{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T11:26:35Z","timestamp":1743161195903,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/lcn53696.2022.9843272","type":"proceedings-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T19:43:27Z","timestamp":1661543007000},"page":"56-63","source":"Crossref","is-referenced-by-count":1,"title":["Deep Sequence Models for Packet Stream Analysis and Early Decisions"],"prefix":"10.1109","author":[{"given":"Minji","family":"Kim","sequence":"first","affiliation":[{"name":"Texas A&amp;M University,Computer Science Department,Commerce,TX,USA,75428"}]},{"given":"Dongeun","family":"Lee","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University,Computer Science Department,Commerce,TX,USA,75428"}]},{"given":"Kookjin","family":"Lee","sequence":"additional","affiliation":[{"name":"Arizona State University,School of Computing and Augmented Intelligence,Tempe,AZ,USA,85281"}]},{"given":"Doowon","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Tennessee,Department of Electrical Engineering &amp; Computer Science,Knoxville,TN,USA,37996"}]},{"given":"Sangman","family":"Lee","sequence":"additional","affiliation":[{"name":"Sysmate Inc.,Daejeon,Korea,34109"}]},{"given":"Jinoh","family":"Kim","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University,Computer Science Department,Commerce,TX,USA,75428"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011286"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5393"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/197"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011278"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11290"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443779"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906328"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3322798.3329251"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.21236\/ADA164453"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258054"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0475-8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"ref5","first-page":"446","article-title":"A study on nsl-kdd dataset for intrusion detection system based on classification algorithms","volume":"4","author":"dhanabal","year":"2015","journal-title":"Int J Adv Res Comp Commun Eng"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274710"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2207915"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81242-3_13"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1151"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2673","DOI":"10.1109\/78.650093","article-title":"Bidirectional recurrent neural networks","volume":"45","author":"schuster","year":"1997","journal-title":"IEEE Transactions on Signal Processing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421359"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209652"}],"event":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2022,9,26]]},"location":"Edmonton, AB, Canada","end":{"date-parts":[[2022,9,29]]}},"container-title":["2022 IEEE 47th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9843189\/9843201\/09843272.pdf?arnumber=9843272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T20:14:11Z","timestamp":1669666451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9843272\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/lcn53696.2022.9843272","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}