{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:47Z","timestamp":1750220867641,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1145\/3314058.3317291","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploring RNNs for analyzing Zeek HTTP data"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Andrews","sequence":"first","affiliation":[{"name":"United States Military Academy"}]},{"given":"Jennifer","family":"Behn","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Danielle","family":"Jaksha","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Jinwon","family":"Seo","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Madeleine","family":"Schneider","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"James","family":"Yoon","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Suzanne J.","family":"Matthews","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Rajeev","family":"Agrawal","sequence":"additional","affiliation":[{"name":"U.S. Army E.R.D.C."}]},{"given":"Alexander S.","family":"Mentis","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]}],"member":"320","published-online":{"date-parts":[[2019,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dan Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. http:\/\/tensorflow.org\/Software available from tensorflow.org.  Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dan Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. http:\/\/tensorflow.org\/Software available from tensorflow.org."},{"key":"e_1_3_2_1_2_1","unstructured":"Ferretti Guide Marchetti Apruzzese Colajanni. 2018. On the effectiveness of machine and deep learning for cyber security. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8405026  Ferretti Guide Marchetti Apruzzese Colajanni. 2018. On the effectiveness of machine and deep learning for cyber security. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8405026"},{"key":"e_1_3_2_1_3_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io.  Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io."},{"key":"e_1_3_2_1_4_1","first-page":"l","volume":"201","author":"Deaton S.","unstructured":"S. Deaton , D. Brownfield , L. Kosta , Z. Zhu , and S. J. Matthews. 201 7. Rea l -time regex matching with apache spark. In 2017 IEEE High Performance Extreme Computing Conference (HPEC). 1--6. S. Deaton, D. Brownfield, L. Kosta, Z. Zhu, and S.J. Matthews. 2017. Real-time regex matching with apache spark. In 2017 IEEE High Performance Extreme Computing Conference (HPEC). 1--6.","journal-title":"J. Matthews."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"e_1_3_2_1_6_1","volume":"201","author":"Lorenzen C.","unstructured":"C. Lorenzen , R. Agrawal , and J. King. 201 8. Determining Viability of Deep Learning on Cybersecurity Log Analytics. In 2018 IEEE International Conference on Big Data (Big Data). 4806--4811. C. Lorenzen, R. Agrawal, and J. King. 2018. Determining Viability of Deep Learning on Cybersecurity Log Analytics. In 2018 IEEE International Conference on Big Data (Big Data). 4806--4811.","journal-title":"J. King."},{"volume-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 1--6.","author":"Tavallaee M.","key":"e_1_3_2_1_7_1","unstructured":"M. Tavallaee , E. Bagheri , W. Lu , and A. A. Ghorbani . 2009. A detailed analysis of the KDD CUP 99 data set . In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 1--6. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 1--6."}],"event":{"name":"HotSoS: Hot Topics in the Science of Security Symposium","sponsor":["National Security Agency National Security Agency"],"location":"Nashville Tennessee USA","acronym":"HotSoS"},"container-title":["Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3317291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3317291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:48Z","timestamp":1750202628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3317291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":7,"alternative-id":["10.1145\/3314058.3317291","10.1145\/3314058"],"URL":"https:\/\/doi.org\/10.1145\/3314058.3317291","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"2019-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}