{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:07:45Z","timestamp":1755907665547,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"HORIZON EUROPE Framework Programme","doi-asserted-by":"publisher","award":["101094901"],"award-info":[{"award-number":["101094901"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,26]]},"DOI":"10.1145\/3652037.3663908","type":"proceedings-article","created":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T12:30:38Z","timestamp":1719405038000},"page":"613-618","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Zeekflow+: A Deep LSTM Autoencoder with Integrated Random Forest Classifier for Binary and Multi-class Classification in Network Traffic Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1696-622X","authenticated-orcid":false,"given":"Emmanouil","family":"Arapidis","sequence":"first","affiliation":[{"name":"INFILI Technologies SA, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1763-9930","authenticated-orcid":false,"given":"Nikos","family":"Temenos","sequence":"additional","affiliation":[{"name":"Institute of Communication and Computer Systems, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7059-8917","authenticated-orcid":false,"given":"Dimitris","family":"Giagkos","sequence":"additional","affiliation":[{"name":"INFILI Technologies SA, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4491-5854","authenticated-orcid":false,"given":"Ioannis","family":"Rallis","sequence":"additional","affiliation":[{"name":"Institute of Communication and Computer Systems, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9550-0088","authenticated-orcid":false,"given":"Dimitris","family":"Kalogeras","sequence":"additional","affiliation":[{"name":"Institute of Communication and Computer Systems, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0497-9565","authenticated-orcid":false,"given":"Nikolaos","family":"Papadakis","sequence":"additional","affiliation":[{"name":"INFILI Technologies SA, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7658-2559","authenticated-orcid":false,"given":"Antonis","family":"Litke","sequence":"additional","affiliation":[{"name":"INFILI Technologies SA, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5998-2940","authenticated-orcid":false,"given":"Sotirios","family":"C. Messinis","sequence":"additional","affiliation":[{"name":"Institute of Communication and Computer Systems, Greece"}]}],"member":"320","published-online":{"date-parts":[[2024,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on Attacks and Software Protection (WASP). 1\u201316","author":"Dimitris Giagkos","year":"2023","unstructured":"Giagkos Dimitris, Kompougias Orestis, Litke Antonis, and Papadakis Nikolaos. 2023. ZeekFlow: Deep Learning-based network intrusion detection A multimodal approach. In Workshop on Attacks and Software Protection (WASP). 1\u201316."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzac002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12105051"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICS51289.2020.00028"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2020.122377"},{"key":"e_1_3_2_1_8_1","volume-title":"Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review. Computers in Biology and Medicine","author":"Messinis Sotirios","year":"2024","unstructured":"Sotirios Messinis, Nikos Temenos, Nicholas\u00a0E Protonotarios, Ioannis Rallis, Dimitrios Kalogeras, and Nikolaos Doulamis. 2024. Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review. Computers in Biology and Medicine (2024), 108036."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5404"},{"volume-title":"Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy","author":"Nassereddine Mohamed","key":"e_1_3_2_1_10_1","unstructured":"Mohamed Nassereddine and Alex Khang. 2024. Applications of Internet of Things (IoT) in smart cities. In Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy. CRC Press, 109\u2013136."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083060"},{"key":"e_1_3_2_1_12_1","volume-title":"Learning neural representations for network anomaly detection","author":"Nicolau Miguel","year":"2018","unstructured":"Miguel Nicolau, James McDermott, 2018. Learning neural representations for network anomaly detection. IEEE transactions on cybernetics 49, 8 (2018), 3074\u20133087."},{"volume-title":"Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy","author":"Rath Kali\u00a0Charan","key":"e_1_3_2_1_13_1","unstructured":"Kali\u00a0Charan Rath, Alex Khang, and Debanik Roy. 2024. The Role of Internet of Things (IoT) Technology in Industry 4.0 Economy. In Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy. CRC Press, 1\u201328."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3416013.3426457"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Hasim Sak Andrew\u00a0W. Senior and Fran\u00e7oise Beaufays. 2014. Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In INTERSPEECH. 338\u2013342.","DOI":"10.21437\/Interspeech.2014-80"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269112"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-022-00134-9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.060"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103622"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.041"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"}],"event":{"name":"PETRA '24: The PErvasive Technologies Related to Assistive Environments Conference","acronym":"PETRA '24","location":"Crete Greece"},"container-title":["Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652037.3663908","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652037.3663908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:42:12Z","timestamp":1755877332000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652037.3663908"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,26]]},"references-count":22,"alternative-id":["10.1145\/3652037.3663908","10.1145\/3652037"],"URL":"https:\/\/doi.org\/10.1145\/3652037.3663908","relation":{},"subject":[],"published":{"date-parts":[[2024,6,26]]},"assertion":[{"value":"2024-06-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}