{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T02:05:39Z","timestamp":1772071539090,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031459320","type":"print"},{"value":"9783031459337","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_30","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"513-523","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Design of\u00a0Network Attack Detection Using Causal and\u00a0Non-causal Temporal Convolutional Network"],"prefix":"10.1007","author":[{"given":"Pengju","family":"He","sequence":"first","affiliation":[]},{"given":"Haibo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yaokai","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"publisher","first-page":"310","DOI":"10.3390\/sym14020310","volume":"14","author":"P Cheng","year":"2022","unstructured":"Cheng, P., Xu, K., Li, S., et al.: TCAN-IDS: intrusion detection system for internet of vehicle using temporal convolutional attention network. Symmetry 14(2), 310 (2022). https:\/\/doi.org\/10.3390\/sym14020310","journal-title":"Symmetry"},{"key":"30_CR2","unstructured":"Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271 (2018)"},{"issue":"1","key":"30_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad, Z., Shahid Khan, A., Wai Shiang, C., et al.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021). https:\/\/doi.org\/10.1002\/ett.4150","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"70245","DOI":"10.1109\/ACCESS.2020.2986882","volume":"8","author":"A Kim","year":"2020","unstructured":"Kim, A., Park, M., Lee, D.H.: AI-IDS: application of deep learning to real-time Web intrusion detection. IEEE Access 8, 70245\u201370261 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2986882","journal-title":"IEEE Access"},{"key":"30_CR5","unstructured":"Gopali, S., Abri, F., Siami-Namini, S., et al.: A comparative study of detecting anomalies in time series data using LSTM and TCN models. arXiv preprint arXiv:2112.09293 (2021)"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-63710-1_13","volume-title":"Bioinspired Optimization Methods and Their Applications","author":"M Thill","year":"2020","unstructured":"Thill, M., Konen, W., B\u00e4ck, T.: Time series encodings with temporal convolutional networks. In: Filipi\u010d, B., Minisci, E., Vasile, M. (eds.) BIOMA 2020. LNCS, vol. 12438, pp. 161\u2013173. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63710-1_13"},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/6689134","volume":"2020","author":"A Derhab","year":"2020","unstructured":"Derhab, A., Aldweesh, A., Emam, A.Z., et al.: Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wirel. Commun. Mob. Comput. 2020, 1\u201316 (2020)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"2","key":"30_CR8","first-page":"52","volume":"15","author":"N Fu","year":"2019","unstructured":"Fu, N., Kamili, N., Huang, Y., et al.: A novel deep intrusion detection model based on a convolutional neural network. Aust. J. Intell. Inf. Process. Syst. 15(2), 52\u201359 (2019)","journal-title":"Aust. J. Intell. Inf. Process. Syst."},{"issue":"1","key":"30_CR9","first-page":"1","volume":"2","author":"AS Ashoor","year":"2011","unstructured":"Ashoor, A.S., Gore, S.: Importance of intrusion detection system (IDS). Int. J. Sci. Eng. Res. 2(1), 1\u20134 (2011)","journal-title":"Int. J. Sci. Eng. Res."},{"issue":"1","key":"30_CR10","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., et al.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Y., Dong, H., Wang, X., et al.: Time series prediction based on temporal convolutional network. In: 2019 IEEE\/ACIS 18th International Conference on Computer and Information Science (ICIS), pp 300\u2013305. IEEE (2019)","DOI":"10.1109\/ICIS46139.2019.8940265"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Xu, B., Lu, C., Guo, Y., et al.: Discriminative multi-modality speech recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14433\u201314442 (2020)","DOI":"10.1109\/CVPR42600.2020.01444"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"He, Y., Zhao, J.: Temporal convolutional networks for anomaly detection in time series. In: Journal of Physics: Conference Series, vol. 1213, no. 4, p. 042050. IOP Publishing (2019)","DOI":"10.1088\/1742-6596\/1213\/4\/042050"},{"key":"30_CR14","doi-asserted-by":"publisher","unstructured":"Ghulam Mohi-ud-Din, December 29, 2018, \u201cNSL-KDD\u201d, IEEE Dataport. https:\/\/doi.org\/10.21227\/425a-3e55","DOI":"10.21227\/425a-3e55"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-319-49409-8_7","volume-title":"Computer Vision \u2013 ECCV 2016 Workshops","author":"C Lea","year":"2016","unstructured":"Lea, C., Vidal, R., Reiter, A., Hager, G.D.: Temporal convolutional networks: a unified approach to action segmentation. In: Hua, G., J\u00e9gou, H. (eds.) ECCV 2016. LNCS, vol. 9915, pp. 47\u201354. