{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:11Z","timestamp":1755780011727,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,22]]},"DOI":"10.1145\/3660043.3660139","type":"proceedings-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T10:18:07Z","timestamp":1717064287000},"page":"535-539","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["BGA: an Network Abnormal Traffic Detection Model for Information Security in Grid"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5168-7928","authenticated-orcid":false,"given":"Qionglan","family":"Na","sequence":"first","affiliation":[{"name":"State Grid Jibei Information &amp; Telecommunication Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0417-6751","authenticated-orcid":false,"given":"Na","family":"Xiao","sequence":"additional","affiliation":[{"name":"State Grid Jibei Information &amp; Telecommunication Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7926-518X","authenticated-orcid":false,"given":"Shijun","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Grid Jibei Information &amp; Telecommunication Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2951-1174","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Jibei Information &amp; Telecommunication Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6790-4060","authenticated-orcid":false,"given":"Sijia","family":"Zheng","sequence":"additional","affiliation":[{"name":"State Grid Electric Power Space Technology Company Limited, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9638-9361","authenticated-orcid":false,"given":"Yixi","family":"Yang","sequence":"additional","affiliation":[{"name":"State Grid Information &amp; Telecommunication Branch, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"217","volume-title":"IEEE","author":"Lei Y.","year":"2017","unstructured":"Lei Y. Network abnormal traffic detection algorithm based on SVM[C]\/\/2017 International Conference on Robots & Intelligent System (ICRIS). IEEE, 2017, 217-220."},{"key":"e_1_3_2_1_2_1","volume-title":"Network traffic abnormal detection based on packet bytes[C]\/\/Proceedings of the 2003 ACM symposium on Applied computing","author":"Mahoney M V","year":"2003","unstructured":"Mahoney M V. Network traffic abnormal detection based on packet bytes[C]\/\/Proceedings of the 2003 ACM symposium on Applied computing. 2003, 346-350."},{"key":"e_1_3_2_1_3_1","volume-title":"Network traffic abnormal detection using recurrent neural networks[J]. arXiv preprint arXiv:1803.10769","author":"Radford B J","year":"2018","unstructured":"Radford B J, Apolonio L M, Trias A J, Network traffic abnormal detection using recurrent neural networks[J]. arXiv preprint arXiv:1803.10769, 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65188-0"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Fotiadou K. Velivassaki T. H. Voulkidis A. Skias D. Tsekeridou S. & Zahariadis T. 2021. Network traffic abnormal detection via deep learning. Information 12(5) 215.","DOI":"10.3390\/info12050215"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09639-z"},{"key":"e_1_3_2_1_10_1","first-page":"685","volume-title":"IEEE","author":"Qu Z","year":"2018","unstructured":"Qu Z, Su L, Wang X, A unsupervised learning method of abnormal detection using gru[C]\/\/2018 IEEE International Conference on Big Data and Smart Computing (BigComp). IEEE, 2018, 685-688."},{"key":"e_1_3_2_1_11_1","first-page":"0540","volume-title":"Electronics and Mobile Communication Conference (IEMCON). IEEE","author":"Zingo P","year":"2020","unstructured":"Zingo P, Novocin A. Can GAN-generated network traffic be used to train traffic abnormal classifiers?[C]\/\/2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2020, 0540-0545."},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"IEEE","author":"Yu Y","year":"2018","unstructured":"Yu Y, Liu G, Yan H, Attention-based Bi-LSTM model for anomalous HTTP traffic detection[C]\/\/2018 15th International Conference on Service Systems and Service Management (ICSSSM). IEEE, 2018, 1-6."},{"key":"e_1_3_2_1_13_1","first-page":"3","article-title":"A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems[J]","volume":"7","author":"Panigrahi R","year":"2018","unstructured":"Panigrahi R, Borah S. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems[J]. International Journal of Engineering & Technology, 2018, 7(3.24): 479-482.","journal-title":"International Journal of Engineering & Technology"},{"key":"e_1_3_2_1_14_1","volume-title":"A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015[J]","author":"\u00d6zg\u00fcr A","year":"2016","unstructured":"\u00d6zg\u00fcr A, Erdem H. A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015[J]. 2016."},{"key":"e_1_3_2_1_15_1","volume-title":"A C-LSTM neural network for text classification[J]. arXiv preprint arXiv:1511.08630","author":"Zhou C","year":"2015","unstructured":"Zhou C, Sun C, Liu Z, A C-LSTM neural network for text classification[J]. arXiv preprint arXiv:1511.08630, 2015."},{"key":"e_1_3_2_1_16_1","volume-title":"MAD-GAN: Multivariate abnormal detection for time series data with generative adversarial networks[C]\/\/International conference on artificial neural networks","author":"Li D","year":"2019","unstructured":"Li D, Chen D, Jin B, MAD-GAN: Multivariate abnormal detection for time series data with generative adversarial networks[C]\/\/International conference on artificial neural networks. Cham: Springer International Publishing, 2019, 703-716."},{"key":"e_1_3_2_1_17_1","article-title":"Chinese question classification[J]","volume":"1","author":"Liu J","year":"2019","unstructured":"Liu J, Yang Y, Lv S, Attention-based BiGRU-CNN for Chinese question classification[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 1-12.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_3_2_1_18_1","unstructured":"Vaswani A. Shazeer N. Parmar N. Uszkoreit J. Jones L. Gomez A. N. ... & Polosukhin I. 2017. Attention is all you need. Advances in neural information processing systems 30."}],"event":{"name":"ICIEAI 2023: 2023 International Conference on Information Education and Artificial Intelligence","acronym":"ICIEAI 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660043.3660139","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660043.3660139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:17:51Z","timestamp":1755778671000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660043.3660139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":18,"alternative-id":["10.1145\/3660043.3660139","10.1145\/3660043"],"URL":"https:\/\/doi.org\/10.1145\/3660043.3660139","relation":{},"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"2024-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}