{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:09:07Z","timestamp":1743008947814,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031600227"},{"type":"electronic","value":"9783031600234"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60023-4_12","type":"book-chapter","created":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T18:02:10Z","timestamp":1719770530000},"page":"85-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Application of\u00a0the\u00a0Tabular Data Transformation to\u00a0Images in\u00a0the\u00a0Intrusion Detection Tasks Using Deep Learning Techniques"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2923-4954","authenticated-orcid":false,"given":"Evgenia","family":"Novikova","sequence":"first","affiliation":[]},{"given":"Marat","family":"Bukhtiarov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6859-7120","authenticated-orcid":false,"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6707-9153","authenticated-orcid":false,"given":"Elena","family":"Fedorchenko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9051-5272","authenticated-orcid":false,"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,1]]},"reference":[{"key":"12_CR1","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-031-25538-0_10","volume-title":"Security and Privacy in Communication Networks","author":"F Abazari","year":"2023","unstructured":"Abazari, F., Branca, E., Novikova, E., Stakhanova, N.: Language and platform independent attribution of heterogeneous code. In: Li, F., Liang, K., Lin, Z., Katsikas, S.K. (eds.) SecureComm 2022. LNICST, vol. 462, pp. 173\u2013191. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-25538-0_10"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-030-29962-0_3","volume-title":"Computer Security \u2013 ESORICS 2019","author":"S Alrabaee","year":"2019","unstructured":"Alrabaee, S., Karbab, E.M.B., Wang, L., Debbabi, M.: BinEye: towards efficient binary authorship characterization using deep\u00a0learning. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 47\u201367. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29962-0_3"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.future.2021.04.017","volume":"123","author":"G Andresini","year":"2021","unstructured":"Andresini, G., Appice, A., De Rose, L., Malerba, D.: Gan augmentation to deal with imbalance in imaging-based intrusion detection. Futur. Gener. Comput. Syst. 123, 108\u2013127 (2021). https:\/\/doi.org\/10.1016\/j.future.2021.04.017","journal-title":"Futur. Gener. Comput. Syst."},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"53346","DOI":"10.1109\/ACCESS.2020.2980937","volume":"8","author":"G Andresini","year":"2020","unstructured":"Andresini, G., Appice, A., Mauro, N.D., Loglisci, C., Malerba, D.: Multi-channel deep feature learning for intrusion detection. IEEE Access 8, 53346\u201353359 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2980937","journal-title":"IEEE Access"},{"key":"12_CR5","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-18197-y","author":"O Bazgir","year":"2020","unstructured":"Bazgir, O., Zhang, R., Dhruba, S.R., Rahman, R., Ghosh, S., Pal, R.: Representation of features as images with neighborhood dependencies for compatibility with convolutional neural networks. Nat. Commun. (2020). https:\/\/doi.org\/10.1038\/s41467-020-18197-y","journal-title":"Nat. Commun."},{"key":"12_CR6","first-page":"087","volume":"12","author":"F Chollet","year":"2021","unstructured":"Chollet, F.: A transfer learning with deep neural network approach for network intrusion detection. Int. J. Intell. Comput. Res. (IJICR) 12, 087\u20131095 (2021)","journal-title":"Int. J. Intell. Comput. Res. (IJICR)"},{"key":"12_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100053","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte, V., Hussain, J.: Dcnnbilstm: an efficient hybrid deep learning-based intrusion detection system. Telematics Inform. Rep. 10, 100053 (2023). https:\/\/doi.org\/10.1016\/j.teler.2023.100053","journal-title":"Telematics Inform. Rep."},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Khan, R.U., Zhang, X., Alazab, M., Kumar, R.: An improved convolutional neural network model for intrusion detection in networks. In: 2019 Cybersecurity and Cyberforensics Conference (CCC), pp. 74\u201377 (2019). https:\/\/doi.org\/10.1109\/CCC.2019.000-6","DOI":"10.1109\/CCC.2019.000-6"},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Kim, J., Kim, J., Kim, H., Shim, M., Choi, E.: CNN-based network intrusion detection against denial-of-service attacks. Electronics 9(6) (2020). https:\/\/doi.org\/10.3390\/electronics9060916","DOI":"10.3390\/electronics9060916"},{"key":"12_CR10","doi-asserted-by":"publisher","unstructured":"Kim, T., Pak, W.: Deep learning-based network intrusion detection using multiple image transformers. Appl. Sci. 13(5) (2023). https:\/\/doi.org\/10.3390\/app13052754. https:\/\/www.mdpi.com\/2076-3417\/13\/5\/2754","DOI":"10.3390\/app13052754"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Kim, T., Suh, S.C., Kim, H., Kim, J., Kim, J.: An encoding technique for CNN-based network anomaly detection. