{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:29:03Z","timestamp":1767706143368,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T00:00:00Z","timestamp":1608595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,22]]},"DOI":"10.1145\/3428363.3428371","type":"proceedings-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T14:40:56Z","timestamp":1608648056000},"page":"82-88","source":"Crossref","is-referenced-by-count":16,"title":["Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder"],"prefix":"10.1145","author":[{"given":"Shuhana","family":"Azmin","sequence":"first","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. B. M Alim Al","family":"Islam","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.025"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","volume":"2","author":"An Jinwon","year":"2015","journal-title":"Special Lecture on IE"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Rodrigo Braga Edjard de Souza\u00a0Mota and Alexandre Passito. 2010. Lightweight DDoS flooding attack detection using NOX\/OpenFlow.. In LCN Vol.\u00a010. 408\u2013415.  Rodrigo Braga Edjard de Souza\u00a0Mota and Alexandre Passito. 2010. Lightweight DDoS flooding attack detection using NOX\/OpenFlow.. In LCN Vol.\u00a010. 408\u2013415.","DOI":"10.1109\/LCN.2010.5735752"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_5_1","first-page":"11","article-title":"Intrusion detection system using self organizing map: a surevey","volume":"4","author":"Choksi Kruti","year":"2014","journal-title":"International Journal of Engineering Research and Applications"},{"volume-title":"ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks","year":"2008","author":"He Haibo","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.04.005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"volume-title":"Learning in graphical models","author":"Jordan I","key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-011-5014-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462181"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).","year":"2014","author":"Kingma P","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Durk\u00a0P Kingma Shakir Mohamed Danilo\u00a0Jimenez Rezende and Max Welling. 2014. Semi-supervised learning with deep generative models. In Advances in neural information processing systems. 3581\u20133589.  Durk\u00a0P Kingma Shakir Mohamed Danilo\u00a0Jimenez Rezende and Max Welling. 2014. Semi-supervised learning with deep generative models. In Advances in neural information processing systems. 3581\u20133589."},{"key":"e_1_3_2_1_14_1","unstructured":"Diederik\u00a0P Kingma and Max Welling. 2013. Auto-Encoding Variational Bayes. arxiv:1312.6114\u00a0[stat.ML]  Diederik\u00a0P Kingma and Max Welling. 2013. Auto-Encoding Variational Bayes. arxiv:1312.6114\u00a0[stat.ML]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.009"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Yihua Liao and V\u00a0Rao Vemuri. 2002. Use of k-nearest neighbor classifier for intrusion detection. Computers & security 21 5 (2002) 439\u2013448.  Yihua Liao and V\u00a0Rao Vemuri. 2002. Use of k-nearest neighbor classifier for intrusion detection. Computers & security 21 5 (2002) 439\u2013448.","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17091967"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMSC.2015.7594039"},{"key":"e_1_3_2_1_19_1","unstructured":"Lee Nicholas Shih\u00a0Yin Ooi Ying\u00a0Han Pang Seong\u00a0Oun Hwang and Syh-Yuan Tan. 2018. Study of long short-term memory in flow-based network intrusion detection system. Journal of Intelligent & Fuzzy SystemsPreprint (2018) 1\u201311.  Lee Nicholas Shih\u00a0Yin Ooi Ying\u00a0Han Pang Seong\u00a0Oun Hwang and Syh-Yuan Tan. 2018. Study of long short-term memory in flow-based network intrusion detection system. Journal of Intelligent & Fuzzy SystemsPreprint (2018) 1\u201311."},{"key":"e_1_3_2_1_20_1","unstructured":"Quamar Niyaz Weiqing Sun and Ahmad\u00a0Y Javaid. 2016. A deep learning based DDoS detection system in software-defined networking (SDN). arXiv preprint arXiv:1611.07400(2016).  Quamar Niyaz Weiqing Sun and Ahmad\u00a0Y Javaid. 2016. A deep learning based DDoS detection system in software-defined networking (SDN). arXiv preprint arXiv:1611.07400(2016)."},{"volume-title":"Variational Laplace Autoencoders. In International Conference on Machine Learning. 5032\u20135041","year":"2019","author":"Park Yookoon","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751957.2751979"},{"key":"e_1_3_2_1_23_1","unstructured":"S.\u00a0J. Stolfo. [n.d.]. KDD Cup 1999. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html  S.\u00a0J. Stolfo. [n.d.]. KDD Cup 1999. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2848210"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"e_1_3_2_1_26_1","unstructured":"UNB. [n.d.]. NSL-KDD Dataset. https:\/\/www.unb.ca\/cic\/datasets\/nsl.html  UNB. [n.d.]. NSL-KDD Dataset. https:\/\/www.unb.ca\/cic\/datasets\/nsl.html"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762015"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19112528"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"}],"event":{"name":"7th NSysS 2020: 7th International Conference on Networking, Systems and Security","acronym":"7th NSysS 2020","location":"Dhaka Bangladesh"},"container-title":["7th International Conference on Networking, Systems and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428363.3428371","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428363.3428371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:03Z","timestamp":1750197723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428363.3428371"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,22]]},"references-count":29,"alternative-id":["10.1145\/3428363.3428371","10.1145\/3428363"],"URL":"https:\/\/doi.org\/10.1145\/3428363.3428371","relation":{},"subject":[],"published":{"date-parts":[[2020,12,22]]}}}