{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:06:51Z","timestamp":1770754011733,"version":"3.50.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/patmos.2018.8463997","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T17:47:06Z","timestamp":1536860826000},"page":"177-182","source":"Crossref","is-referenced-by-count":23,"title":["Multiclass Network Attack Classifier Using CNN Tuned with Genetic Algorithms"],"prefix":"10.1109","author":[{"given":"Roberto","family":"Blanco","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Malagon","sequence":"additional","affiliation":[]},{"given":"Juan J.","family":"Cilla","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"Moya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Performance comparison for intrusion detection system using neural network with kdd dataset","volume":"4","author":"devaraju","year":"2014","journal-title":"ICTACT J Soft Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref12","article-title":"Improving the performance of multi-class intrusion detection systems using feature reduction","author":"essam","year":"2015","journal-title":"International Journal of Computer Science Issues"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"ref14","first-page":"21","article-title":"A deep learning approach for network intrusion detection system","author":"javaid","year":"2016","journal-title":"Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (Formerly BIONETICS) ser BICT'15 ICST Brussels"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2016.7881798"},{"key":"ref16","first-page":"414","article-title":"Attack detection in cloud infrastructures using artificial neural network with genetic feature selection","author":"guha","year":"2016","journal-title":"2016 IEEE 14th Intl Conf on Dependable Autonomic and Secure Computing 14th Intl Conf on Pervasive Intelligence and Computing 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASCIP\/Com\/DataCom\/CyberSciTech)"},{"key":"ref17","article-title":"Shallow and deep networks intrusion detection system: A taxonomy and survey","volume":"abs 1701 2145","author":"hodo","year":"2017","journal-title":"CoRR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2003.1227801"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.10.022"},{"key":"ref4","first-page":"1","article-title":"Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set)","author":"moustafa","year":"2015","journal-title":"Military Communications and Information Systems Conference (Mil-CIS) 2015 IEEE Stream"},{"key":"ref3","year":"2009","journal-title":"Nsl-kdd Data Set for Network-based Intrusion Detection Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169230"},{"key":"ref5","first-page":"1","article-title":"The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set","year":"2016","journal-title":"information Security Journal A Global Perspective"},{"key":"ref8","article-title":"A detailed analysis on nsl-kdd dataset using various machine learning techniques for intrusion detection","author":"revathi","year":"0","journal-title":"International Journal of Engineering Research and Technology ESRSA Publications 2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2478\/v10065-010-0035-7"},{"key":"ref2","year":"2007"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.5120\/ijca2016908592","article-title":"Anomaly based ids using backpropagation neural network","volume":"136","author":"mane","year":"2016","journal-title":"International Journal of Computer Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.12.004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"ref21","first-page":"446","article-title":"A study on nsl-kdd dataset for intrusion detection system based on classification algorithms","volume":"4","author":"dhanabal","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"}],"event":{"name":"2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS)","location":"Platja d'Aro","start":{"date-parts":[[2018,7,2]]},"end":{"date-parts":[[2018,7,4]]}},"container-title":["2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8450936\/8463989\/08463997.pdf?arnumber=8463997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:11:08Z","timestamp":1643177468000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8463997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/patmos.2018.8463997","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}