed deep learning for next-generation intrusion detection system optimization. J. Big Data 6(1), 88 (2019). \nhttps:\/\/doi.org\/10.1186\/s40537-019-0248-6","journal-title":"J. Big Data"},{"doi-asserted-by":"publisher","unstructured":"Almomani, I., Al-Kasasbeh, B., AL-Akhras, M.: WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. J. Sens. 2016 (2016). \nhttps:\/\/doi.org\/10.1155\/2016\/4731953","key":"20_CR3","DOI":"10.1155\/2016\/4731953"},{"issue":"9","key":"20_CR4","doi-asserted-by":"publisher","first-page":"2048","DOI":"10.3390\/s19092048.31052514[pmid]","volume":"19","author":"J Barth\u00e9lemy","year":"2019","unstructured":"Barth\u00e9lemy, J., Verstaevel, N., Forehead, H., Perez, P.: Edge-computing video analytics for real-time traffic monitoring in a smart city. Sensors 19(9), 2048 (2019). \nhttps:\/\/doi.org\/10.3390\/s19092048.31052514[pmid]","journal-title":"Sensors"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-981-13-8311-3_28","volume-title":"Intelligent Decision Technologies 2019","author":"T Batiha","year":"2020","unstructured":"Batiha, T., Prauzek, M., Kr\u00f6mer, P.: Intrusion detection in wireless sensor networks by an ensemble of artificial neural networks. In: Czarnowski, I., Howlett, R.J., Jain, L.C. (eds.) Intelligent Decision Technologies 2019, pp. 323\u2013333. Springer, Singapore (2020)"},{"key":"20_CR6","volume-title":"Computer Security: Art and Science","author":"M Bishop","year":"2003","unstructured":"Bishop, M.: Computer Security: Art and Science. Addison-Wesley, Boston (2003)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3389\/fnins.2014.00010","volume":"8","author":"K Carlson","year":"2014","unstructured":"Carlson, K., Nageswaran, J., Dutt, N., Krichmar, J.: An efficient automated parameter tuning framework for spiking neural networks. Front. Neurosci. 8, 10 (2014). \nhttps:\/\/doi.org\/10.3389\/fnins.2014.00010","journal-title":"Front. Neurosci."},{"key":"20_CR8","volume-title":"Security in Wireless Ad Hoc and Sensor Networks","author":"E Cayirci","year":"2008","unstructured":"Cayirci, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, Hoboken (2008)"},{"key":"20_CR9","volume-title":"Deep Learning with Python","author":"F Chollet","year":"2017","unstructured":"Chollet, F.: Deep Learning with Python, 1st edn. Manning Publ. Co., USA (2017)","edition":"1"},{"issue":"7","key":"20_CR10","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/BF02994844","volume":"55","author":"H Debar","year":"2000","unstructured":"Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Annales Des T\u00e9l\u00e9communications 55(7), 361\u2013378 (2000). \nhttps:\/\/doi.org\/10.1007\/BF02994844","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"issue":"1","key":"20_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/72.363452","volume":"6","author":"S Ergezinger","year":"1995","unstructured":"Ergezinger, S., Thomsen, E.: An accelerated learning algorithm for multilayer perceptrons: optimization layer by layer. IEEE Trans. Neural Netw. 6(1), 31\u201342 (1995). \nhttps:\/\/doi.org\/10.1109\/72.363452","journal-title":"IEEE Trans. Neural Netw."},{"key":"20_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0412-4","volume-title":"Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis. Signals and Communication Technology","author":"H Fahmy","year":"2016","unstructured":"Fahmy, H.: Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis. Signals and Communication Technology. Springer, Singapore (2016)"},{"unstructured":"Ghosh, A.K., Schwartzbard, A.: A study in using neural networks for anomaly and misuse detection. In: Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8, SSYM 1999, p. 12. USENIX Association, Berkeley (1999)","key":"20_CR13"},{"doi-asserted-by":"publisher","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 2, p. 10 (2000). \nhttps:\/\/doi.org\/10.1109\/HICSS.2000.926982","key":"20_CR14","DOI":"10.1109\/HICSS.2000.926982"},{"issue":"6","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), 1\u201317 (2016). \nhttps:\/\/doi.org\/10.1371\/journal.pone.0155781","journal-title":"PLoS ONE"},{"doi-asserted-by":"publisher","unstructured":"Kirk, D.: Nvidia CUDA software and GPU