{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:01:09Z","timestamp":1771700469316,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/bigdata.2017.8258516","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:47:28Z","timestamp":1516038448000},"page":"4686-4695","source":"Crossref","is-referenced-by-count":13,"title":["Network intrusion detection using word embeddings"],"prefix":"10.1109","author":[{"given":"Xiaoyan","family":"Zhuo","sequence":"first","affiliation":[]},{"given":"Jialing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Seung Woo","family":"Son","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"2493","article-title":"Natural Language Processing (Almost) from Scratch","volume":"12","author":"collobert","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840711"},{"key":"ref31","first-page":"1100","article-title":"Deep Structured Energy Based Models for Anomaly Detection","author":"zhai","year":"2016","journal-title":"Proceedings of the 33nd ICML International Conference on Machine Learning"},{"key":"ref30","first-page":"333","article-title":"Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters","author":"leung","year":"2005","journal-title":"Proceedings of the Twenty-eighth Australasian Conference on Computer Science"},{"key":"ref10","article-title":"Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99","author":"kayack","year":"2005","journal-title":"Proceedings of the Third Annual Conference on Privacy Security and Trust"},{"key":"ref11","article-title":"Efficient Estimation of Word Representations in Vector Space","volume":"abs 1301 3781","author":"mikolov","year":"2013","journal-title":"CoRR"},{"key":"ref12","article-title":"Word and phrase translation with word2vec","volume":"abs 1705 3127","author":"jansen","year":"2017","journal-title":"CoRR"},{"key":"ref13","first-page":"841","article-title":"On Discriminative vs. Generative Classifiers: A Comparison of Logistic Regression and Naive Bayes","author":"ng","year":"2001","journal-title":"Proceedings of the 14th International Conference on Neural Information Processing Systems Natural and Synthetic"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref16","author":"joulin","year":"2016","journal-title":"Bag of tricks for efficient text classification"},{"key":"ref17","year":"0","journal-title":"word2vec"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281219"},{"key":"ref27","first-page":"2741","article-title":"Character-aware Neural Language Models","author":"kim","year":"2016","journal-title":"Proc of the Thirtieth AAAI Conference on Artificial Intelligence"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604267"},{"key":"ref29","first-page":"1","article-title":"Intrusion detection using principal component analysis","author":"mechtri","year":"2010","journal-title":"Second International Conference on Engineering Systems Management and Its Applications (ICESMA)"},{"key":"ref5","first-page":"130","article-title":"Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project","author":"stolfo","year":"2000","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2013.6.5.03"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2014.7083539"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref9","year":"0","journal-title":"KDD Cup 1999 data"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref20","author":"barot","year":"2016","journal-title":"Using Natural Language Processing on Non-Textual Data A Case Study of Network Anomaly Detection"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2009.36"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-3028"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-1603"},{"key":"ref25","article-title":"Distributed representations of sentences and documents","volume":"abs 1405 4053","author":"le","year":"2014","journal-title":"CoRR"}],"event":{"name":"2017 IEEE International Conference on Big Data (Big Data 2017)","location":"Boston, MA","start":{"date-parts":[[2017,12,11]]},"end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241556\/8257893\/08258516.pdf?arnumber=8258516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T21:29:35Z","timestamp":1579037375000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8258516\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2017.8258516","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}