{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:08:22Z","timestamp":1744193302170,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811556784"},{"type":"electronic","value":"9789811556791"}],"license":[{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5679-1_5","type":"book-chapter","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:05:18Z","timestamp":1598688318000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3660-380X","authenticated-orcid":false,"given":"N. G.","family":"Bhuvaneswari Amma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4900-4745","authenticated-orcid":false,"given":"S.","family":"Selvakumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3418-9927","authenticated-orcid":false,"given":"R.","family":"Leela Velusamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,30]]},"reference":[{"unstructured":"Nsl-kdd dataset. \nhttp:\/\/www.unb.ca\/research\/iscx\/dataset\/iscx-NSL-KDD-dataset.html\n\n (2009)","key":"5_CR1"},{"unstructured":"Amma, N.G.B., Subramanian, S.: Vcdeepfl: Vector convolutional deep feature learning approach for identification of known and unknown denial of service attacks. In: TENCON 2018-2018 IEEE Region 10 Conference, pp. 640\u2013645. IEEE (2018)","key":"5_CR2"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2013","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303\u2013336 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10489-013-0452-6","volume":"40","author":"C Guo","year":"2014","unstructured":"Guo, C., Zhou, Y., Ping, Y., Zhang, Z., Liu, G., Yang, Y.: A distance sum-based hybrid method for intrusion detection. Appl. Intell. 40(1), 178\u2013188 (2014)","journal-title":"Appl. Intell."},{"issue":"1\u20133","key":"5_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10994-014-5473-9","volume":"101","author":"F Iglesias","year":"2015","unstructured":"Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101(1\u20133), 59\u201384 (2015). \nhttps:\/\/doi.org\/10.1007\/s10994-014-5473-9","journal-title":"Mach. Learn."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.patcog.2017.10.037","volume":"76","author":"PS Kim","year":"2018","unstructured":"Kim, P.S., Lee, D.G., Lee, S.W.: Discriminative context learning with gated recurrent unit for group activity recognition. Pattern Recogn. 76, 149\u2013161 (2018)","journal-title":"Pattern Recogn."},{"issue":"7553","key":"5_CR8","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436 (2015)","journal-title":"Nature"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2018","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21(1), 686\u2013728 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"crossref","unstructured":"NG, B.A., Selvakumar, S.: Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing 340, 294\u2013308 (2019)","key":"5_CR10","DOI":"10.1016\/j.neucom.2019.02.047"},{"doi-asserted-by":"crossref","unstructured":"Rezvy, S., Petridis, M., Lasebae, A., Zebin, T.: Intrusion detection and classification with autoencoded deep neural network. In: International Conference on Security for Information Technology and Communications, pp. 142\u2013156. Springer (2018)","key":"5_CR11","DOI":"10.1007\/978-3-030-12942-2_12"},{"issue":"1","key":"5_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41\u201350 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"issue":"1","key":"5_CR13","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/COMST.2014.2336610","volume":"17","author":"DJ Weller-Fahy","year":"2014","unstructured":"Weller-Fahy, D.J., Borghetti, B.J., Sodemann, A.A.: A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun. Surv. Tutor. 17(1), 70\u201391 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"crossref","unstructured":"Yousefi-Azar, M., Varadharajan, V., Hamey, L., Tupakula, U.: Autoencoder-based feature learning for cyber security applications. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 3854\u20133861. IEEE (2017)","key":"5_CR14","DOI":"10.1109\/IJCNN.2017.7966342"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5679-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:06:40Z","timestamp":1598688400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5679-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,30]]},"ISBN":["9789811556784","9789811556791"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5679-1_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,30]]},"assertion":[{"value":"30 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}