{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:16:12Z","timestamp":1752668172605,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1109\/icct56141.2022.10073246","type":"proceedings-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T18:29:19Z","timestamp":1679941759000},"page":"1281-1286","source":"Crossref","is-referenced-by-count":1,"title":["DNN7: An Efficient Network Intrusion Detection Model"],"prefix":"10.1109","author":[{"given":"Hao","family":"Li","sequence":"first","affiliation":[{"name":"Science and Technology on Communication Networks Laboratory,Shijiazhuang,China"}]},{"given":"Xiangbo","family":"Wu","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Networks Laboratory,Shijiazhuang,China"}]},{"given":"Yangyang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Networks Laboratory,Shijiazhuang,China"}]},{"given":"Xiaopeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Networks Laboratory,Shijiazhuang,China"}]},{"given":"Erlu","family":"He","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Networks Laboratory,Shijiazhuang,China"}]},{"given":"Zhe","family":"Jia","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Networks Laboratory,Shijiazhuang,China"}]}],"member":"263","reference":[{"volume-title":"2020 Cyber Threats Report","key":"ref1"},{"volume-title":"2021 SonicWall Cyber Threat Report","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2992966"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/fi12100167"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02014-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2019.8729475"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6026878"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973730"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI44817.2019.9003126"},{"issue":"6","key":"ref13","first-page":"15","article-title":"Intrusion detection method based on improved genetic algorithm to optimize SVM","volume":"40","author":"Hou","year":"2019","journal-title":"Journal of Ordnance Equipment Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.09.014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2018.8629718"},{"key":"ref16","first-page":"94","article-title":"An Improved Intrusion Detection Approach using Synthetic Minority Over-Sampling Technique and Deep Belief Network","volume-title":"SoMeT","author":"Adil"},{"key":"ref17","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume-title":"International conference on machine learning","author":"Ioffe"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101666"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/1994\/51798"}],"event":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2022,11,11]]},"location":"Nanjing, China","end":{"date-parts":[[2022,11,14]]}},"container-title":["2022 IEEE 22nd International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072013\/10072295\/10073246.pdf?arnumber=10073246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T07:01:09Z","timestamp":1709449269000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10073246\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icct56141.2022.10073246","relation":{},"subject":[],"published":{"date-parts":[[2022,11,11]]}}}