{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T05:59:17Z","timestamp":1776491957299,"version":"3.51.2"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,1]]},"DOI":"10.1109\/ecai52376.2021.9515086","type":"proceedings-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T22:03:11Z","timestamp":1629756191000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["Anomaly Detection using Generative Adversarial Networks on Firewall Log Message Data"],"prefix":"10.1109","author":[{"given":"Sandeep Pai","family":"Kulyadi","sequence":"first","affiliation":[]},{"given":"Pavitra","family":"Mohandas","sequence":"additional","affiliation":[]},{"given":"Sudesh Kumar Santhosh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"M J Shankar","family":"Raman","sequence":"additional","affiliation":[]},{"given":"V S","family":"Vasan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/616"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"ref12","article-title":"Generative Adversarial Networks","author":"goodfellow","year":"2014","journal-title":"arXiv [stat ML]"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-1609"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00064"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3155133.3155206"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378139"},{"key":"ref17","first-page":"214","article-title":"Wasserstein Generative Adversarial Networks","volume":"70","author":"arjovsky","year":"2017","journal-title":"In Proceedings of the 34th International Conference on Machine Learning"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhazmat.2010.10.091"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/sym11111350"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45681-3_2"},{"key":"ref6","article-title":"Histogram-based outlier score (HBOS): A fast unsupervised anomaly detection algorithm","author":"goldstein","year":"2012","journal-title":"Psu edu"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app8091468"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.01.010"},{"key":"ref7","article-title":"Time-series generative adversarial networks","author":"yoon","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2013.08.044"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00088"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401946"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref23","article-title":"Real-valued (medical) time series generation with Recurrent Conditional GANs","author":"esteban","year":"2017","journal-title":"arXiv [stat ML]"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2019.07.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"}],"event":{"name":"2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","location":"Pitesti, Romania","start":{"date-parts":[[2021,7,1]]},"end":{"date-parts":[[2021,7,3]]}},"container-title":["2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9514927\/9515011\/09515086.pdf?arnumber=9515086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:44:51Z","timestamp":1652197491000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9515086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ecai52376.2021.9515086","relation":{},"subject":[],"published":{"date-parts":[[2021,7,1]]}}}