{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T02:54:26Z","timestamp":1761015266593},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361291","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T14:38:38Z","timestamp":1703515118000},"page":"0978-0984","source":"Crossref","is-referenced-by-count":1,"title":["Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks"],"prefix":"10.1109","author":[{"given":"Yunxin","family":"Liu","sequence":"first","affiliation":[{"name":"Hainan Huawei Intelligent,Hainan,China"}]},{"given":"Yuliang","family":"Chen","sequence":"additional","affiliation":[{"name":"Lanzhou University,Lanzhou,China"}]},{"given":"Hongtao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Lanzhou University,Lanzhou,China"}]},{"given":"Qingguo","family":"Zhou","sequence":"additional","affiliation":[{"name":"Lanzhou University,Lanzhou,China"}]},{"given":"Xiaokang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Shiga University,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2022.2067124"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3241697"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05210-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647714"},{"key":"ref5","article-title":"Computer security threat monitoring and surveillance","volume-title":"Technical Report","author":"Anderson","year":"1980"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.02.022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13193-6_32"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.028"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CEEICT.2018.8628069"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3270101.3270105"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2893549"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2873291"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77964-1_16"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11070977"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035967"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/TST.2017.8195342"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010051"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010055"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010113"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010029"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361291.pdf?arnumber=10361291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T15:32:39Z","timestamp":1705073559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361291","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}