{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:07:52Z","timestamp":1730200072980,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006292","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T06:05:34Z","timestamp":1582610734000},"page":"5945-5950","source":"Crossref","is-referenced-by-count":0,"title":["Models and Features with Covariate Shift Adaptation for Suspicious Network Event Recognition"],"prefix":"10.1109","author":[{"given":"Shu-Yi","family":"Xie","sequence":"first","affiliation":[]},{"given":"Jian","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yu-Bin","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Lian-Xin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Shirly","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Jian-Ping","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SecurityOnDemand official blog Threat Hunting Strategy Identifying Anomalous Protocol Activity","year":"2019","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-3758(00)00115-4"},{"key":"ref12","first-page":"699","volume":"60","author":"sugiyama","year":"2008","journal-title":"Direct importance estimation for covariate shift adaptation"},{"journal-title":"ImageNet Classification with Deep Convolutional Neural Networks","year":"2012","author":"krizhevsky","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"journal-title":"Batch normalization accelerating deep network training by reducing internal covariate shift[J]","year":"2015","author":"ioffe","key":"ref15"},{"journal-title":"Gaussian Error Linear Units (GELUs)[J]","year":"2016","author":"hendrycks","key":"ref16"},{"journal-title":"Going deeper with convolutions[J]","year":"2014","author":"szegedy","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"ref19","article-title":"Deep learning for time-series analysis","author":"cristian borges gamboa","year":"2017","journal-title":"arXiv 1701 01887"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"journal-title":"BERT Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"devlin","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005668"},{"journal-title":"StackNet source code","year":"2017","author":"anova","key":"ref5"},{"journal-title":"SecurityOnDemand official blog Why Security Event Correlation will Fail You","year":"2018","key":"ref8"},{"key":"ref7","article-title":"Scalable Cyber-security Analytics with a New summary-based Approximate Query Engine","author":"\u2019slcezak","year":"2017","journal-title":"IEEE International Conference on Big Data"},{"journal-title":"Deep Learning","first-page":"326","year":"2016","key":"ref2"},{"key":"ref1","article-title":"LightGBM: A Highly Efficient Gradient Boosting Decision Tree","author":"ke","year":"0","journal-title":"31st Conference on Neural Information Processing Systems (NIPS 2017)"},{"journal-title":"Compete official website","year":"2019","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2019,12,9]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006292.pdf?arnumber=9006292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:53:13Z","timestamp":1658094793000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006292","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}