{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:07:01Z","timestamp":1730196421501,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/ants50601.2020.9342820","type":"proceedings-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T10:28:30Z","timestamp":1612866510000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["A Hybrid Anomaly Based Intrusion Detection Methodology Using IWD for LSTM Classification"],"prefix":"10.1109","author":[{"given":"Mukesh","family":"Madanan","sequence":"first","affiliation":[]},{"given":"Anita","family":"Venugopal","sequence":"additional","affiliation":[]},{"given":"Nitha","family":"C.Velayudhan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Network traffic anomaly detection using recurrent neural networks","author":"radford","year":"2018","journal-title":"arXiv preprint arXiv 1803 10769"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810198"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICREST.2019.8644161"},{"journal-title":"NSL-KDD Dataset","article-title":"University of New Brunswick","year":"2019","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2635-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2011.05.005"},{"key":"ref16","first-page":"2395","article-title":"Reducing false alarms in intrusion detection systems&#x2013;a survey","author":"milan","year":"2018","journal-title":"International Research Journal of Engineering and Technology (IRJET) e-ISSN"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eie.25.1.22736"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1967-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958858"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eie.25.1.22736"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCCEE.2017.7867661"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04744-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36543-0_37"},{"key":"ref2","first-page":"1","article-title":"Intrusion detection system and intrusion prevention system: A comparative study","volume":"4","author":"chakraborty","year":"2013","journal-title":"International Journal of Computing and Business Research (IJCBR)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"ref9","first-page":"420","article-title":"Feature Selection for Intrusion Detection System Using Ant Colony Optimization","volume":"18","author":"aghdam","year":"2016","journal-title":"IJ Network Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5473-9"},{"key":"ref21","first-page":"11","article-title":"Evaluation metrics for intrusion detection systems-A study","volume":"2","author":"kumar","year":"2014","journal-title":"EVAluation"}],"event":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","start":{"date-parts":[[2020,12,14]]},"location":"New Delhi, India","end":{"date-parts":[[2020,12,17]]}},"container-title":["2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9342621\/9342746\/09342820.pdf?arnumber=9342820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:40:32Z","timestamp":1656330032000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9342820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ants50601.2020.9342820","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}