{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T08:18:57Z","timestamp":1769761137259,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3590837.3590901","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T18:36:51Z","timestamp":1685471811000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An Effect of Stacked CNN for Network Intrusion Detection System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1315-2727","authenticated-orcid":false,"given":"Pankaj","family":"Rahi","sequence":"first","affiliation":[{"name":"Deptt. of Artificial Intelligence and Data Science, Poornima Institute of Engineering and Technology, Jaipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5501-4210","authenticated-orcid":false,"given":"Monika","family":"Dandotiya","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Poornima University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5712-4931","authenticated-orcid":false,"given":"A.","family":"Anushya","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, POORNIMA UNIVERSITY, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5335-9434","authenticated-orcid":false,"given":"Ajay","family":"Khunteta","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, POORNIMA UNIVERSITY JAIPUR, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1027-2419","authenticated-orcid":false,"given":"Pankaj","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, K.R. Manglam University, Gurugram, Haryana, India, India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAICT50021.2020.9172014"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986217"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089575"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2007.05.007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5213759"},{"key":"e_1_3_2_1_6_1","volume-title":"Sarsij Tripathi and Alok Kumar Shukla","author":"Dwivedi Shubhra","year":"2020","unstructured":"Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi and Alok Kumar Shukla. 2020. Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection.\u00a0Evolutionary Intelligence.\u00a013 (September 2019), 103-117."},{"key":"e_1_3_2_1_7_1","volume-title":"A Feature Selection Algorithm for Intrusion Detection System Based on Pigeon Inspired Optimizer. Expert Systems with Applications. 148 (June","author":"Alazzam Hadeel","year":"2020","unstructured":"Hadeel Alazzam, Ahmad Sharieh, and Khair Eddin Sabri. 2020. A Feature Selection Algorithm for Intrusion Detection System Based on Pigeon Inspired Optimizer. Expert Systems with Applications. 148 (June 2020), 113249. 10.1016\/j.eswa.2020.113249."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009533"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Alok Kumar Shukla. 2021. Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm.\u00a0Neural Comput & Applic\u00a033 7541\u20137561. https:\/\/doi.org\/10.1007\/s00521-020-05500-7","DOI":"10.1007\/s00521-020-05500-7"},{"key":"e_1_3_2_1_10_1","volume-title":"Feature Selection Algorithm For Intrusion Detection Using Cuckoo Search Algorithm. In 2020 International Electronics Symposium (IES). 430-435","author":"Syarif Iwan","year":"2020","unstructured":"Iwan Syarif, Rico Afandi, and Ferry Astika. 2020. Feature Selection Algorithm For Intrusion Detection Using Cuckoo Search Algorithm. In 2020 International Electronics Symposium (IES). 430-435. 10.1109\/IES50839.2020.9231840."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/RoboMech.2016.7813162"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2008.04.027"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"P. Shunmugapriya and S. Kanmani. 2017. A hybrid algorithm using ant and bee colony optimization for feature selection and classification (AC-ABC Hybrid). Swarm Evol Comput 36 (October 2017) 27\u201336. https:\/\/doi.org\/10.1016\/j.swevo.2017.04.002.","DOI":"10.1016\/j.swevo.2017.04.002"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"e_1_3_2_1_15_1","first-page":"2160","article-title":"Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino","volume":"4","author":"Zahra Musaddak Abdul","year":"2020","unstructured":"Musaddak Abdul Zahra, Marwa Mohsin, and Laith Abdul-Rahaim. 2020. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino. Periodicals of Engineering and Natural Sciences (PEN). 4. 2160-2168.","journal-title":"Periodicals of Engineering and Natural Sciences (PEN)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2695-6_45"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973730"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2014.7083539"},{"key":"e_1_3_2_1_19_1","volume-title":"Electronic and Automation Control Conference (IAEAC). 634-637","author":"Zheng Shiji","year":"2021","unstructured":"Shiji Zheng. 2021. Network Intrusion Detection Model Based on Convolutional Neural Network. In 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). 634-637. 10.1109\/IAEAC50856.2021.9390930."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369617"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA51271.2020.00027"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFEEA51475.2020.00153"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ViTECoN.2019.8899368"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSD47982.2019.9003119"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.17148\/IJARCCE.2015.4696"},{"key":"e_1_3_2_1_26_1","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int","author":"Revathi S.","year":"2013","unstructured":"S. Revathi and A. Malathi. 2013. A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT). 2 (December \u2013 2013), 1848\u2013 1853. IJERTV2IS120804.","journal-title":"J. Eng. Res. Technol. (IJERT). 2"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502224"},{"key":"e_1_3_2_1_28_1","unstructured":"Thomas Lidy and Alexander Schindler. 2016. Parallel Convolutional Neural Networks for Music Genre and Mood Classification. Music Information Retrieval Evaluation eXchange (MIREX 2016). Technical Report. 1-4."}],"event":{"name":"ICIMMI 2022: International Conference on Information Management & Machine Intelligence","location":"Jaipur India","acronym":"ICIMMI 2022"},"container-title":["Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590901","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590837.3590901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:47:17Z","timestamp":1767581237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":28,"alternative-id":["10.1145\/3590837.3590901","10.1145\/3590837"],"URL":"https:\/\/doi.org\/10.1145\/3590837.3590901","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}