{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:26Z","timestamp":1767339806304,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/camad.2019.8858475","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T20:07:46Z","timestamp":1570478866000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Intrusion Detection System Based on Network Traffic Using Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Dimitra","family":"Chamou","sequence":"first","affiliation":[]},{"given":"Petros","family":"Toupas","sequence":"additional","affiliation":[]},{"given":"Eleni","family":"Ketzaki","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Konstantinos M.","family":"Giannoutakis","sequence":"additional","affiliation":[]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2414-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778942"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.185"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800506"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00225"},{"key":"ref15","first-page":"141","author":"aksu","year":"2018","journal-title":"Intrusion Detection with Comparative Analysis of Supervised Learning Techniques and Fisher Score Feature Selection Algorithm"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2523539"},{"key":"ref18","first-page":"111","volume":"21","author":"huang","year":"2013","journal-title":"Performance Evaluation on Permission-Based Detection for Android Malware"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"kingma","key":"ref28"},{"key":"ref4","article-title":"Cicids2017 dataset: Performance improvements and validation as a robust intrusion detection system testbed","author":"boukhamla","year":"2018","journal-title":"International Journal of Information and Computer Security"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223675"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.600"},{"article-title":"Tensorflow: Large-scale machine learning on heterogeneous distributed systems","year":"2016","author":"abadi","key":"ref29"},{"key":"ref5","article-title":"Evaluation of machine learning classifiers for zero-day intrusion detection - an analysis on CIC-AWS-2018 dataset","volume":"abs 1905 3685","author":"zhou","year":"2019","journal-title":"CoRR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905041"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.223"},{"key":"ref20","first-page":"289","volume":"189","author":"sanz","year":"2013","journal-title":"PUMA Permission Usage to Detect Malware in Android"},{"journal-title":"Datasets overview","year":"0","key":"ref22"},{"article-title":"Malware threats and mitigation strategies","year":"2005","author":"rehman","key":"ref21"},{"journal-title":"Mcfp dataset","year":"0","key":"ref24"},{"journal-title":"A Source for Pcap Files and Malware Samples","year":"0","key":"ref23"},{"key":"ref26","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref25","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","start":{"date-parts":[[2019,9,11]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2019,9,13]]}},"container-title":["2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8847248\/8858161\/08858475.pdf?arnumber=8858475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:19:58Z","timestamp":1658247598000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8858475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/camad.2019.8858475","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}