{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:07:55Z","timestamp":1744193275185,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tencon.2018.8650225","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T21:10:38Z","timestamp":1552943438000},"page":"0640-0645","source":"Crossref","is-referenced-by-count":6,"title":["VCDeepFL: Vector Convolutional Deep Feature Learning Approach for Identification of Known and Unknown Denial of Service Attacks"],"prefix":"10.1109","author":[{"given":"Narayanavadivoo Gopinathan","family":"Bhuvaneswari Amma","sequence":"first","affiliation":[]},{"given":"Selvakumar","family":"Subramanian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.116"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2017.8227849"},{"key":"ref15","first-page":"210","article-title":"An anomaly-based network intrusion detection system using deep learning","author":"van","year":"2017","journal-title":"IEEE International Conference on System Science and Engineering (ICSSE)"},{"journal-title":"Data Mining Concepts and Techniques","year":"2006","author":"han","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5473-9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"journal-title":"Arbor Networks Worldwide Infrastructure Security Report","year":"2018","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2336610"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.04.036"},{"key":"ref7","article-title":"EnClass: Ensemble-based classification model for network anomaly detection in massive datasets","author":"garg","year":"2017","journal-title":"2012 IEEE Global Communications Conference (GLOBECOM)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1141-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.101"}],"event":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","start":{"date-parts":[[2018,10,28]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2018,10,31]]}},"container-title":["TENCON 2018 - 2018 IEEE Region 10 Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8643125\/8650051\/08650225.pdf?arnumber=8650225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:25:26Z","timestamp":1598228726000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8650225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/tencon.2018.8650225","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}