{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T14:30:05Z","timestamp":1769265005721,"version":"3.49.0"},"reference-count":27,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T00:00:00Z","timestamp":1594339200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004054","name":"King Abdulaziz University","doi-asserted-by":"publisher","award":["D-432-611-1441"],"award-info":[{"award-number":["D-432-611-1441"]}],"id":[{"id":"10.13039\/501100004054","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,7,10]]},"abstract":"<jats:p>Anomaly detection is a problem with roots dating back over 30 years. The NSL-KDD dataset has become the convention for testing and comparing new or improved models in this domain. In the field of network intrusion detection, the UNSW-NB15 dataset has recently gained significant attention over the NSL-KDD because it contains more modern attacks. In the present paper, we outline two cutting-edge architectures that push the boundaries of model accuracy for these datasets, both framed in the context of anomaly detection and intrusion classification. We summarize training methodologies, hyperparameters, regularization, and other aspects of model architecture. Moreover, we also utilize the standard deviation of weight values to design a new regularization technique. Then, we embed it on both models and report the models\u2019 performance. Finally, we detail potential improvements aimed at increasing models\u2019 accuracy.<\/jats:p>","DOI":"10.1155\/2020\/7086367","type":"journal-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T23:33:21Z","timestamp":1594424001000},"page":"1-9","source":"Crossref","is-referenced-by-count":16,"title":["Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3586-3423","authenticated-orcid":true,"given":"Marwan Ali","family":"Albahar","sequence":"first","affiliation":[{"name":"Umm Al Qura University, College of Computers in Al-Leith, Mecca, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0915-7058","authenticated-orcid":true,"given":"Muhammad","family":"Binsawad","sequence":"additional","affiliation":[{"name":"King Abdulaziz University, Computer Information System Department, Jeddah, Saudi Arabia"}]}],"member":"311","reference":[{"issue":"8","key":"2","first-page":"1","volume":"14","year":"2016","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"issue":"5","key":"10","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","volume":"38","year":"2008","journal-title":"IEEE Trans. Syst., Man, Cybern. C, Appl. Rev"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.005"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/sec.508"},{"issue":"12","key":"13","first-page":"3371","volume":"11","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2015.2493538"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.05.004"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.05.027"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0971-8"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.12.004"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.04.020"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.09.083"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.017"},{"issue":"1","key":"23","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","volume":"39","year":"2012","journal-title":"Expert Syst. Appl."},{"issue":"15","key":"24","volume":"96","year":"2018","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2762418"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/tetci.2017.2772792"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2928048"},{"issue":"4","key":"35","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1007\/s00521-017-3128-z","volume":"31","year":"2019","journal-title":"Neural Computing and Applications"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2869577"},{"key":"37","first-page":"1","year":"2019"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2875045"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/7086367.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/7086367.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/7086367.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T23:33:32Z","timestamp":1594424012000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/7086367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,10]]},"references-count":27,"alternative-id":["7086367","7086367"],"URL":"https:\/\/doi.org\/10.1155\/2020\/7086367","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,10]]}}}