{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:45:16Z","timestamp":1776465916492,"version":"3.51.2"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icccs49078.2020.9118459","type":"proceedings-article","created":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T17:44:02Z","timestamp":1592329442000},"page":"491-497","source":"Crossref","is-referenced-by-count":42,"title":["SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches"],"prefix":"10.1109","author":[{"given":"Md Delwar","family":"Hossain","sequence":"first","affiliation":[]},{"given":"Hideya","family":"Ochiai","sequence":"additional","affiliation":[]},{"given":"Fall","family":"Doudou","sequence":"additional","affiliation":[]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Networkbased Dictionary Attack Detection","author":"vykopal","year":"2009","journal-title":"International Conference on Future Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4568368"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2014.73"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516719"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2012.16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30633-4_11"},{"key":"ref18","article-title":"Protocol-Independent Detection of Dictionary Attacks","volume":"8115","author":"drasar","year":"0","journal-title":"Advances in Communication Networking EUNICE 2013 Lecture Notes in Computer Science"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3233347.3233379"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"ref6","first-page":"5","volume":"2","author":"kim","year":"0","journal-title":"Network Intrusion Detection using Deep Learning A Feature Learning Approach"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref8","first-page":"41","article-title":"Flow-based Bruteforce Attack Detection","author":"vykopal","year":"2013","journal-title":"Stuttgart Fraunhofer Verlag"},{"key":"ref7","volume":"3","author":"chio","year":"2018","journal-title":"Machine Learning and Security"},{"key":"ref2","article-title":"A Deep Learning Approach to Network Intrusion Detection","volume":"2","author":"shone","year":"2018","journal-title":"IEEE Transaction on Emerging Topics in Computational Intelligence"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.026"},{"key":"ref9","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref21","year":"0"}],"event":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","location":"Shanghai, China","start":{"date-parts":[[2020,5,15]]},"end":{"date-parts":[[2020,5,18]]}},"container-title":["2020 5th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9114888\/9118408\/09118459.pdf?arnumber=9118459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:24:06Z","timestamp":1656361446000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9118459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccs49078.2020.9118459","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}