{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:21:12Z","timestamp":1778167272502,"version":"3.51.4"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T00:00:00Z","timestamp":1595289600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T00:00:00Z","timestamp":1595289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11036-020-01623-2","type":"journal-article","created":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T15:05:19Z","timestamp":1595343919000},"page":"1137-1144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks"],"prefix":"10.1007","volume":"26","author":[{"given":"Chia-Ming","family":"Hsu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad Zulfan","family":"Azhari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"He-Yen","family":"Hsieh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Setya Widyawan","family":"Prakosa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7197-9912","authenticated-orcid":false,"given":"Jenq-Shiou","family":"Leu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,7,21]]},"reference":[{"issue":"5","key":"1623_CR1","first-page":"69","volume":"9","author":"S Sharma","year":"2015","unstructured":"Sharma S, Gupta RK (2015) Intrusion detection system: a reivew. Int. J. Secur. App. 9 (5):69\u201376","journal-title":"Int. J. Secur. App."},{"key":"1623_CR2","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi S, Malathi A (2013) A detailed analysis on NSL- KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol 2:1848\u20131853","journal-title":"Int. J. Eng. Res. Technol"},{"key":"1623_CR3","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal L, Shantharajah SP (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4:446\u2013452","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"1623_CR4","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.asoc.2014.01.028","volume":"18","author":"F Kuang","year":"2014","unstructured":"Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178\u2013184","journal-title":"Appl Soft Comput"},{"key":"1623_CR5","unstructured":"Hettich S, Bay SD (1999) The UCI KDD Archive [http:\/\/kdd.ics.uci.edu]. Irvine, CA: University of California, Department of Information and Computer Science"},{"key":"1623_CR6","doi-asserted-by":"crossref","unstructured":"Reddy RR, Ramadevi Y, Sunitha KVN (2016) \u201cEffective discriminant function for intrusion detection using SVM\u201d. In: International Conference on Advances in Computing Communications and Informatics (ICACCI), pp 1148\u20131153","DOI":"10.1109\/ICACCI.2016.7732199"},{"key":"1623_CR7","first-page":"107","volume":"8","author":"LM Ibrahim","year":"2013","unstructured":"Ibrahim LM, Basheer DT, Mahmod MS (2013) \u201cA comparison study for intrusion database (KDD 99, NSL-KDD) based on self organization map (SOM) artificial neural network\u201d. J Eng. Sci. Technol. 8:107\u2013119","journal-title":"J Eng. Sci. Technol."},{"key":"1623_CR8","doi-asserted-by":"crossref","unstructured":"Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"1623_CR9","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Procedia Computer Science 89:213\u2013217","journal-title":"Procedia Computer Science"},{"key":"1623_CR10","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","volume":"38","author":"J Zhang","year":"2008","unstructured":"Zhang J, Zulkernine M, Haque A (2008) Random-Forests-Based Network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 38:649\u2013659","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"1623_CR11","first-page":"21","volume":"16","author":"Q Niyaz","year":"2015","unstructured":"Niyaz Q, Sun W, Javaid AY, Alam M (2015) A deep learning approach for network intrusion detection system. EAI Endorsed Transactions on Security and Safety 16:21\u201326","journal-title":"EAI Endorsed Transactions on Security and Safety"},{"key":"1623_CR12","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1049\/joe.2017.0722","volume":"2017","author":"Y Xu","year":"2017","unstructured":"Xu Y, Shi L, Ni Y (2017) Deep-learning-based Scenario Generation Strategy Considering Correlation Between Multiple Wind Farms. The Journal of Engineering 2017:2207\u20132210","journal-title":"The Journal of Engineering"},{"key":"1623_CR13","doi-asserted-by":"publisher","first-page":"12451","DOI":"10.1109\/ACCESS.2018.2805861","volume":"6","author":"B-F Wu","year":"2018","unstructured":"Wu B-F, Lin C-H (2018) Adaptive feature mapping for customizing deep learning based facial expression recognition model. IEEE Access 6:12451\u201312461","journal-title":"IEEE Access"},{"key":"1623_CR14","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/CC.2017.8233654","volume":"14","author":"T Wang","year":"2017","unstructured":"Wang T, Wen C-K., Wang H, Gao F, Jiang T, Jin S (2017) Deep learning for wireless physical layer: opportunities and challenges. China Communications 14:92\u201311","journal-title":"China Communications"},{"key":"1623_CR15","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954\u201321961","journal-title":"IEEE Access"},{"issue":"3","key":"1623_CR16","first-page":"982","volume":"2","author":"SS Kaushik","year":"2011","unstructured":"Kaushik SS, Deshmukh PR (2011) Detection of attacks in an intrusion detection system. International Journal of Computer Science and Information Technologies 2(3):982\u2013986","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"1623_CR17","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long-Short Term memory. Neural Comput 9:1735\u20131780","journal-title":"Neural Comput"},{"key":"1623_CR18","doi-asserted-by":"crossref","unstructured":"LeCun Y, Haffner P, Bottou L, Bengio Y (1999) Object recognition with Gradient-Based learning","DOI":"10.1007\/3-540-46805-6_19"},{"key":"1623_CR19","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1093\/comjnl\/bxx101","volume":"61","author":"Y Shen","year":"2018","unstructured":"Shen Y, Zheng K, Wu C, Zhang M, Niu X, Yang Y (2018) An Ensemble Method Based on Selection ba Algorithm for Intrusion Detection. The Computer Journal 61:526\u2013538","journal-title":"The Computer Journal"},{"key":"1623_CR20","doi-asserted-by":"publisher","first-page":"48697","DOI":"10.1109\/ACCESS.2018.2867564","volume":"6","author":"C Xu","year":"2018","unstructured":"Xu C, Shen J, Du X, Zhang F (2018) An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6:48697\u201348707","journal-title":"IEEE Access"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-020-01623-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-020-01623-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-020-01623-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,25]],"date-time":"2021-07-25T15:06:22Z","timestamp":1627225582000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-020-01623-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,21]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["1623"],"URL":"https:\/\/doi.org\/10.1007\/s11036-020-01623-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,21]]},"assertion":[{"value":"21 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}