{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:56:49Z","timestamp":1771919809147,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T00:00:00Z","timestamp":1517529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea","award":["NRF-2017R1A2B4012559"],"award-info":[{"award-number":["NRF-2017R1A2B4012559"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,2]]},"DOI":"10.1145\/3184066.3184089","type":"proceedings-article","created":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T17:23:36Z","timestamp":1524072216000},"page":"34-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Design and implementation of intrusion detection system using convolutional neural network for DoS detection"],"prefix":"10.1145","author":[{"given":"Sinh-Ngoc","family":"Nguyen","sequence":"first","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]},{"given":"Van-Quyet","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]},{"given":"Jintae","family":"Choi","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]},{"given":"Kyungbaek","family":"Kim","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,2,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A. S. a. D. P. G. Desai \"Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA \" Advances in Electronics Communication and Computer Technology (ICAECCT) pp. IEEE International Conference on. IEEE 2016. 2016.  A. S. a. D. P. G. Desai \"Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA \" Advances in Electronics Communication and Computer Technology (ICAECCT) pp. IEEE International Conference on. IEEE 2016. 2016."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.66"},{"key":"e_1_3_2_1_4_1","volume-title":"2012 7th International Conference on. IEEE","author":"Kulkarni G. e. a.","year":"2012"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.213"},{"key":"e_1_3_2_1_8_1","volume-title":"Vols. Second Annual Conference on. IEEE, 2004., p. Proceedings","author":"Lei J. Z. a. A. G.","year":"2004"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on. IEEE, 2016","author":"Deng C. a. H. Q.","year":"2016"},{"key":"e_1_3_2_1_10_1","first-page":"125","article-title":"Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools","author":"Mukkamala S. A. S. a. A. A.","year":"2006","journal-title":"Vemuri, V. Rao, Enhancing Computer Security with Smart Technology."}],"event":{"name":"ICMLSC 2018: ICMLSC 2018, The 2nd International Conference on Machine Learning and Soft Computing","location":"Phu Quoc Island Viet Nam","acronym":"ICMLSC 2018"},"container-title":["Proceedings of the 2nd International Conference on Machine Learning and Soft Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3184066.3184089","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3184066.3184089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:29Z","timestamp":1750208909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3184066.3184089"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,2]]},"references-count":10,"alternative-id":["10.1145\/3184066.3184089","10.1145\/3184066"],"URL":"https:\/\/doi.org\/10.1145\/3184066.3184089","relation":{},"subject":[],"published":{"date-parts":[[2018,2,2]]},"assertion":[{"value":"2018-02-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}