parallel computing architecture. In: Proceedings of the 6th international Symposium on Memory Management, ISMM 2007, pp. 103\u2013104. Association for Computing Machinery, New York (2007). \nhttps:\/\/doi.org\/10.1145\/1296907.1296909","key":"20_CR16","DOI":"10.1145\/1296907.1296909"},{"doi-asserted-by":"publisher","unstructured":"Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20) (2019). \nhttps:\/\/doi.org\/10.3390\/app9204396","key":"20_CR17","DOI":"10.3390\/app9204396"},{"unstructured":"Masters, D., Luschi, C.: Revisiting small batch training for deep neural networks (2018)","key":"20_CR18"},{"doi-asserted-by":"publisher","unstructured":"Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest (2018). \nhttps:\/\/doi.org\/10.1155\/2018\/4943509","key":"20_CR19","DOI":"10.1155\/2018\/4943509"},{"doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. CoRR abs\/1802.09089 (2018)","key":"20_CR20","DOI":"10.14722\/ndss.2018.23204"},{"issue":"3","key":"20_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26\u201341 (1994). \nhttps:\/\/doi.org\/10.1109\/65.283931","journal-title":"IEEE Netw."},{"key":"20_CR22","series-title":"Risk Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21269-2","volume-title":"Security in Wireless Sensor Networks","author":"G Oreku","year":"2016","unstructured":"Oreku, G., Pazynyuk, T.: Security in Wireless Sensor Networks. Risk Engineering. Springer, Cham (2016)"},{"key":"20_CR23","volume-title":"Computer Security: Principles and Practice","author":"W Stallings","year":"2018","unstructured":"Stallings, W., Brown, L.: Computer Security: Principles and Practice, 4th edn. Pearson, New York (2018). Always learning","edition":"4"},{"doi-asserted-by":"publisher","unstructured":"Stehlik, M., Matyas, V., Stetsko, A.: Attack detection using evolutionary computation, pp. 99\u2013129. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-47715-2_5","key":"20_CR24","DOI":"10.1007\/978-3-319-47715-2_5"},{"issue":"9","key":"20_CR25","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.3390\/s19091977.31035611[pmid]","volume":"19","author":"G Thamilarasu","year":"2019","unstructured":"Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019). \nhttps:\/\/doi.org\/10.3390\/s19091977.31035611[pmid]","journal-title":"Sensors"},{"unstructured":"Vanhoucke, V., Senior, A., Mao, M.Z.: Improving the speed of neural networks on CPUs. In: Deep Learning and Unsupervised Feature Learning Workshop. NIPS (2011)","key":"20_CR26"},{"doi-asserted-by":"publisher","unstructured":"Varghese, J., Muniyal, B.: A comparative analysis of different soft computing techniques for intrusion detection system. In: Thampi, S., Rawat, D., Alcaraz Calero, J., Madria, S., Wang, G. (eds.) Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers, Communications in Computer and Information Science, pp. 563\u2013577. Springer, Germany (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-5826-5_44","key":"20_CR27","DOI":"10.1007\/978-981-13-5826-5_44"},{"issue":"1","key":"20_CR28","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF02828630","volume":"10","author":"Y Yu","year":"2005","unstructured":"Yu, Y., Ge, Y., Fu-xiang, G.: A neural network approach for misuse and anomaly intrusion detection. Wuhan Univ. J. Nat. Sci. 10(1), 115\u2013118 (2005). \nhttps:\/\/doi.org\/10.1007\/BF02828630","journal-title":"Wuhan Univ. J. Nat. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Intelligent Networking and Collaborative Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57796-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T05:31:12Z","timestamp":1597901472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57796-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,21]]},"ISBN":["9783030577957","9783030577964"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57796-4_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,21]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INCoS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Networking and Collaborative Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Victoria, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/incos\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}