{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:14:37Z","timestamp":1740100477021,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772180"],"award-info":[{"award-number":["61772180"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2020CFB798"],"award-info":[{"award-number":["2020CFB798"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,22]]},"DOI":"10.1109\/idaacs53288.2021.9660898","type":"proceedings-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T20:41:22Z","timestamp":1641415282000},"page":"100-104","source":"Crossref","is-referenced-by-count":3,"title":["Improved Seagull Optimization Algorithm to Optimize Neural Networks with Gated Recurrent Units for Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Sen","family":"Ma","sequence":"first","affiliation":[]},{"given":"Chunzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Aijun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yucheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Junfang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuguang","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.08.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1031-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.11.024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.19.3.1887"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.01.003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909945"},{"key":"ref16","article-title":"Seagull optimization algorithm: Theory and its applications for large-scale industrial engineering problems","author":"dhiman","year":"2018","journal-title":"Knowledge-Based Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4012"},{"journal-title":"Nsl-kdd Data Set for Network-based Intrusion Detection Systems","year":"2009","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2000.857856"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2019.03.04"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.03.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.04.025"},{"key":"ref5","article-title":"Firefly algorithm based feature selection for network intrusion detection","author":"selvakumar","year":"2018","journal-title":"Computers & Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2017\/v10i29\/109053"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.027"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2019\/v12i1\/139577"}],"event":{"name":"2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","start":{"date-parts":[[2021,9,22]]},"location":"Cracow, Poland","end":{"date-parts":[[2021,9,25]]}},"container-title":["2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9660827\/9660390\/09660898.pdf?arnumber=9660898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:48Z","timestamp":1652201808000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/idaacs53288.2021.9660898","relation":{},"subject":[],"published":{"date-parts":[[2021,9,22]]}}}