{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:12:06Z","timestamp":1730200326660,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8622269","type":"proceedings-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T03:07:18Z","timestamp":1548385638000},"page":"2980-2985","source":"Crossref","is-referenced-by-count":0,"title":["Detecting unmanaged and unauthorized devices on the network with long short-term memory network"],"prefix":"10.1109","author":[{"given":"Derek","family":"Lin","sequence":"first","affiliation":[]},{"given":"Baoming","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.93"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70050-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"ref13","article-title":"Automated remote scanning of a network for managed and unmanaged devices","author":"alexion-tiernan","year":"2007","journal-title":"US Patent App"},{"key":"ref14","article-title":"Method and apparatus for determining unman-aged network devices in the topology of a network","author":"valentine","year":"2008","journal-title":"US Patent"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1049\/cp:19991218","article-title":"Learning to forget: Continual prediction with lstm","author":"gers","year":"1999"},{"key":"ref17","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","author":"sutskever","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"article-title":"Deep learning for answer sentence selection","year":"2014","author":"yu","key":"ref19"},{"journal-title":"Standardizing host and server naming conventions","year":"0","key":"ref4"},{"article-title":"Market guide for cloud access security brokers. gartner research","year":"2015","author":"lawson","key":"ref3"},{"journal-title":"Naming convention design (servers computers it assets)","year":"0","key":"ref6"},{"journal-title":"Determining a good naming convention for your network","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","article-title":"A survey of network anomaly detection techniques","volume":"60","author":"ahmed","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-15046-4_2"},{"key":"ref1","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"USENIX Security Symposium"},{"key":"ref9","article-title":"Method for detecting anomaly action within a computer network","author":"engel","year":"2014","journal-title":"US Patent App"},{"article-title":"Predicting domain generation algorithms with long short-term memory networks","year":"2016","author":"woodbridge","key":"ref20"},{"journal-title":"Metasploit The worlds most used penetration testing framework","year":"0","key":"ref22"},{"key":"ref21","first-page":"800","article-title":"Deep learning (adaptive computation and machine learning series)","author":"goodfellow","year":"2016","journal-title":"Adaptive Computation and Machine Learning Series"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2018,12,10]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08622269.pdf?arnumber=8622269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:24:27Z","timestamp":1643239467000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8622269\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8622269","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}