{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:41:26Z","timestamp":1768837286271,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:00:00Z","timestamp":1563840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,23]]},"DOI":"10.1145\/3354265.3354267","type":"proceedings-article","created":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T14:21:08Z","timestamp":1568298068000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Memristor Based Autoencoder for Unsupervised Real-Time Network Intrusion and Anomaly Detection"],"prefix":"10.1145","author":[{"given":"Md. Shahanur","family":"Alam","sequence":"first","affiliation":[{"name":"Dept. Of Electrical and Computer Engineering, University of Dayton, Dayton, OH, USA"}]},{"given":"B. Rasitha","family":"Fernando","sequence":"additional","affiliation":[{"name":"Dept. Of Electrical and Computer Engineering, University of Dayton, Dayton, OH, USA"}]},{"given":"Yassine","family":"Jaoudi","sequence":"additional","affiliation":[{"name":"Dept. Of Electrical and Computer Engineering, University of Dayton, Dayton, OH, USA"}]},{"given":"Chris","family":"Yakopcic","sequence":"additional","affiliation":[{"name":"Dept. Of Electrical and Computer Engineering, University of Dayton, Dayton, OH, USA"}]},{"given":"Raqibul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Dept. Of Electrical and Computer Engineering, University of Dayton, Dayton, OH, USA"}]},{"given":"Tarek M.","family":"Taha","sequence":"additional","affiliation":[{"name":"Dept. Of Electrical and Computer Engineering, University of Dayton, Dayton, OH, USA"}]},{"given":"Guru","family":"Subramanyam","sequence":"additional","affiliation":[{"name":"Dept. Of Electrical and Computer Engineering, University of Dayton, Dayton, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.06.006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.06.006"},{"key":"e_1_3_2_1_3_1","volume-title":"Neurocomputing","author":"Ahmada Subutai","year":"2017","unstructured":"Subutai Ahmada , Alexander Lavina , Scott Purdya , Zuha Agha , \"Unsupervised real-time anomaly detection for streaming data\", Vol. 262, pp. 134--147 , Neurocomputing , 2017 Subutai Ahmada, Alexander Lavina, Scott Purdya, Zuha Agha, \"Unsupervised real-time anomaly detection for streaming data\", Vol. 262, pp. 134--147, Neurocomputing, 2017"},{"key":"e_1_3_2_1_4_1","first-page":"578","volume-title":"Kevin Jones, 'Early-stage malware prediction using recurrent neural networks', computers & security","author":"Matilda Rhode","year":"2017","unstructured":"Matilda Rhode b , Pete Burnap b , Kevin Jones, 'Early-stage malware prediction using recurrent neural networks', computers & security Vol. 77 , August 2017 , pp. 578 -- 594 Matilda Rhode b, Pete Burnap b, Kevin Jones, 'Early-stage malware prediction using recurrent neural networks', computers & security Vol. 77, August 2017, pp. 578--594"},{"key":"e_1_3_2_1_5_1","first-page":"471","volume-title":"Un-Supervised MRI Segmentation using Self Organised Maps,\" International Conference on Computational Intelligence and Communication Networks","author":"Prajapati P. K.","year":"2016","unstructured":"P. K. Prajapati and M. Dixit , \" Un-Supervised MRI Segmentation using Self Organised Maps,\" International Conference on Computational Intelligence and Communication Networks , pp. 471 -- 474 , India , December 2016 P. K. Prajapati and M. Dixit, \"Un-Supervised MRI Segmentation using Self Organised Maps,\" International Conference on Computational Intelligence and Communication Networks, pp. 471--474, India, December 2016"},{"key":"e_1_3_2_1_6_1","unstructured":"Raghavendra Chalapathy Sanjay Chawla \"Deep Learning for Anomaly Detection: A Survry\" arXiv:1901.03407v2 {cs.LG} Jan 2019  Raghavendra Chalapathy Sanjay Chawla \"Deep Learning for Anomaly Detection: A Survry\" arXiv:1901.03407v2 {cs.LG} Jan 2019"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2017.8268746"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966339"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"e_1_3_2_1_10_1","volume-title":"BC","author":"Yakopcic C.","year":"2016","unstructured":"C. Yakopcic , M. Z. Alom , and T. M. Taha , \" Memristor Crossbar Deep Network Implementation Based on a Convolutional Neural Network,\" IEEE\/INNS International Joint Conference on Neural Networks (IJCNN), pp. 963--970, Vancouver , BC , July 2016 . C. Yakopcic, M. Z. Alom, and T. M. Taha, \"Memristor Crossbar Deep Network Implementation Based on a Convolutional Neural Network,\" IEEE\/INNS International Joint Conference on Neural Networks (IJCNN), pp. 963--970, Vancouver, BC, July 2016."},{"key":"e_1_3_2_1_11_1","volume-title":"National Aerospace and Electronic Conference (NAECON)","author":"Hasan Raqibul","year":"2015","unstructured":"Raqibul Hasan , Tarek M. Taha , 'Memristor crossbar based unsupervised training ', National Aerospace and Electronic Conference (NAECON) , Dayton, USA , June 2015 Raqibul Hasan, Tarek M. Taha, 'Memristor crossbar based unsupervised training', National Aerospace and Electronic Conference (NAECON), Dayton, USA, June 2015"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Analysis and Design of Memristor Crossbar Based Neuromorphic Intrusion Detection Hardware,\" IEEE\/INNS International Joint Conference on Neural Networks (IJCNN)","author":"Taha Yakopcic","year":"2018","unstructured":"Yakopcic and T. M. Taha , \" Analysis and Design of Memristor Crossbar Based Neuromorphic Intrusion Detection Hardware,\" IEEE\/INNS International Joint Conference on Neural Networks (IJCNN) , pp. 