{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:13:49Z","timestamp":1774628029589,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,19]]},"DOI":"10.1145\/3704522.3704541","type":"proceedings-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T12:29:51Z","timestamp":1735907391000},"page":"154-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion Detection Using Convolutional Neural Network: A Color Mapping Approach on NSL-KDD Dataset"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4869-5386","authenticated-orcid":false,"given":"Md. Abrar","family":"Faiaz","sequence":"first","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5757-4995","authenticated-orcid":false,"given":"Dipankar","family":"Mitra","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5593-8384","authenticated-orcid":false,"given":"Ranat","family":"Das Prangon","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,1,3]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.490"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.07.005"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4847308"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4847308"},{"key":"e_1_3_3_1_5_2","volume-title":"Retrieved","author":"Bace Rebecca","year":"2001","unstructured":"Rebecca Bace and Peter Mell. 2001. Intrusion Detection Systems. NIST (November 2001). Retrieved August 25, 2024 from https:\/\/www.nist.gov\/publications\/intrusion-detection-systems"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e29410"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103847"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11104580"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100673"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.17762\/ijcnis.v12i2.4634"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103928"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_39"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100933"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103540"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.04.275"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MACISE49704.2020.00039"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2787719"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2018.00719"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Junwei Liang Muhammad Sadiq Geng Yang Kai Jiang Tie Cai and Maode Ma. 2024. Enhanced collaborative intrusion detection for industrial cyber-physical systems using permissioned blockchain and decentralized federated learning networks. Engineering Applications of Artificial Intelligence 135 (September 2024) 108862. 10.1016\/j.engappai.2024.108862 https:\/\/dl.acm.org\/doi\/10.1016\/j.engappai.2024.108862","DOI":"10.1016\/j.engappai.2024.108862"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103548"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2024.108628"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109542"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109277"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100068"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2019.0468"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.07.080"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103847"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104076"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","unstructured":"Peter Stavroulakis and Mark Stamp. 2010. Handbook of Information and Communication Security. 10.1007\/978-3-642-04117-4","DOI":"10.1007\/978-3-642-04117-4"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.330"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103878"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2024.03.285"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.05.076"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.053037"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100658"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104934"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.050586"},{"key":"e_1_3_3_1_42_2","unstructured":"NSL-KDD. Retrieved August 25 2024 from https:\/\/www.kaggle.com\/datasets\/hassan06\/nslkdd"}],"event":{"name":"NSysS '24: 11th International Conference on Networking, Systems, and Security","location":"Khulna Karak Bangladesh","acronym":"NSysS '24"},"container-title":["Proceedings of the 11th International Conference on Networking, Systems, and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704522.3704541","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3704522.3704541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:16Z","timestamp":1750295896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704522.3704541"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":42,"alternative-id":["10.1145\/3704522.3704541","10.1145\/3704522"],"URL":"https:\/\/doi.org\/10.1145\/3704522.3704541","relation":{},"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"2025-01-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}