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49409-8_7"},{"issue":"1","key":"30_CR16","first-page":"247","volume":"8","author":"J Raiyn","year":"2014","unstructured":"Raiyn, J.: A survey of cyber attack detection strategies. Int. J. Secur. Appl. 8(1), 247\u2013256 (2014)","journal-title":"Int. J. Secur. Appl."},{"issue":"1","key":"30_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372823","volume":"53","author":"N Kaloudi","year":"2020","unstructured":"Kaloudi, N., Li, J.: The AI-based cyber threat landscape: a survey. ACM Comput. Surv. (CSUR) 53(1), 1\u201334 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Ding, Y., Zhai, Y.: Intrusion detection system for NSL-KDD dataset using convolutional neural networks. In: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, pp. 81\u201385 (2018)","DOI":"10.1145\/3297156.3297230"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Belgrana, F.Z., Benamrane, N., Hamaida, M.A., et al.: Network intrusion detection system using neural network and condensed nearest neighbors with selection of NSL-KDD influencing features. In: 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), pp. 23\u201329. IEEE (2021)","DOI":"10.1109\/IoTaIS50849.2021.9359689"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Chaibi, N., Atmani, B., Mokaddem, M.: Deep learning approaches to intrusion detection: a new performance of ANN and RNN on NSL-KDD. In: Proceedings of the 1st International Conference on Intelligent Systems and Pattern Recognition, pp. 45\u201349 (2020)","DOI":"10.1145\/3432867.3432889"},{"issue":"5","key":"30_CR21","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3390\/info11050243","volume":"11","author":"PS Muhuri","year":"2020","unstructured":"Muhuri, P.S., Chatterjee, P., Yuan, X., et al.: Using a long short-term memory recurrent neural network (LSTM-RNN) to classify network attacks. Information 11(5), 243 (2020)","journal-title":"Information"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., et al.: Deep recurrent neural network for intrusion detection in SDN-based networks. In: 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), pp. 202\u2013206. IEEE (2018)","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"30_CR23","doi-asserted-by":"publisher","first-page":"140136","DOI":"10.1109\/ACCESS.2021.3116612","volume":"9","author":"W Xu","year":"2021","unstructured":"Xu, W., Jang-Jaccard, J., Singh, A., et al.: Improving performance of autoencoder-based network anomaly detection on NSL-KDD dataset. IEEE Access 9, 140136\u2013140146 (2021)","journal-title":"IEEE Access"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yeo, C.K., Lee, B.S., et al.: Autoencoder-based network anomaly detection. In: 2018 Wireless Telecommunications Symposium (WTS), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/WTS.2018.8363930"},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"30_CR26","doi-asserted-by":"crossref","unstructured":"Althubiti, S.A., Jones, E.M., Roy, K.: LSTM for anomaly-based network intrusion detection. In: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20133. IEEE (2018)","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Selvin, S., Vinayakumar, R., Gopalakrishnan, E.A., et al.: Stock price prediction using LSTM, RNN and CNN-sliding window model. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1643\u20131647. IEEE (2017)","DOI":"10.1109\/ICACCI.2017.8126078"},{"key":"30_CR28","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-981-13-2285-3_58","volume-title":"Emerging Trends in Expert Applications and Security","author":"K Pawar","year":"2019","unstructured":"Pawar, K., Jalem, R.S., Tiwari, V.: Stock market price prediction using LSTM RNN. In: Rathore, V.S., Worring, M., Mishra, D.K., Joshi, A., Maheshwari, S. (eds.) Emerging Trends in Expert Applications and Security. AISC, vol. 841, pp. 493\u2013503. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-2285-3_58"},{"key":"30_CR29","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-64758-2_6","volume-title":"Selected Papers from the 12th International Networking Conference","author":"H Hindy","year":"2021","unstructured":"Hindy, H., Bayne, E., Bures, M., Atkinson, R., Tachtatzis, C., Bellekens, X.: Machine learning based IoT intrusion detection system: an MQTT case study (MQTT-IoT-IDS2020 dataset). In: Ghita, B., Shiaeles, S. (eds.) INC 2020. LNNS, vol. 180, pp. 73\u201384. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-64758-2_6"},{"key":"30_CR30","doi-asserted-by":"crossref","unstructured":"Yao, C., Yang, Y., Yang, J., et al.: A network security situation prediction method through the use of improved TCN and BiDLSTM. Math. Probl. Eng. 2022 (2022)","DOI":"10.1155\/2022\/7513717"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:07:15Z","timestamp":1700471235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}