{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:48:37Z","timestamp":1774450117845,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8126009","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T22:26:11Z","timestamp":1512426371000},"page":"1222-1228","source":"Crossref","is-referenced-by-count":439,"title":["Applying convolutional neural network for network intrusion detection"],"prefix":"10.1109","author":[{"given":"R","family":"Vinayakumar","sequence":"first","affiliation":[]},{"given":"K P","family":"Soman","sequence":"additional","affiliation":[]},{"given":"Prabaharan","family":"Poornachandran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"simonyan","year":"2013","journal-title":"Deep Inside Convolutional Networks Visualising Image Classification Models and Saliency Maps"},{"key":"ref32","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref31","first-page":"105","author":"staudemeyer","year":"2009","journal-title":"Feature set reduction for automatic network intrusion detection with machine learning algorithms"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1994-9"},{"key":"ref11","first-page":"21","article-title":"A deep learning approach for network intrusion detection system","volume":"15","author":"niyaz","year":"0","journal-title":"Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (Formerly BIONETICS) BICT-15"},{"key":"ref12","first-page":"357","article-title":"Applying recurrent neural network to intrusion detection with hessian free optimization","author":"kim","year":"2015","journal-title":"International Workshop on Information Security and Application"},{"key":"ref13","article-title":"Long short-term memory recurrent neural network architectures for large scale acoustic modeling","author":"sak","year":"2014","journal-title":"Fifteenth Annual Conference of the International Speech Communication Association"},{"key":"ref14","article-title":"The applications of deep learning on traffic identification","author":"wang","year":"2015","journal-title":"BlackHat USA"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v52i0.200"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2513456.2513490"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v56i1.248"},{"key":"ref18","author":"aminanto","year":"0","journal-title":"Deep learning-based feature selection for intrusion detection system in transport layer"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"ref28","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","volume":"16","author":"abadi","year":"2016","journal-title":"OSDI"},{"key":"ref4","article-title":"A critical review of recurrent neural networks for sequence learning","author":"lipton","year":"2015","journal-title":"ar Xiv preprint arXiv 1506 07310"},{"key":"ref27","author":"cho","year":"2014","journal-title":"Learning phrase representations using RNN encoder-decoder for statistical machine translation"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2002-101-202"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.41"},{"key":"ref29","article-title":"Long short-term memory recurrent neural network architectures for large scale acoustic modeling","author":"sak","year":"2014","journal-title":"Fifteenth Annual Conference of the International Speech Communication Association"},{"key":"ref5","author":"hodo","year":"2017","journal-title":"Shallow and deep networks intrusion detection system A taxonomy and survey"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.01.003"},{"key":"ref7","first-page":"15","article-title":"A neural network based system for intrusion detection and classification of attacks","author":"moradi","year":"2004","journal-title":"Proceedings of the IEEE International Conference on Advances in Intelligent Systems-Theory and Applications"},{"key":"ref2","author":"vaidya","year":"2015","journal-title":"2001-2013 Survey and analysis of major cyberattacks"},{"key":"ref9","first-page":"2676","article-title":"Recurrent network in network intrusion detection system","volume":"5","author":"xue","year":"2004","journal-title":"Machine Learning and Cybernetics 2004 Proceedings of 2004 International Conference"},{"key":"ref1","article-title":"Computer security threat monitoring and surveillance","author":"anderson","year":"1980","journal-title":"Technical report James P Anderson Company Fort Washington Pennsylvania Tech Rep"},{"key":"ref20","article-title":"Convolutional neural networks for malware classification","author":"gibert llaurad\u00f3","year":"2016"},{"key":"ref22","article-title":"Application of convolutional neural network to intrusion type recognition","author":"upadhyay","year":"2017","journal-title":"Technical Report Ben-Gurion University of the Negev"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50127-7_11"},{"key":"ref24","author":"kim","year":"2014","journal-title":"Convolutional neural networks for sentence classification"},{"key":"ref23","first-page":"143","article-title":"Generalization and network design strategies","author":"lecun","year":"1989","journal-title":"Connectionism in Perspective"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/0364-0213(90)90002-E"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Udupi","start":{"date-parts":[[2017,9,13]]},"end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08126009.pdf?arnumber=8126009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:50:39Z","timestamp":1516056639000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8126009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8126009","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}