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 2960\u20132965 (2018). https:\/\/doi.org\/10.1109\/BigData.2018.8622568","DOI":"10.1109\/BigData.2018.8622568"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Leevy, J.L., Khoshgoftaar, T.M.: A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 big data. J. Big Data 7 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00382-x","DOI":"10.1186\/s40537-020-00382-x"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1007\/978-3-319-70139-4_87","volume-title":"Neural Information Processing","author":"Z Li","year":"2017","unstructured":"Li, Z., Qin, Z., Huang, K., Yang, X., Ye, S.: Intrusion detection using convolutional neural networks for representation learning. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.-S.M. (eds.) ICONIP 2017. LNCS, vol. 10638, pp. 858\u2013866. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70139-4_87"},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Masum, M., Shahriar, H.: TL-NID: deep neural network with transfer learning for network intrusion detection. In: 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST), pp.\u00a01\u20137 (2020). https:\/\/doi.org\/10.23919\/ICITST51030.2020.9351317","DOI":"10.23919\/ICITST51030.2020.9351317"},{"key":"12_CR15","doi-asserted-by":"publisher","unstructured":"Mohammadpour, L., Ling, T.C., Liew, C.S., Aryanfar, A.: A survey of CNN-based network intrusion detection. Appl. Sci. 12(16) (2022). https:\/\/doi.org\/10.3390\/app12168162","DOI":"10.3390\/app12168162"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp.\u00a01\u20136 (2015). https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec 2011. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/2016904.2016908","DOI":"10.1145\/2016904.2016908"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Noever, D.A., Noever, S.E.M.: Image classifiers for network intrusions. CoRR abs\/2103.07765 (2021). https:\/\/arxiv.org\/abs\/2103.07765","DOI":"10.5121\/csit.2021.110504"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: International Conference on Information Systems Security and Privacy, pp. 108\u2013116 (2018). https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"12_CR20","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47765-6","author":"A Sharma","year":"2019","unstructured":"Sharma, A., Vans, E., Shigemizu, D., Boroevich, K.A., Tsunoda, T.: DeepInsight: a methodology to transform a non-image data to an image for convolution neural network architecture. Sci. Rep. (2019). https:\/\/doi.org\/10.1038\/s41598-019-47765-6","journal-title":"Sci. Rep."},{"key":"12_CR21","doi-asserted-by":"publisher","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.\u00a01\u20136 (2009). https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"12_CR22","doi-asserted-by":"publisher","unstructured":"Wu, P., Guo, H., Buckland, R.: A transfer learning approach for network intrusion detection. In: 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), pp. 281\u2013285 (2019). https:\/\/doi.org\/10.1109\/ICBDA.2019.8713213","DOI":"10.1109\/ICBDA.2019.8713213"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"64366","DOI":"10.1109\/ACCESS.2019.2917299","volume":"7","author":"H Yang","year":"2019","unstructured":"Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366\u201364374 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2917299","journal-title":"IEEE Access"},{"key":"12_CR24","doi-asserted-by":"publisher","unstructured":"Zhu, Y., et al.: Converting tabular data into images for deep learning with convolutional neural networks. Sci. Rep. (2021). https:\/\/doi.org\/10.1038\/s41598-021-90923-y","DOI":"10.1038\/s41598-021-90923-y"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60023-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T18:03:02Z","timestamp":1719770582000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60023-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031600227","9783031600234"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60023-4_12","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2023.haw-hamburg.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}