{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:59:33Z","timestamp":1743044373043,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030966263"},{"type":"electronic","value":"9783030966270"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96627-0_37","type":"book-chapter","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:22:32Z","timestamp":1651839752000},"page":"407-416","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents"],"prefix":"10.1007","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Avramenko","sequence":"additional","affiliation":[]},{"given":"Albert","family":"Malikov","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,7]]},"reference":[{"key":"37_CR1","unstructured":"Alkasassbeh, M.: An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods (2017). arXiv:1712.09623"},{"key":"37_CR2","unstructured":"Avramenko, V., Malikov, A., Kotenko, I., Saenko, I.: Combined neural network model for diagnosing computer incidents. In: 2020 CEUR Workshop Proceedings, pp. 280\u2013294. CEUR (2020)"},{"key":"37_CR3","unstructured":"Baldi, P.: Autoencoders, unsupervised learning, and deep architectures. In: Proceedings of ICML Workshop on Unsupervised and Transfer Learning, pp. 37\u201349. JMLR Workshop and Conference Proceedings (2012)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Bose, R.J.C., Mans, R.S., van\u00a0der Aalst, W.M.: Wanna improve process mining results? In: 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 127\u2013134. IEEE (2013)","DOI":"10.1109\/CIDM.2013.6597227"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, H.-J., Kumar, A.: Process mining on noisy logs\u2014can log sanitization help to improve performance? Decis. Support Syst. 79, 138\u2013149 (2015)","DOI":"10.1016\/j.dss.2015.08.003"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Fu, Q., Lou, J.-G., Wang, Y., Li, J.: Execution anomaly detection in distributed systems through unstructured log analysis. In: 2009 Ninth IEEE International Conference on Data Mining, pp. 149\u2013158. IEEE (2009)","DOI":"10.1109\/ICDM.2009.60"},{"key":"37_CR7","unstructured":"Hecht-Nielsen, R.: Kolmogorov\u2019s mapping neural network existence theorem. In: Proceedings of the International Conference on Neural Networks, vol.\u00a03, pp. 11\u201314. IEEE Press, New York (1987)"},{"key":"37_CR8","unstructured":"Khaikin, S.: Neural networks: full course. M.: Williams, 1104 (2006)"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Kotenko, I.: Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security. In: 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 614\u2013619. IEEE (2007)","DOI":"10.1109\/IDAACS.2007.4488494"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Polubelova, O., Saenko, I.: The ontological approach for siem data repository implementation. In: 2012 IEEE International Conference on Green Computing and Communications, pp. 761\u2013766. IEEE (2012)","DOI":"10.1109\/GreenCom.2012.125"},{"issue":"6","key":"37_CR11","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1134\/S1019331614060033","volume":"84","author":"I Kotenko","year":"2014","unstructured":"Kotenko, I., Saenko, I.: Creating new-generation cybersecurity monitoring and management systems. Herald Russ. Acad. Sci. 84(6), 424\u2013431 (2014)","journal-title":"Herald Russ. Acad. Sci."},{"key":"37_CR12","unstructured":"Kurd, Z.: Artificial neural networks in safety-critical applications. PhD thesis, Citeseer (2005)"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Larochelle, H., Erhan, D., Courville, A., Bergstra, J., Bengio, Y.: An empirical evaluation of deep architectures on problems with many factors of variation. In: Proceedings of the 24th International Conference on Machine Learning, pp. 473\u2013480 (2007)","DOI":"10.1145\/1273496.1273556"},{"key":"37_CR14","doi-asserted-by":"publisher","first-page":"165607","DOI":"10.1109\/ACCESS.2019.2953095","volume":"7","author":"J Lee","year":"2019","unstructured":"Lee, J., Kim, J., Kim, I., Han, K.: Cyber threat detection based on artificial neural networks using event profiles. IEEE Access 7, 165607\u2013165626 (2019)","journal-title":"IEEE Access"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Lv, F.,\u00a0Wen, C., Bao, Z., Liu, M.: Fault diagnosis based on deep learning. In: 2016 American Control Conference (ACC), pp. 6851\u20136856. IEEE (2016)","DOI":"10.1109\/ACC.2016.7526751"},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Nolle, T., Seeliger, A., M\u00fchlh\u00e4user, M.: Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders. In: International Conference on Discovery Science, pp. 442\u2013456. Springer (2016)","DOI":"10.1007\/978-3-319-46307-0_28"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Sakurada, M., Yairi, T.: Anomaly detection using autoencoders with nonlinear dimensionality reduction. In: Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, pp. 4\u201311 (2014)","DOI":"10.1145\/2689746.2689747"},{"issue":"1","key":"37_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41\u201350 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"37_CR19","unstructured":"Vaarandi, R.: A data clustering algorithm for mining patterns from event logs. In: Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003)(IEEE Cat. No. 03EX764), pp. 119\u2013126. IEEE (2003)"},{"issue":"5","key":"37_CR20","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1007\/s11390-016-1678-7","volume":"31","author":"D-Q Zou","year":"2016","unstructured":"Zou, D.-Q., Qin, H., Jin, H.: Uilog: Improving log-based fault diagnosis by log analysis. J. Comput. Sci. Technol. 31(5), 1038\u20131052 (2016)","journal-title":"J. Comput. Sci. Technol."}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96627-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:27:00Z","timestamp":1651840020000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96627-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030966263","9783030966270"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96627-0_37","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/idc2021.unirc.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}