{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:38:58Z","timestamp":1775540338150,"version":"3.50.1"},"reference-count":41,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2023,12,31]]},"DOI":"10.1080\/09540091.2023.2227780","type":"journal-article","created":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T12:57:39Z","timestamp":1692190659000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":127,"title":["A multimodal hybrid parallel network intrusion detection model"],"prefix":"10.1080","volume":"35","author":[{"given":"Shuxin","family":"Shi","sequence":"first","affiliation":[{"name":"College of Information Engineering, Shanghai Maritime University, Shanghai, People's Republic of China"}]},{"given":"Dezhi","family":"Han","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Shanghai Maritime University, Shanghai, People's Republic of China"}]},{"given":"Mingming","family":"Cui","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Shanghai Maritime University, Shanghai, People's Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2023,8,16]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102985"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.v31.9"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00444-8"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48057-29"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.07.011"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.2024509"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108980"},{"key":"e_1_3_2_12_1","doi-asserted-by":"crossref","unstructured":"Dong Y. Wang R. & He J. (2019 October). Real-time network intrusion detection system based on deep learning. In 2019 IEEE 10th international conference on software engineering and service science (ICSESS) (pp. 1\u20134). ISSN: 2327-0594.","DOI":"10.1109\/ICSESS47205.2019.9040718"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2022.108527"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03559-4"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2977646"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3114621"},{"key":"e_1_3_2_17_1","doi-asserted-by":"crossref","unstructured":"He K. Zhang X. Ren S. & Sun J. (2016). Deep residual learning for image recognition. In (pp. 770\u2013778). Retrieved December 22 2022 from https:\/\/openaccess.thecvf.com\/contentcvpr2016\/html\/HeDeepResidualLearningCVPR2016paper.html.","DOI":"10.1109\/CVPR.2016.90"},{"issue":"1","key":"e_1_3_2_18_1","first-page":"77","article-title":"Parallel scalable approximate matching algorithm for network intrusion detection systems","volume":"18","author":"Hnaif A.","year":"2021","unstructured":"Hnaif, A., Jaber, K., Alia, M., & Daghbosheh, M. (2021, January). Parallel scalable approximate matching algorithm for network intrusion detection systems. International Arab Journal of Information Technology, 18(1), 77\u201384. https:\/\/www.webofscience.com\/wos\/alldb\/full-record\/WOS:000607690000009.","journal-title":"International Arab Journal of Information Technology"},{"key":"e_1_3_2_19_1","unstructured":"Ioffe S. & Szegedy C. (2015 June). Batch normalization: Accelerating deep network training by reducing internal covariate shift. In Proceedings of the 32nd international conference on machine learning (pp. 448\u2013456). PMLR. Retrieved December 25 2022 from https:\/\/proceedings.mlr.press\/v37\/ioffe15.html (ISSN: 1938-7228)."},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06496-5"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103597"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107846"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.12.037"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_2_27_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/4705982","article-title":"CNID: Research of network intrusion detection based on convolutional neural network","volume":"2020","author":"Liu G.","year":"2020","unstructured":"Liu, G., & Zhang, J. (2020, May). CNID: Research of network intrusion detection based on convolutional neural network. Discrete Dynamics in Nature and Society, 2020, 1\u201311. https:\/\/www.hindawi.com\/journals\/ddns\/2020\/4705982\/.","journal-title":"Discrete Dynamics in Nature and Society"},{"key":"e_1_3_2_28_1","doi-asserted-by":"crossref","unstructured":"Long J. Shelhamer E. & Darrell T. (2015). Fully convolutional networks for semantic segmentation. In (pp. 3431\u20133440). Retrieved December 25 2022 from https:\/\/openaccess.thecvf.com\/contentcvpr2015\/html\/LongFullyConvolutionalNetworks2015CVPRpaper.","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_00990"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4642-15"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-04355-w"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"},{"key":"e_1_3_2_35_1","doi-asserted-by":"crossref","unstructured":"Vinayakumar R. Soman K. P. & Poornachandran P. (2017 September). Applying convolutional neural network for network intrusion detection. In 2017 international conference on advances in computing communications and informatics (ICACCI) (pp. 1222\u20131228).","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"e_1_3_2_36_1","doi-asserted-by":"crossref","unstructured":"Wang X. Chen S. & Su J. (2020 July). App-Net: A hybrid neural network for encrypted mobile traffic classification. In IEEE INFOCOM 2020 - IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 424\u2013429). IEEE. Retrieved May 08 2023 from https:\/\/ieeexplore.ieee.org\/document\/9162891\/.","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162891"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2022.2051434"},{"key":"e_1_3_2_38_1","doi-asserted-by":"crossref","unstructured":"Wu P. f. & Shen H. j. (2012 June). The research and amelioration of pattern-matching algorithm in intrusion detection system. In 2012 IEEE 14th international conference on high performance computing and communication & 2012 IEEE 9th international conference on embedded software and systems (pp. 1712\u20131715).","DOI":"10.1109\/HPCC.2012.256"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102675"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"e_1_3_2_41_1","doi-asserted-by":"crossref","unstructured":"Zhang H. (2009 January). Design of intrusion detection system based on a new pattern matching algorithm. In 2009 international conference on computer engineering and technology (pp. 545\u2013548). IEEE. Retrieved Decemebr 20 2022 from https:\/\/ieeexplore.ieee.org\/document\/4769526\/.","DOI":"10.1109\/ICCET.2009.244"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540091.2023.2227780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T07:47:29Z","timestamp":1703749649000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09540091.2023.2227780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,16]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,12,31]]}},"alternative-id":["10.1080\/09540091.2023.2227780"],"URL":"https:\/\/doi.org\/10.1080\/09540091.2023.2227780","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"value":"0954-0091","type":"print"},{"value":"1360-0494","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,16]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-03-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2227780"}}