{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T04:34:28Z","timestamp":1768883668314,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3484824.3484878","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T23:09:15Z","timestamp":1642115355000},"page":"110-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Performance Comparison of Network Intrusion Detection System Based on Different Pre-processing Methods and Deep Neural Network"],"prefix":"10.1145","author":[{"given":"Gaurav","family":"Meena","sequence":"first","affiliation":[{"name":"Central University of Rajasthan, Ajmer, Rajasthan, India"}]},{"given":"Babita","family":"Dhanwal","sequence":"additional","affiliation":[{"name":"Central University of Rajasthan, Ajmer, Rajasthan, India"}]},{"given":"Mehul","family":"Mahrishi","sequence":"additional","affiliation":[{"name":"Swami Keshvanand Institute of Technology, Jaipur, India"}]},{"given":"Kamal Kant","family":"Hiran","sequence":"additional","affiliation":[{"name":"Sir Padmapat Singhania University Udaipur, India"}]}],"member":"320","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050111"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.05.025"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCA.2016.7578859"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906980"},{"key":"e_1_3_2_1_7_1","unstructured":"Elike Hodo Xavier Bellekens Andrew Hamilton Christos Tachtatzis and Robert Atkinson. 2017. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv:1701.02145 [cs.CR]  Elike Hodo Xavier Bellekens Andrew Hamilton Christos Tachtatzis and Robert Atkinson. 2017. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv:1701.02145 [cs.CR]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"e_1_3_2_1_9_1","first-page":"16","article-title":"Article: A Literature Survey and Comprehensive Study of Intrusion Detection","volume":"81","author":"Jonnalagadda Sravan Kumar","year":"2013","unstructured":"Sravan Kumar Jonnalagadda and Ravi Prakash Reddy I. 2013 . Article: A Literature Survey and Comprehensive Study of Intrusion Detection . International Journal of Computer Applications 81 , 16 (November 2013), 40--47. Sravan Kumar Jonnalagadda and Ravi Prakash Reddy I. 2013. Article: A Literature Survey and Comprehensive Study of Intrusion Detection. International Journal of Computer Applications 81, 16 (November 2013), 40--47.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2017.7881684"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-3095-5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1515\/9783110702514-007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPTELIX.2017.8004032"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.017"},{"key":"e_1_3_2_1_17_1","volume-title":"A Comparison of Feature-Selection Methods for Intrusion Detection","author":"Nguyen Hai Thanh","unstructured":"Hai Thanh Nguyen , Slobodan Petrovi\u0107 , and Katrin Franke . 2010. A Comparison of Feature-Selection Methods for Intrusion Detection . In Computer Network Security, Igor Kotenko and Victor Skormin (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 242--255. Hai Thanh Nguyen, Slobodan Petrovi\u0107, and Katrin Franke. 2010. A Comparison of Feature-Selection Methods for Intrusion Detection. In Computer Network Security, Igor Kotenko and Victor Skormin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 242--255."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.28-12-2017.153515"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070419"},{"key":"e_1_3_2_1_20_1","volume-title":"2012 Proceedings of the 35th International Convention MIPRO. 1023--1029","author":"Parsazad Shafigh","year":"2012","unstructured":"Shafigh Parsazad , Ehsan Saboori , and Amin Allahyar . 2012 . Fast Feature Reduction in intrusion detection datasets . In 2012 Proceedings of the 35th International Convention MIPRO. 1023--1029 . Shafigh Parsazad, Ehsan Saboori, and Amin Allahyar. 2012. Fast Feature Reduction in intrusion detection datasets. In 2012 Proceedings of the 35th International Convention MIPRO. 1023--1029."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"e_1_3_2_1_22_1","volume-title":"Soft Computing in Industrial Applications, Ant\u00f3nio Gaspar-Cunha","author":"Salama Mostafa A.","unstructured":"Mostafa A. Salama , Heba F. Eid , Rabie A. Ramadan , Ashraf Darwish , and Aboul Ella Hassanien . 2011. Hybrid Intelligent Intrusion Detection Scheme . In Soft Computing in Industrial Applications, Ant\u00f3nio Gaspar-Cunha , Ricardo Takahashi, Gerald Schaefer, and Lino Costa (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 293--303. Mostafa A. Salama, Heba F. Eid, Rabie A. Ramadan, Ashraf Darwish, and Aboul Ella Hassanien. 2011. Hybrid Intelligent Intrusion Detection Scheme. In Soft Computing in Industrial Applications, Ant\u00f3nio Gaspar-Cunha, Ricardo Takahashi, Gerald Schaefer, and Lino Costa (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 293--303."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2015.7219890"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"e_1_3_2_1_25_1","unstructured":"Vivienne Sze Yu-Hsin Chen Tien-Ju Yang and Joel Emer. 2017. Efficient Processing of Deep Neural Networks: A Tutorial and Survey. arXiv:1703.09039 [cs.CV]  Vivienne Sze Yu-Hsin Chen Tien-Ju Yang and Joel Emer. 2017. Efficient Processing of Deep Neural Networks: A Tutorial and Survey. arXiv:1703.09039 [cs.CV]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_1_27_1","first-page":"06","article-title":"Network intrusion detection using Deep Learning techniques","volume":"29","author":"Raju Bankapalli Akkalakshmi Venkata","year":"2020","unstructured":"Akkalakshmi Venkata Raju Bankapalli . 2020 . Network intrusion detection using Deep Learning techniques . International Journal of Advanced Science and Technology 29 , 06 (Jun. 2020), 8278--8287. Akkalakshmi Venkata Raju Bankapalli. 2020. Network intrusion detection using Deep Learning techniques. International Journal of Advanced Science and Technology 29, 06 (Jun. 2020), 8278--8287.","journal-title":"International Journal of Advanced Science and Technology"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1441"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2016.7751626"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2013.49"},{"key":"e_1_3_2_1_31_1","volume-title":"Gao","author":"Zhao Rui","year":"2016","unstructured":"Rui Zhao , Ruqiang Yan , Zhenghua Chen , Kezhi Mao , Peng Wang , and Robert X . Gao . 2016 . Deep Learning and Its Applications to Machine Health Monitoring: A Survey . arXiv:1612.07640 [cs.LG] Rui Zhao, Ruqiang Yan, Zhenghua Chen, Kezhi Mao, Peng Wang, and Robert X. Gao. 2016. Deep Learning and Its Applications to Machine Health Monitoring: A Survey. arXiv:1612.07640 [cs.LG]"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"}],"event":{"name":"DSMLAI '21': International Conference on Data Science, Machine Learning and Artificial Intelligence","location":"Windhoek Namibia","acronym":"DSMLAI '21'"},"container-title":["Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484824.3484878","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484824.3484878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:15Z","timestamp":1750191435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484824.3484878"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":32,"alternative-id":["10.1145\/3484824.3484878","10.1145\/3484824"],"URL":"https:\/\/doi.org\/10.1145\/3484824.3484878","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2022-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}