{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:42:10Z","timestamp":1730194930367,"version":"3.28.0"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/aiccsa47632.2019.9035324","type":"proceedings-article","created":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T23:08:51Z","timestamp":1584400131000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Reducing Traffic Congestion by LSTM-LOF Framework"],"prefix":"10.1109","author":[{"given":"Dou El Kefel","family":"Mansouri","sequence":"first","affiliation":[]},{"given":"Seif-Eddine","family":"Benkabou","sequence":"additional","affiliation":[]},{"given":"Bachir","family":"Kaddar","sequence":"additional","affiliation":[]},{"given":"Josep Llus","family":"Larriba-Pey","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Benabdeslem","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Learning Program Behavior Profiles for Intrusion Detection","volume":"51462","author":"ghosh","year":"0","journal-title":"Workshop on Intrusion Detection and Network Monitoring"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738647"},{"key":"ref33","first-page":"120","article-title":"A sense of self for unix processes. In Security and Privacy, 1996","author":"forrest","year":"0","journal-title":"Proceedings of the 1996 symposium on"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"journal-title":"JupyterHub","year":"2018","author":"jupyter","key":"ref31"},{"journal-title":"A scientific computing framework for luajit","year":"0","author":"torch","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026195112518"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932213"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-980109"},{"journal-title":"Deep learning library for python","year":"0","author":"chollet","key":"ref28"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"hochreiter","year":"1997","journal-title":"Long Short-term Memory Neural Computation"},{"journal-title":"TensorFlow - An Open-Source Software Library for Machine Intelligence","year":"0","author":"brain","key":"ref29"},{"key":"ref2","first-page":"281","article-title":"Estimating costs of traffic congestion in Dhaka city","volume":"2","author":"khan","year":"2013","journal-title":"International Journal of Engineering Science and Innovative Technology (IJESIT)"},{"journal-title":"Why road maintenance is important and how to get it done","year":"2005","author":"burningham","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2012.10.016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2529562"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2012.11.019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280757"},{"key":"ref23","first-page":"73","article-title":"One-Class Collective Anomaly Detection Based on LSTM-RNNs","author":"thi","year":"2017","journal-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XI"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref50","first-page":"333","article-title":"Unsupervised anomaly detection in network intrusion detection using clusters","volume":"38","author":"leung","year":"0","journal-title":"Proceedings of the Twenty-eighth Australasian Conference on Computer Science"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2005.1527630"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(03)00040-6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.017"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1080\/01431160412331269698"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/9781119976462"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1002\/9781118548387","volume":"398","author":"hosmer","year":"2013","journal-title":"Applied Logistic Regression"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2741598"},{"key":"ref11","first-page":"89","article-title":"Long short term memory networks for anomaly detection in time series","author":"malhotra","year":"0","journal-title":"Proceedings"},{"key":"ref40","first-page":"259","article-title":"Detecting anomalous and unknown intrusions against programs. In Computer Security Applications Conference, 1998","author":"ghosh","year":"0","journal-title":"Proceedings 14th Annual"},{"journal-title":"Anomaly Detection for Temporal Data using Long Short-Term Memory (LSTM)","year":"2017","author":"singh","key":"ref12"},{"journal-title":"Unsupervised and Semi-supervised Anomaly Detection with LSTM Neural Networks","year":"2017","author":"ergen","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378605"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031505"},{"key":"ref16","first-page":"323","article-title":"Nericell: rich monitoring of road and traffic conditions using mobile smartphones","author":"mohan","year":"0","journal-title":"Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2012.03.006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25856-5_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.04.028"},{"key":"ref4","article-title":"Urban traffic congestion: its economic and social causes and consequences","author":"bull","year":"2002","journal-title":"CEPAL Review"},{"journal-title":"Bureau of Transport and Regional Economics","article-title":"Estimating urban traffic and congestion cost trends for Australian cities","year":"2007","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0026-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/956804.956828"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2009.08.010"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1067-8"},{"key":"ref9","first-page":"89","article-title":"Long short term memory networks for anomaly detection in time series","author":"malhotra","year":"0","journal-title":"Proceedings"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0234-x"},{"key":"ref45","first-page":"14","author":"kruegel","year":"2003","journal-title":"Bayesian event classification for intrusion detection"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2010.02.007"},{"key":"ref42","first-page":"514","article-title":"Native API based windows anomaly intrusion detection method using SVM","author":"wang","year":"2006","journal-title":"null"},{"key":"ref41","first-page":"381","article-title":"Hmms (hidden markov models) based on anomaly intrusion detection method. In Machine Learning and Cybernetics, 2002","volume":"1","author":"gao","year":"0","journal-title":"Proceedings 2002 International Conference On"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-5014-9_11"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.10.017"}],"event":{"name":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2019,11,3]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006726\/9035208\/09035324.pdf?arnumber=9035324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:49:38Z","timestamp":1658141378000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/aiccsa47632.2019.9035324","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}