{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:35:53Z","timestamp":1774938953961,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and communications Technology Promotion","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2016-0-00078"],"award-info":[{"award-number":["2016-0-00078"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2953095","type":"journal-article","created":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T16:58:06Z","timestamp":1573577886000},"page":"165607-165626","source":"Crossref","is-referenced-by-count":153,"title":["Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0071-0948","authenticated-orcid":false,"given":"Jonghoon","family":"Lee","sequence":"first","affiliation":[{"name":"Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5532-2117","authenticated-orcid":false,"given":"Jonghyun","family":"Kim","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8915-3270","authenticated-orcid":false,"given":"Ikkyun","family":"Kim","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3520-6194","authenticated-orcid":false,"given":"Kijun","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906934"},{"key":"ref31","first-page":"2960","article-title":"An encoding technique for CNN-based network anomaly detection","author":"kim","year":"2019","journal-title":"IEEE International Conference on Big Data (IEEE BigData)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868993"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2017.8190830"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2014.6304"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00014"},{"key":"ref34","first-page":"237","article-title":"Gradient flow in recurrent nets: The difficulty of learning long-term dependencies","author":"hochreiter","year":"2001","journal-title":"A Field Guide to Dynamical Recurrent Networks"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140442"},{"key":"ref27","first-page":"171","article-title":"Zero-day malware detection based on supervised learning algorithms of API call signatures","volume":"121","author":"alazab","year":"2011","journal-title":"Proc 9th Australasian Data Mining Conf"},{"key":"ref29","article-title":"Recent advances in convolutional neural networks","author":"gu","year":"2017","journal-title":"arXiv 1512 07108"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.17.0116.0305"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863036"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref22","article-title":"Connecting images and natural language","author":"karpathy","year":"2016"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2439281"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btx815"},{"key":"ref23","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume":"1","author":"krizhevsky","year":"2012","journal-title":"Proc 25th Int Conf Neural Inf Proc Syst (NIPS)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"ref51","article-title":"TensorFlow: Large-scale machine learning on heterogeneous distributed systems","author":"abadi","year":"2016","journal-title":"arXiv 1603 04467"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.005"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/240217"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.17.0116.0879"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.2307\/2687269"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref13","author":"song","year":"2006","journal-title":"Description of Kyoto University Benchmark Data"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","article-title":"AdaBoost-based algorithm for network intrusion detection","volume":"38","author":"hu","year":"2008","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340752"},{"key":"ref19","year":"2016","journal-title":"Security Information and Event Management"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SCORED.2015.7449345"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8299855"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243811"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2014.6983188"},{"key":"ref49","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref9","first-page":"625","article-title":"Automatically detecting vulnerable Websites before they turn malicious","author":"soska","year":"2014","journal-title":"Proc Usenix Secur Symp"},{"key":"ref46","article-title":"Recurrent neural network regularization","author":"zaremba","year":"2014","journal-title":"arXiv 1409 2329"},{"key":"ref45","first-page":"611","article-title":"Recognizing functions in binaries with neural networks","author":"shin","year":"2015","journal-title":"Proc 24th USENIX Secur Symp (USENIX Security)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840733"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.14"},{"key":"ref44","article-title":"Generating sequences with recurrent neural networks","author":"graves","year":"2013","journal-title":"arXiv 1308 0850 [cs]"},{"key":"ref43","first-page":"364","author":"han","year":"2006","journal-title":"Data Mining Concepts and Techniques"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08896978.pdf?arnumber=8896978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T06:00:03Z","timestamp":1769493603000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8896978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2953095","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}