{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T05:19:47Z","timestamp":1768540787998,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/atnac.2018.8615294","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:49:51Z","timestamp":1547772591000},"page":"1-6","source":"Crossref","is-referenced-by-count":146,"title":["A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network"],"prefix":"10.1109","author":[{"given":"Bipraneel","family":"Roy","sequence":"first","affiliation":[]},{"given":"Hon","family":"Cheung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"ref13","first-page":"1","article-title":"Deep Stacked Bidirectional and Unidirectional LSTM Recurrent Neural Network for Network-wide Traffic Speed Prediction","author":"cui","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2017.8001537"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref17","first-page":"62","article-title":"Data Mining and Intrusion Detection Systems","volume":"7","author":"dewa","year":"2016"},{"key":"ref18","first-page":"85","article-title":"T HE INTERNET OF THINGS?: NEW INTEROPERABILITY, MANAGEMENT ANDSECURITY CHALLENGES","volume":"8","author":"elkhodr","year":"2016"},{"key":"ref19","first-page":"85","article-title":"T HE INTERNET OF THINGS?: NEW INTEROPERABILITY, MANAGEMENT ANDSECURITY CHALLENGES","volume":"8","author":"elkhodr","year":"2016"},{"key":"ref28","article-title":"A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model","volume":"9","author":"abdul-ghani","year":"2018"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8210614"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"ref5","article-title":"Attack Classification Analysis of IoT Network via Deep Learning Approach","author":"tama","year":"2018","journal-title":"Research Briefs on Information & Communication Technology Evolution"},{"key":"ref8","first-page":"315","article-title":"An Intrusion Detection Scheme Based on Anomaly Mining in Internet of Things","year":"2011","journal-title":"The International Conference on Wireless Mobile & Multimedia Networks (ICWMMN)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref2","author":"ashton","year":"0","journal-title":"That Internet of things thing It can be"},{"key":"ref9","article-title":"Improving the Intrusion Detection using Discriminative Machine Learning Approach and Improve the TimeComplexity by Data Mining Feature Selection Methods","volume":"76","year":"2013","journal-title":"International Journal of Computer Applications (0975-8887)"},{"key":"ref1","article-title":"A critical analysis on the security concerns of the internet of things (IoT)","author":"farooq","year":"2015"},{"key":"ref20","first-page":"1","article-title":"Deep Stacked Bidirectional and Unidirectional LSTM Recurrent Neural Network for Network-wide Traffic Speed Prediction","author":"cui","year":"2018"},{"key":"ref22","first-page":"2","year":"0","journal-title":"Research Laboratories (MERL)"},{"key":"ref21","author":"hayashi","year":"0","journal-title":"BIDIRECTIONAL LSTM-HMM HYBRID SYSTEM FOR POLYPHONIC SOUND EVENT DETECTION Mitsubishi Electric"},{"key":"ref24","first-page":"265","article-title":"TensorFlow?: A system for large-scale machine learning","author":"barham","year":"0"},{"key":"ref23","article-title":"Attack Classification Analysis of IoT Network via Deep Learning Approach","author":"tama","year":"2018"},{"key":"ref26","article-title":"Machine Learning based Network Anomaly Detection for IoT environments","author":"tim?enko","year":"0"},{"key":"ref25","author":"buduma","year":"2016","journal-title":"TensorFlow for deep learning&#x2014;implementing neural networks"}],"event":{"name":"2018 28th International Telecommunication Networks and Applications Conference (ITNAC)","location":"Sydney, NSW","start":{"date-parts":[[2018,11,21]]},"end":{"date-parts":[[2018,11,23]]}},"container-title":["2018 28th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8598648\/8615121\/08615294.pdf?arnumber=8615294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:21:54Z","timestamp":1643242914000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8615294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/atnac.2018.8615294","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}