{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T14:40:02Z","timestamp":1756132802129,"version":"3.44.0"},"reference-count":56,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2025,9,3]]},"DOI":"10.1080\/19393555.2025.2493108","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T21:45:47Z","timestamp":1745271947000},"page":"455-470","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["SADCNN: Supervised anomaly detection based on convolutional neural network models"],"prefix":"10.1080","volume":"34","author":[{"given":"Maryam","family":"Hatami","sequence":"first","affiliation":[{"name":"Shahed University","place":["Tehran, Iran"]}]},{"given":"Hossein","family":"Gharaee","sequence":"additional","affiliation":[{"name":"ICT Research Institute (ITRC)","place":["Tehran, Iran"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7682-3455","authenticated-orcid":false,"given":"Naser","family":"Mohammadzadeh","sequence":"additional","affiliation":[{"name":"Shahed University","place":["Tehran, Iran"]}]}],"member":"301","published-online":{"date-parts":[[2025,4,21]]},"reference":[{"key":"e_1_3_3_2_1","unstructured":"Abohaikel A. S. & Tokheim E. (2020). A machine learning approach for intrusion detection [Master\u2019s thesis]. University of Agder."},{"issue":"7","key":"e_1_3_3_3_1","article-title":"Intrusion detection system for intranet security","volume":"4","author":"Ambhore M. P. B.","year":"2014","unstructured":"Ambhore, M. P. B., & Meshram, B. B. (2014). Intrusion detection system for intranet security. International Journal, 4(7).","journal-title":"International Journal"},{"key":"e_1_3_3_4_1","doi-asserted-by":"crossref","unstructured":"Bace R. G. & Mell P. (2001). Intrusion detection systems http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-31\/sp800-3 1.pdf.","DOI":"10.6028\/NIST.SP.800-31"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92639-1_17"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01168-0_7"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010274"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.32473\/edis-in1065-2014"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105612"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/iCMLDE.2018.00035"},{"issue":"11","key":"e_1_3_3_12_1","first-page":"2954","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection","volume":"12","author":"Diwan T. D.","year":"2021","unstructured":"Diwan, T. D. (2021). A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(11), 2954\u20132968.","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100317"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS47205.2019.9040718"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3254915"},{"key":"e_1_3_3_16_1","unstructured":"Fernandez G. C. (2019). Deep learning approaches for network intrusion detection [Doctoral dissertation]. The University of Texas at San Antonio."},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020824"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2927886"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2016.7881798"},{"key":"e_1_3_3_20_1","first-page":"249","volume-title":"Proceedings of the thirteenth international conference on artificial intelligence and statistics JMLR Workshop and Conference Proceedings","author":"Glorot X.","year":"2010","unstructured":"Glorot, X., & Bengio, Y. (2010, March). Understanding the difficulty of training deep feedforward neural networks. Proceedings of the thirteenth international conference on artificial intelligence and statistics JMLR Workshop and Conference Proceedings (pp. 249\u2013256)."},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.06.017"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2021-0037"},{"key":"e_1_3_3_24_1","unstructured":"Janagam A. & Hossen S. (2018). Analysis of network intrusion detection system with machine learning algorithms (deep reinforcement learning algorithm)."},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07692-8_58"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060916"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103111"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61638-0_8"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymeth.2019.04.008"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"e_1_3_3_32_1","unstructured":"Lincoln M. (1999). http:\/\/www.ll.mit.edu\/ideval\/data\/1998data.html"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4705982"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946708"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.9734\/cjast\/2021\/v40i631320"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.006"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863036"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3201869"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2050"},{"issue":"12","key":"e_1_3_3_41_1","first-page":"1848","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection","volume":"2","author":"Revathi S.","year":"2013","unstructured":"Revathi, S., & Malathi, A. (2013). A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. International Journal of Engineering Research & Technology (IJERT), 2(12), 1848\u20131853.","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"issue":"2","key":"e_1_3_3_42_1","first-page":"159","article-title":"Anomaly detection using SVM as classifier and decision tree for optimizing feature vectors","volume":"11","author":"Serkani E.","year":"2019","unstructured":"Serkani, E., Gharaee Garakani, H., & Mohammadzadeh, N. (2019). Anomaly detection using SVM as classifier and decision tree for optimizing feature vectors. The ISC International Journal of Information Security, 11(2), 159\u2013171.","journal-title":"The ISC International Journal of Information Security"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIKE47802.2019.9004362"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.33564\/IJEAST.2020.v04i12.054"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56827-6_7"},{"key":"e_1_3_3_46_1","unstructured":"Team G. B. (2015). https:\/\/www.tensorflow.org"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4149"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.12.004"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3507-5"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09621-9"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10110356"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1168\/2\/022022"},{"key":"e_1_3_3_54_1","first-page":"229","volume-title":"OTM Confederated International Conferences\u201cOn the Move to Meaningful Internet Systems","author":"Zabihi J.","year":"2019","unstructured":"Zabihi, J., & Janeja, V. (2019, October). DeepNet: A deep learning architecture for network-based anomaly detection. OTM Confederated International Conferences\u201cOn the Move to Meaningful Internet Systems (pp. 229\u2013238). Springer, Cham."},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001350"},{"key":"e_1_3_3_56_1","volume-title":"34th Conference on Neural Information Processing Systems (NeurIPS 2020)","author":"Zhang J.","year":"2020","unstructured":"Zhang, J., Karimireddy, S. P., Veit, A., Kim, S., Reddi, S. J., Kumar, S., & Sra, S. (2020). Why Adam beats SGD for attention models 34th Conference on Neural Information Processing Systems (NeurIPS 2020). Vancouver, Canada."},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94295-7_15"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2025.2493108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T14:19:56Z","timestamp":1756131596000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2025.2493108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,21]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,3]]}},"alternative-id":["10.1080\/19393555.2025.2493108"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2025.2493108","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2025,4,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2025-04-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}