1 -- 7 , Rio de Janeiro , Brazil, Julys, 2018 Yakopcic and T. M. Taha, \"Analysis and Design of Memristor Crossbar Based Neuromorphic Intrusion Detection Hardware,\" IEEE\/INNS International Joint Conference on Neural Networks (IJCNN), pp. 1--7, Rio de Janeiro, Brazil, Julys, 2018"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264819"},{"key":"e_1_3_2_1_14_1","volume-title":"International Joint Conference on Neural Networks (IJCNN)","author":"Yousefi-Azar Mahmood","year":"2017","unstructured":"Mahmood Yousefi-Azar , Vijay Varadharajan , Len Hamey and Uday Tupakula , 'Autoencoder-based Feature Learning for Cyber Security Applications' , International Joint Conference on Neural Networks (IJCNN) , Anchorage, USA , May 2017 . Mahmood Yousefi-Azar, Vijay Varadharajan, Len Hamey and Uday Tupakula, 'Autoencoder-based Feature Learning for Cyber Security Applications', International Joint Conference on Neural Networks (IJCNN), Anchorage, USA, May 2017."},{"key":"e_1_3_2_1_15_1","first-page":"858","article-title":"Intrusion Detection Using Convolutional Neural Networks for Representation Learning","author":"Li Zhipeng","year":"2017","unstructured":"Zhipeng Li , Zheng Qin , Kai Huang , Xiao Yang , and Shuxiong Ye , \" Intrusion Detection Using Convolutional Neural Networks for Representation Learning \", Springer , 2017 , pp. 858 -- 866 . Zhipeng Li, Zheng Qin, Kai Huang, Xiao Yang, and Shuxiong Ye, \"Intrusion Detection Using Convolutional Neural Networks for Representation Learning\", Springer, 2017, pp. 858--866.","journal-title":"Springer"},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Advanced Communications Technology (ICACT)","author":"Farahnakian Fahimeh","year":"2018","unstructured":"Fahimeh Farahnakian , Jukka Heikkonen , ' A Deep Auto-Encoder based Approach for Intrusion Detection System' , International Conference on Advanced Communications Technology (ICACT) , South Korea , February 2018 . Fahimeh Farahnakian, Jukka Heikkonen, 'A Deep Auto-Encoder based Approach for Intrusion Detection System', International Conference on Advanced Communications Technology (ICACT), South Korea, February 2018."},{"key":"e_1_3_2_1_17_1","unstructured":"NSL-KDD data: https:\/\/www.unb.ca\/cic\/datasets\/nsl.html.  NSL-KDD data: https:\/\/www.unb.ca\/cic\/datasets\/nsl.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.145"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCT.1971.1083337"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505821.2505823"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2017.05.005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2014.6889893"},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"Rio de Janeiro","author":"Fernando B. R.","year":"2018","unstructured":"B. R. Fernando , R. Hasan and M. Tarek Taha , \" Low Power Memristor Crossbar Based Winner Takes All Circuit,\" 2018 IJCNN , Rio de Janeiro , 2018 , pp. 1 -- 6 . B. R. Fernando, R. Hasan and M. Tarek Taha, \"Low Power Memristor Crossbar Based Winner Takes All Circuit,\" 2018 IJCNN, Rio de Janeiro, 2018, pp. 1--6."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2005.11.015"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898399"},{"key":"e_1_3_2_1_26_1","volume-title":"ADBIS","author":"Dromard","year":"2015","unstructured":"Dromard J., Roudi\u00e8re G., Owezarski P. ( 2015 ) Unsupervised Network Anomaly Detection in Real-Time on Big Data. In: Morzy T., Valduriez P., Bellatreche L. (eds) New Trends in Databases and Information Systems . ADBIS 2015. Communications in Computer and Information Science, vol 539. Springer, Cham Dromard J., Roudi\u00e8re G., Owezarski P. (2015) Unsupervised Network Anomaly Detection in Real-Time on Big Data. In: Morzy T., Valduriez P., Bellatreche L. (eds) New Trends in Databases and Information Systems. ADBIS 2015. Communications in Computer and Information Science, vol 539. Springer, Cham"},{"key":"e_1_3_2_1_27_1","volume-title":"IEEE International Conference on Machine Learning and Applications","author":"Kathareios G.","year":"2017","unstructured":"G. Kathareios , A. Anghel , Akos M, R. Clauberg , M. Gusat , \" Catch It If You Can : Real-Time Network Anomaly Detection With Low False Alarm Rates \", IEEE International Conference on Machine Learning and Applications , Cancun, Mexico , December 2017 . G. Kathareios, A. Anghel, Akos M, R. Clauberg, M. Gusat, \"Catch It If You Can: Real-Time Network Anomaly Detection With Low False Alarm Rates\", IEEE International Conference on Machine Learning and Applications, Cancun, Mexico, December 2017."}],"event":{"name":"ICONS '19: International Conference on Neuromorphic Systems","location":"Knoxville TN USA","acronym":"ICONS '19","sponsor":["SIGDA ACM Special Interest Group on Design Automation","Intel Intel"]},"container-title":["Proceedings of the International Conference on Neuromorphic Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3354265.3354267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3354265.3354267","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3354265.3354267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:56Z","timestamp":1750203896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3354265.3354267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,23]]},"references-count":27,"alternative-id":["10.1145\/3354265.3354267","10.1145\/3354265"],"URL":"https:\/\/doi.org\/10.1145\/3354265.3354267","relation":{},"subject":[],"published":{"date-parts":[[2019,7,23]]},"assertion":[{"value":"2019-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}