{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:06:50Z","timestamp":1752671210124},"reference-count":28,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/transinf.2016icp0005","type":"journal-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T22:19:17Z","timestamp":1501539557000},"page":"1780-1789","source":"Crossref","is-referenced-by-count":6,"title":["A Novel RNN-GBRBM Based Feature Decoder for Anomaly Detection Technology in Industrial Control Network"],"prefix":"10.1587","volume":"E100.D","author":[{"given":"Hua","family":"ZHANG","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications"}]},{"given":"Shixiang","family":"ZHU","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications"}]},{"given":"Xiao","family":"MA","sequence":"additional","affiliation":[{"name":"Data Network of power dispatch and safety protection of electric power supervisory control system, State Gird Jiangsu Electric Power Company"}]},{"given":"Jun","family":"ZHAO","sequence":"additional","affiliation":[{"name":"Safety protection of electric power supervisory control system, NARI Group Corporation"}]},{"given":"Zeng","family":"SHOU","sequence":"additional","affiliation":[{"name":"Dispatching Data Network and Secondary Safty Protection, Electric Power Science Research Institute of State Gird Jiangsu Electric Power Company"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] B. Galloway and G.P. Hancke, \u201cIntroduction to Industrial Control Networks,\u201d IEEE Commun. Surveys Tuts., vol.15, no.2, pp.860-880, 2013. 10.1109\/surv.2012.071812.00124","DOI":"10.1109\/SURV.2012.071812.00124"},{"key":"2","unstructured":"[2] C. Tsang and S. Kwong, \u201cMulti-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction,\u201d Ind. Technol. 2005. ICIT 2005. ..., pp.51-56, 2005. 10.1109\/icit.2005.1600609"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] A. Patcha and J.-M. Park, \u201cAn overview of anomaly detection techniques: Existing solutions and latest technological trends,\u201d Comput. Networks, vol.51, no.12, pp.3448-3470, 2007. 10.1016\/j.comnet.2007.02.001","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] P. Garc\u00eda-Teodoro, J. D\u00edaz-Verdejo, G. Maci\u00e1-Fern\u00e1ndez, and E. V\u00e1zquez, \u201cAnomaly-based network intrusion detection: Techniques, systems and challenges,\u201d Comput. Secur., vol.28, no.1-2, pp.18-28, 2009. 10.1016\/j.cose.2008.08.003","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"5","unstructured":"[5] D. Anderson, T. Frivold, and A. Valdes, \u201cNext-generation Intrusion Detection Expert System (NIDES): A summary,\u201d SRI Int., p.47, May 1995."},{"key":"6","unstructured":"[6] P. a Porras and P.G. Neumann, \u201cEMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances,\u201d Proc. 20th NIST-{NCSC} Natl. Inf. Syst. Secur. Conf., pp.353-365, 1997."},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] V.M. Igure, S.A. Laughter, and R.D. Williams, \u201cSecurity issues in SCADA networks,\u201d Comput. Secur., vol.25, no.7, pp.498-506, 2006. 10.1016\/j.cose.2006.03.001","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] M.B. Line, A. Zand, G. Stringhini, and R. Kemmerer, \u201cTargeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?,\u201d Proc. ACM Work. Smart Energy Grid Secur., pp.13-22, 2014. 10.1145\/2667190.2667192","DOI":"10.1145\/2667190.2667192"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] B. Zhu, A. Joseph, and S. Sastry, \u201cA taxonomy of cyber attacks on SCADA systems,\u201d Proc.-2011 IEEE Int. Conf. Internet Things Cyber, Phys. Soc. Comput. iThings\/CPSCom 2011, pp.380-388, 2011. 10.1109\/ithings\/cpscom.2011.34","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] A. Fischer and C. Igel, \u201cAn Introduction to Restricted Boltzmann Machines,\u201d Lect. Notes Comput. Sci. Prog. Pattern Recognition, Image Anal. Comput. Vision, Appl., vol.7441, pp.14-36, 2012. 