{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T00:27:31Z","timestamp":1777508851018,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,26]]},"DOI":"10.1145\/3430199.3430224","type":"proceedings-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T02:08:59Z","timestamp":1608602939000},"page":"223-231","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":103,"title":["Efficient Deep CNN-BiLSTM Model for Network Intrusion Detection"],"prefix":"10.1145","author":[{"given":"Jay","family":"Sinha","sequence":"first","affiliation":[{"name":"Ramaiah Institute of Technology, Bangalore, India"}]},{"given":"M.","family":"Manollas","sequence":"additional","affiliation":[{"name":"Ramaiah Institute of Technology, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2020,12,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. http:\/\/nsl.cs.unb.ca\/NSL-KDD\/  [n.d.]. http:\/\/nsl.cs.unb.ca\/NSL-KDD\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. https:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/  [n.d.]. https:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"e_1_3_2_1_4_1","volume-title":"2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). 218--224","author":"Azizjon M.","unstructured":"M. Azizjon , A. Jumabek , and W. Kim . 2020. 1D CNN based network intrusion detection with normalization on imbalanced data . In 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). 218--224 . M. Azizjon, A. Jumabek, and W. Kim. 2020. 1D CNN based network intrusion detection with normalization on imbalanced data. In 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). 218--224."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"e_1_3_2_1_6_1","unstructured":"L. Dhanabal and Dr. S.P. Shantharajah. 2015. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4. Issue 6.  L. Dhanabal and Dr. S.P. Shantharajah. 2015. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4. Issue 6."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3248"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"S. Hochreiter and J. Schmidhuber. 1997. Long Short-Term Memory. (1997).  S. Hochreiter and J. Schmidhuber. 1997. Long Short-Term Memory. (1997).","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2247592"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.012"},{"key":"e_1_3_2_1_11_1","volume-title":"An Improved Convolutional Neural Network Model for Intrusion Detection in Networks. In 2019 Cybersecurity and Cyberforensics Conference (CCC). 74--77","author":"Khan R. U.","unstructured":"R. U. Khan , X. Zhang , M. Alazab , and R. Kumar . 2019 . An Improved Convolutional Neural Network Model for Intrusion Detection in Networks. In 2019 Cybersecurity and Cyberforensics Conference (CCC). 74--77 . R. U. Khan, X. Zhang, M. Alazab, and R. Kumar. 2019. An Improved Convolutional Neural Network Model for Intrusion Detection in Networks. In 2019 Cybersecurity and Cyberforensics Conference (CCC). 74--77."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5120\/13608-1412"},{"key":"e_1_3_2_1_13_1","volume-title":"IJCAI'95: Proceedings of the 14th international joint conference on Artificial intelligence 2 (August","author":"Kohavi Ron","year":"1995","unstructured":"Ron Kohavi . August 1995 . A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection . IJCAI'95: Proceedings of the 14th international joint conference on Artificial intelligence 2 (August 1995), 1137--1143. Ron Kohavi. August 1995. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection. IJCAI'95: Proceedings of the 14th international joint conference on Artificial intelligence 2 (August 1995), 1137--1143."},{"key":"#cr-split#-e_1_3_2_1_14_1.1","doi-asserted-by":"crossref","unstructured":"F. Kuang W. Xu and S. Zhang. May 2014. A novel hybrid KPCA and SVM with GA model for intrusion detection. Applied Soft Computing 18 (May 2014) 178--184. https:\/\/doi.org\/10.1016\/j.asoc.2014.01.028 10.1016\/j.asoc.2014.01.028","DOI":"10.1016\/j.asoc.2014.01.028"},{"key":"#cr-split#-e_1_3_2_1_14_1.2","doi-asserted-by":"crossref","unstructured":"F. Kuang W. Xu and S. Zhang. May 2014. A novel hybrid KPCA and SVM with GA model for intrusion detection. Applied Soft Computing 18 (May 2014) 178--184. https:\/\/doi.org\/10.1016\/j.asoc.2014.01.028","DOI":"10.1016\/j.asoc.2014.01.028"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"W. Li P. Yi Y. Wu L. Pan and J. Li. June 2014. A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering 2014 (June 2014).  W. Li P. Yi Y. Wu L. Pan and J. Li. June 2014. A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering 2014 (June 2014).","DOI":"10.1155\/2014\/240217"},{"key":"#cr-split#-e_1_3_2_1_17_1.1","doi-asserted-by":"crossref","unstructured":"H. J. Liao C. H. R. Lin Y. C. Lin and K. Y. Tung. 2013. Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 36 (01 2013) 16--24. Issue 1. https:\/\/doi.org\/10.1016\/j.jnca.2012.09.004 10.1016\/j.jnca.2012.09.004","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"#cr-split#-e_1_3_2_1_17_1.2","doi-asserted-by":"crossref","unstructured":"H. J. Liao C. H. R. Lin Y. C. Lin and K. Y. Tung. 2013. Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 36 (01 2013) 16--24. Issue 1. https:\/\/doi.org\/10.1016\/j.jnca.2012.09.004","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_2_1_18_1","volume-title":"International Journal of Computer Science and Network (IJCSN) 2 (February","author":"Longadge Rushi","year":"2013","unstructured":"Mr. Rushi Longadge , Ms. Snehlata S. Dongre , and Dr. Latesh Malik . February 2013. Class Imbalance Problem in Data Mining: Review . International Journal of Computer Science and Network (IJCSN) 2 (February 2013 ). Issue 1. Mr.Rushi Longadge, Ms. Snehlata S. Dongre, and Dr. Latesh Malik. February 2013. Class Imbalance Problem in Data Mining: Review. International Journal of Computer Science and Network (IJCSN) 2 (February 2013). Issue 1."},{"key":"e_1_3_2_1_19_1","volume-title":"2015 Military Communications and Information Systems Conference (MilCIS). 1--6.","author":"Moustafa N.","unstructured":"N. Moustafa and J. Slay . 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) . In 2015 Military Communications and Information Systems Conference (MilCIS). 1--6. N. Moustafa and J. Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 Military Communications and Information Systems Conference (MilCIS). 1--6."},{"key":"e_1_3_2_1_20_1","volume-title":"2011 7th International Conference on Information Assurance and Security (IAS). 192--197","author":"Muda Z.","unstructured":"Z. Muda , W. Yassin , M. N. Sulaiman , and N. I. Udzir . 2011. Intrusion detection based on k-means clustering and OneR classification . In 2011 7th International Conference on Information Assurance and Security (IAS). 192--197 . Z. Muda, W. Yassin, M. N. Sulaiman, and N. I. Udzir. 2011. Intrusion detection based on k-means clustering and OneR classification. In 2011 7th International Conference on Information Assurance and Security (IAS). 192--197."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDT-2011-0117"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972627"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"e_1_3_2_1_25_1","volume-title":"2019 International Conference on Communication and Electronics Systems (ICCES). 409--416","author":"Verma A. K.","unstructured":"A. K. Verma , P. Kaushik , and G. Shrivastava . 2019. A Network Intrusion Detection Approach Using Variant of Convolution Neural Network . In 2019 International Conference on Communication and Electronics Systems (ICCES). 409--416 . A. K. Verma, P. Kaushik, and G. Shrivastava. 2019. A Network Intrusion Detection Approach Using Variant of Convolution Neural Network. In 2019 International Conference on Communication and Electronics Systems (ICCES). 409--416."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJISMD.2017070103"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"e_1_3_2_1_28_1","volume-title":"Electronic and Automation Control Conference (ITNEC). 798--802","author":"Yang S.","year":"2019","unstructured":"S. Yang . 2019 . Research on Network Behavior Anomaly Analysis Based on Bidirectional LSTM. In 2019 IEEE 3rd Information Technology, Networking , Electronic and Automation Control Conference (ITNEC). 798--802 . S. Yang. 2019. Research on Network Behavior Anomaly Analysis Based on Bidirectional LSTM. In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). 798--802."},{"key":"e_1_3_2_1_29_1","volume-title":"An Improved BM Pattern Matching Algorithm in Intrusion Detection System. Applied Mechanics and Materials 148--149 (12","author":"Yin Chao","year":"2011","unstructured":"Chao Yin . 2011. An Improved BM Pattern Matching Algorithm in Intrusion Detection System. Applied Mechanics and Materials 148--149 (12 2011 ), 1145--1148. https:\/\/doi.org\/10.4028\/www.scientific.net\/amm.148-149.1145 10.4028\/www.scientific.net Chao Yin. 2011. An Improved BM Pattern Matching Algorithm in Intrusion Detection System. Applied Mechanics and Materials 148--149 (12 2011), 1145--1148. https:\/\/doi.org\/10.4028\/www.scientific.net\/amm.148-149.1145"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"}],"event":{"name":"AIPR 2020: 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition","location":"Xiamen China","acronym":"AIPR 2020"},"container-title":["Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430199.3430224","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3430199.3430224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:14Z","timestamp":1750191434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430199.3430224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,26]]},"references-count":32,"alternative-id":["10.1145\/3430199.3430224","10.1145\/3430199"],"URL":"https:\/\/doi.org\/10.1145\/3430199.3430224","relation":{},"subject":[],"published":{"date-parts":[[2020,6,26]]},"assertion":[{"value":"2020-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}