{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:38:24Z","timestamp":1772725104869,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100031839","name":"Korea Research Institute for Defense Technology Planning and Advancement","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100031839","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Korea Government (Defense Acquisition Program Administration\u2014DAPA)","award":["KRIT-CT-21-042"],"award-info":[{"award-number":["KRIT-CT-21-042"]}]},{"DOI":"10.13039\/501100013883","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013883","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korea Government [Ministry of Science and ICT (MSIT)]","award":["RS-2024-00359621"],"award-info":[{"award-number":["RS-2024-00359621"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3532353","type":"journal-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:59:11Z","timestamp":1737399551000},"page":"15346-15362","source":"Crossref","is-referenced-by-count":5,"title":["Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1558-1180","authenticated-orcid":false,"given":"Yongsik","family":"Kim","sequence":"first","affiliation":[{"name":"School of Cybersecurity, Korea University, Seoul, Republic of Korea"}]},{"given":"Su-Youn","family":"Hong","sequence":"additional","affiliation":[{"name":"LIG Nex1, Yongin-si, South Korea"}]},{"given":"Sungjin","family":"Park","sequence":"additional","affiliation":[{"name":"LIG Nex1, Yongin-si, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0760-8807","authenticated-orcid":false,"given":"Huy Kang","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Korea University, Seoul, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.06.005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INES.2010.5483815"},{"key":"ref4","volume-title":"Intrusion Detection System (IDS) Product Survey","author":"Jackson","year":"1999"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129336"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3461462"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_13"},{"key":"ref8","first-page":"7375","article-title":"AIRS: Explanation for deep reinforcement learning based security applications","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Yu"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1983.6313077"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2014.08.06"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02529-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3214304"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1093-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3082160"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3208815"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3129249"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103625"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103212"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-05895-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103761"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13453-2_12"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICoDT262145.2024.10740237"},{"key":"ref23","article-title":"LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems","author":"Kim","year":"2016","journal-title":"arXiv:1611.01726"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881561"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.06.030"},{"key":"ref26","volume-title":"Advance Approach for Detection of Dns Tunneling Attack From Network Packets Using Deep Learning Algorithms","author":"Sakarkar","year":"2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM51994.2024.10688863"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2017.03.009"},{"key":"ref29","article-title":"Summarizing unstructured logs in online services","author":"Meng","year":"2020","journal-title":"arXiv:2012.08938"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3083715"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s44248-023-00002-y"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS60048.2023.00040"},{"key":"ref33","article-title":"Learning to generate better than your LLM","author":"Chang","year":"2023","journal-title":"arXiv:2306.11816"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3252523"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-19366-3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet51028.2020.9335796"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT58313.2023.10245608"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3037903"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00707-8"},{"key":"ref41","article-title":"Generating informative CVE description from ExploitDB posts by extractive summarization","author":"Sun","year":"2021","journal-title":"arXiv:2101.01431"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02293-z"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103502"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2023067"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3167814"},{"key":"ref46","first-page":"404","article-title":"TextRank: Bringing order into text","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Mihalcea"},{"key":"ref47","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013","journal-title":"arXiv:1301.3781"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/887\/1\/012028"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2929141"},{"key":"ref50","first-page":"1","article-title":"Sequence to sequence learning with neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sutskever"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/STI50764.2020.9350411"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"ref53","volume-title":"Lid-DS 2021","author":"Grimmer","year":"2021"},{"key":"ref54","first-page":"74","article-title":"ROUGE: A package for automatic evaluation of summaries","volume-title":"Text Summarization Branches Out","author":"Lin","year":"2004"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10848062.pdf?arnumber=10848062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T17:16:33Z","timestamp":1747761393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10848062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3532353","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}