{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:38:13Z","timestamp":1775540293182,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319480565","type":"print"},{"value":"9783319480572","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_9","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:37:01Z","timestamp":1477096621000},"page":"141-152","source":"Crossref","is-referenced-by-count":178,"title":["Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks"],"prefix":"10.1007","author":[{"given":"Lo\u00efc","family":"Bontemps","sequence":"first","affiliation":[]},{"given":"Van Loi","family":"Cao","sequence":"additional","affiliation":[]},{"given":"James","family":"McDermott","sequence":"additional","affiliation":[]},{"given":"Nhien-An","family":"Le-Khac","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"9_CR1","unstructured":"LSTM networks for sentiment analysis. In: LSTM networks for sentiment analysis deeplearning 0.1 documentation. http:\/\/deeplearning.net\/tutorial\/lstm.html#lstm . Accessed 25 Jun 2016"},{"key":"9_CR2","unstructured":"DARPA intrusion detection evaluation. (n.d.). http:\/\/www.ll.mit.edu\/ideval\/data\/1999data.html . Accessed 30 June 2016"},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"9_CR4","doi-asserted-by":"crossref","DOI":"10.1201\/b15088","volume-title":"Network Anomaly Detection: A Machine Learning Perspective","author":"DK Bhattacharyya","year":"2013","unstructured":"Bhattacharyya, D.K., Kalita, J.K.: Network Anomaly Detection: A Machine Learning Perspective. CRC Press, Boca Raton (2013)"},{"issue":"3","key":"9_CR5","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9_CR6","unstructured":"Chmielewski, A., Wierzchon, S.T.: V-detector algorithm with tree-based structures. In: Proceedings of the International Multiconference on Computer Science and Information Technology, Wis\u0142a (Poland), pp. 9\u201314. Citeseer (2006)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/3-540-46145-0_17","volume-title":"Data Warehousing and Knowledge Discovery","author":"S Hawkins","year":"2002","unstructured":"Hawkins, S., He, H., Williams, G.J., Baxter, R.A.: Outlier detection using replicator neural networks. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol. 2454, pp. 170\u2013180. Springer, Heidelberg (2002)"},{"issue":"8","key":"9_CR8","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"9_CR9","unstructured":"KDD Cup Dataset (1999). http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"issue":"4","key":"9_CR10","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. (TiSSEC) 3(4), 227\u2013261 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur. (TiSSEC)"},{"key":"9_CR11","first-page":"4","volume":"2009","author":"W Lu","year":"2009","unstructured":"Lu, W., Ghorbani, A.A.: Network anomaly detection based on wavelet analysis. EURASIP J. Adv. Sig. Proc. 2009, 4 (2009)","journal-title":"EURASIP J. Adv. Sig. Proc."},{"key":"9_CR12","unstructured":"Malhotra, P., Vig, L., Shroff, G., Agarwal, P.: Long short term memory networks for anomaly detection in time series. In: Proceedings, p. 89. Presses universitaires de Louvain (2015)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Marchi, E., Vesperini, F., Eyben, F., Squartini, S., Schuller, B.: A novel approach for automatic acoustic novelty detection using a denoising autoencoder with bidirectional lstm neural networks. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1996\u20132000. IEEE (2015)","DOI":"10.1109\/ICASSP.2015.7178320"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Marchi, E., Vesperini, F., Weninger, F., Eyben, F., Squartini, S., Schuller, B.: Non-linear prediction with lstm recurrent neural networks for acoustic novelty detection. In: 2015 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/IJCNN.2015.7280757"},{"key":"9_CR15","unstructured":"Olsson, T., Holst, A.: A probabilistic approach to aggregating anomalies for unsupervised anomaly detection with industrial applications. In: FLAIRS Conference, pp. 434\u2013439 (2015)"},{"key":"9_CR16","series-title":"Advances in Intelligent and Soft Computing","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-642-20505-7_26","volume-title":"Soft Computing in Industrial Applications","author":"MA Salama","year":"2011","unstructured":"Salama, M.A., Eid, H.F., Ramadan, R.A., Darwish, A., Hassanien, A.E.: Hybrid intelligent intrusion detection scheme. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds.) Soft Computing in Industrial Applications. AISC, vol. 96, pp. 293\u2013303. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:47:24Z","timestamp":1568486844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}