{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T09:47:40Z","timestamp":1769161660424,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7966339","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T17:41:30Z","timestamp":1499708490000},"page":"3830-3837","source":"Crossref","is-referenced-by-count":33,"title":["Network intrusion detection for cyber security on neuromorphic computing system"],"prefix":"10.1109","author":[{"given":"Md Zahangir","family":"Alom","sequence":"first","affiliation":[]},{"given":"Tarek M.","family":"Taha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"roesch","year":"1999","journal-title":"LISA"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4018\/IJMSTR.2015040103"},{"key":"ref10","first-page":"248","article-title":"Imagenet: A large-scale hierarchical image database","author":"deng","year":"2009","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref12","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref13","author":"simonvan","year":"2014","journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1126\/science.1254642"},{"key":"ref15","author":"diehl","year":"2016","journal-title":"TrueHappiness Neuromorphic Emotion Recognition on TrueNorth"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4634199"},{"key":"ref17","author":"esser","year":"2016","journal-title":"Convolutional Networks for Fast Energy-Efficient Neuromorphic Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6706746"},{"key":"ref19","author":"mart\u00ed","year":"2015","journal-title":"Energy-efficient neuromorphic classifiers"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6707078"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref27","year":"2010","journal-title":"KDDCUP '99 dataset"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"key":"ref6","author":"szegedy","year":"2014","journal-title":"Going Deeper with Convolutions"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"ref5","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref8","article-title":"Cnn features off-the-shelf: An astounding baseline for recognition","author":"sharif razavian","year":"2014","journal-title":"The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops"},{"key":"ref7","article-title":"Network in network","author":"lin","year":"2014","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2013.71"},{"key":"ref9","article-title":"Return of the devil in the details: Delving deep into convolutional nets","author":"chatfield","year":"2014","journal-title":"British Machine Vision Conference"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1145\/382912.382914","article-title":"A framework for constructing features and models for intrusion detection systems","volume":"3","author":"wenke","year":"2000","journal-title":"A CM Transactions on Information and System Security (TISSEC)"},{"key":"ref20","article-title":"Back-propagation for energy-efficient neuromorphic computing","author":"esser","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref22","article-title":"Learning internal representations by error propagation","volume":"1","author":"rumelhart","year":"1986","journal-title":"Parallel Distributed Processing"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1158","DOI":"10.1126\/science.7761831","article-title":"The wake-sleep algorithm for self-organizing neural networks","volume":"268","author":"hinton","year":"1995","journal-title":"Science"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6707077"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1126\/science.1254642"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815706"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2011.6055294"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","location":"Anchorage, AK, USA","start":{"date-parts":[[2017,5,14]]},"end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07966339.pdf?arnumber=7966339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T06:21:31Z","timestamp":1569738091000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7966339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7966339","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}