{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:44:24Z","timestamp":1757544264945},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T00:00:00Z","timestamp":1583366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T00:00:00Z","timestamp":1583366400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10772-020-09693-z","type":"journal-article","created":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T16:03:56Z","timestamp":1583424236000},"page":"305-313","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A comprehensive novel model for network speech anomaly detection system using deep learning approach"],"prefix":"10.1007","volume":"23","author":[{"given":"A.","family":"Manimaran","sequence":"first","affiliation":[]},{"given":"D.","family":"Chandramohan","sequence":"additional","affiliation":[]},{"given":"S. G.","family":"Shrinivas","sequence":"additional","affiliation":[]},{"given":"N.","family":"Arulkumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,5]]},"reference":[{"key":"9693_CR5","doi-asserted-by":"crossref","unstructured":"Alom, Md. Z., Bontupalli, V. R., & Taha, T. M. (2015). Intrusion detection using deep belief networks. In 2015 National aerospace and electronics conference (NAECON). IEEE.","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"9693_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.petrol.2019.106487","author":"T Bikmukhametov","year":"2019","unstructured":"Bikmukhametov, T., & J\u00e4schke, J. (2019). First principles and machine learning Virtual Flow Metering: A literature review. Journal of Petroleum Science and Engineering. https:\/\/doi.org\/10.1016\/j.petrol.2019.106487.","journal-title":"Journal of Petroleum Science and Engineering"},{"key":"9693_CR11","doi-asserted-by":"crossref","unstructured":"Chowdhury, Md. M. U., et al. (2017). A few-shot deep learning approach for improved intrusion detection. In 2017 IEEE 8th annual ubiquitous computing, electronics and mobile communication conference (UEMCON). IEEE.","DOI":"10.1109\/UEMCON.2017.8249084"},{"key":"9693_CR20","doi-asserted-by":"publisher","first-page":"107019","DOI":"10.1016\/j.apacoust.2019.107019","volume":"157","author":"X Cui","year":"2020","unstructured":"Cui, X., Chen, Z., & Yin, F. (2020). Speech enhancement based on simple recurrent unit network. Applied Acoustics,157, 107019. https:\/\/doi.org\/10.1016\/j.apacoust.2019.107019.","journal-title":"Applied Acoustics"},{"key":"9693_CR21","doi-asserted-by":"publisher","first-page":"101646","DOI":"10.1016\/j.bspc.2019.101646","volume":"55","author":"JA Dom\u00ednguez-Jim\u00e9nez","year":"2020","unstructured":"Dom\u00ednguez-Jim\u00e9nez, J. A., Campo-Landines, K. C., Mart\u00ednez-Santos, J. C., Delahoz, E. J., & Contreras-Ortiz, S. H. (2020). A machine learning model for emotion recognition from physiological signals. Biomedical Signal Processing and Control,55, 101646.","journal-title":"Biomedical Signal Processing and Control"},{"key":"9693_CR2","unstructured":"Kim, J., & Kim, H. (2015). Applying recurrent neural network to intrusion detection with hessian free optimization. In International workshop on information security applications. Cham: Springer."},{"key":"9693_CR7","unstructured":"Kim, J., et al. (2017). Method of intrusion detection using deep neural network. In 2017 IEEE international conference on big data and smart computing (BigComp). IEEE."},{"key":"9693_CR3","unstructured":"Kolosnjaji, B., et al. (2016). Deep learning for classification of Malware system call sequences. In Australasian joint conference on artificial intelligence. Cham: Springer."},{"key":"9693_CR4","unstructured":"Li, Z., et al. (2017). Intrusion detection using convolutional neural networks for representation learning. In International conference on neural information processing. Cham: Springer."},{"key":"9693_CR16","unstructured":"Ma, T., et al. (2016). A hybrid methodologies for intrusion detection based deep neural network with support vector machine and clustering technique. In International conference on frontier computing. Singapore: Springer."},{"key":"9693_CR18","doi-asserted-by":"crossref","unstructured":"Malaiya, R. K., et al. (2018). An empirical evaluation of deep learning for network anomaly detection. In 2018 International conference on computing, networking and communications (ICNC). IEEE.","DOI":"10.1109\/ICCNC.2018.8390278"},{"issue":"2","key":"9693_CR19","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","volume":"1","author":"S Otoum","year":"2019","unstructured":"Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters,1(2), 68\u201371.","journal-title":"IEEE Networking Letters"},{"key":"9693_CR22","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.csl.2019.06.006","volume":"59","author":"H Perez-Espinosa","year":"2020","unstructured":"Perez-Espinosa, H., Martinez-Miranda, J., Espinosa-Curiel, I., Rodriguez-Jacobo, J., Villasenor-Pineda, L., & Avila-George, H. (2020). IESC-Child: An interactive emotional children\u2019s speech corpus. Computer Speech and Language,59, 55\u201374.","journal-title":"Computer Speech and Language"},{"key":"9693_CR17","doi-asserted-by":"crossref","unstructured":"Potluri, S., & Diedrich, C. (2016). Accelerated deep neural networks for enhanced Intrusion Detection System. In 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA). IEEE.","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"9693_CR8","unstructured":"Roy, S. S., et al. (2017). A deep learning based artificial neural network approach for intrusion detection. In International conference on mathematics and computing. Singapore: Springer."},{"issue":"1","key":"9693_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., et al. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence,2(1), 41\u201350.","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"key":"9693_CR1","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Applying convolutional neural network for network intrusion detection. In 2017 International conference on advances in computing, communications and informatics (ICACCI). IEEE.","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"9693_CR6","doi-asserted-by":"crossref","unstructured":"Wang, W., et al. (2017). Malware traffic classification using convolutional neural network for representation learning. In 2017 International conference on information networking (ICOIN). IEEE.","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"9693_CR13","doi-asserted-by":"publisher","first-page":"87593","DOI":"10.1109\/ACCESS.2019.2925828","volume":"7","author":"P Wei","year":"2019","unstructured":"Wei, P., et al. (2019). An optimization method for intrusion detection classification model based on deep belief network. IEEE Access,7, 87593\u201387605.","journal-title":"IEEE Access"},{"key":"9693_CR12","doi-asserted-by":"publisher","first-page":"48697","DOI":"10.1109\/ACCESS.2018.2867564","volume":"6","author":"C Xu","year":"2018","unstructured":"Xu, C., et al. (2018). An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access,6, 48697\u201348707.","journal-title":"IEEE Access"},{"key":"9693_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, X., & Chen, J. (2017). Deep learning based intelligent intrusion detection. In 2017 IEEE 9th international conference on communication software and networks (ICCSN). IEEE.","DOI":"10.1109\/ICCSN.2017.8230287"},{"key":"9693_CR15","unstructured":"Zhang, M., et al. (2017). A deep learning method to detect web attacks using a specially designed CNN. In International conference on neural information processing. Cham: Springer."},{"key":"9693_CR10","unstructured":"Zhu, M., et al. (2018). A deep learning approach for network anomaly detection based on AMF-LSTM. In IFIP international conference on network and parallel computing. Cham: Springer."}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-020-09693-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-020-09693-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-020-09693-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:23:58Z","timestamp":1614903838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-020-09693-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,5]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["9693"],"URL":"https:\/\/doi.org\/10.1007\/s10772-020-09693-z","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,5]]},"assertion":[{"value":"6 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}