10.1007\/978-3-642-33275-3_2","DOI":"10.1007\/978-3-642-33275-3_2"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis, \u201cNetwork anomaly detection with the restricted Boltzmann machine,\u201d Neurocomputing, vol.122, pp.13-23, 2013. 10.1016\/j.neucom.2012.11.050","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"12","unstructured":"[12] G. Hinton, \u201cA Practical Guide to Training Restricted Boltzmann Machines A Practical Guide to Training Restricted Boltzmann Machines,\u201d Computer (Long. Beach. Calif)., vol.9, no.3, p.1, 2010."},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] G.E. Hinton, \u201cTraining products of experts by minimizing contrastive divergence.,\u201d Neural Comput., vol.14, no.8, pp.1771-1800, 2002. 10.1162\/089976602760128018","DOI":"10.1162\/089976602760128018"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] T. Yamashita, M. Tanaka, E. Yoshida, Y. Yamauchi, and H.Fujiyoshii, \u201cTo be bernoulli or to be gaussian, for a restrictedboltzmann machine,\u201d Proc.-Int. Conf. Pattern Recognit., pp.1520-1525, 2014. 10.1109\/icpr.2014.270","DOI":"10.1109\/ICPR.2014.270"},{"key":"15","unstructured":"[15] I. Sutskever, G. Hinton, and G. Taylor, \u201cThe Recurrent Temporal Restricted Boltzmann Machine,\u201d Neural Inf. Process. Syst., vol.21, no.1, pp.1601-1608, 2008."},{"key":"16","unstructured":"[16] N. Boulanger-Lewandowski, P. Vincent, and Y. Bengio, \u201cModeling Temporal Dependencies in High-Dimensional Sequences: Application to Polyphonic Music Generation and Transcription,\u201d Proc. 29th Int. Conf. Mach. Learn., pp.1159-1166, 2012."},{"key":"17","unstructured":"[17] J. Martens, \u201cLearning Recurrent Neural Networks with Hessian-Free Optimization,\u201d Proc. 28th Int. Conf. Mach. Learn.,pp.1033-104, 2011."},{"key":"18","unstructured":"[18] R. Salakhutdinov and G.E. Hinton, \u201cDeep Boltzmann Machines,\u201d Proc. 12th Int. Conf. Artif. Intell. Statics, no.3, pp.448-455, 2009."},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] M. Mantere, M. Sailio, and S. Noponen, \u201cNetwork Traffic Features for Anomaly Detection in Specific Industrial Control System Network,\u201d Futur. Internet, vol.5, no.4, pp.460-473, 2013. 10.3390\/fi5040460","DOI":"10.3390\/fi5040460"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] R. Sommer and V. Paxson, \u201cOutside the Closed World: On Using Machine Learning for Network Intrusion Detection,\u201d 2010 IEEE Symp. Secur. Priv., vol.0, no.May, pp.305-316, 2010. 10.1109\/sp.2010.25","DOI":"10.1109\/SP.2010.25"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] M. Mahoney and P.K. Chan, \u201cPHAD: Packet header anomaly detection for identifying hostile network traffic,\u201d Florida Inst. Technol. Tech. Rep. CS-2001-04, no.1998, 2001.","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"22","unstructured":"[22] M. Welling, M. Rosen-Zvi, and G. Hinton, \u201cExponential family harmoniums with an application to information retrieval,\u201d Adv. Neural Inf. Process. Syst., vol.17, pp.1481-1488, 2005."},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] D.E. Rumelhart, G.E. Hinton, and R.J. Williams, \u201cLearning Internal Representations by Error Propagation,\u201d Readings in Cognitive Science: A Perspective from Psychology and Artificial Intelligence, pp.399-421, MIT Press, 2013.","DOI":"10.1016\/B978-1-4832-1446-7.50035-2"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] Y.-J. Lee, Y.-R. Yeh, and Y.-C.F. Wang, \u201cAnomaly detection via online oversampling principal component analysis,\u201d IEEE Trans. Knowl. Data Eng., vol.25, no.7, pp.1460-1470, 2013. 10.1109\/tkde.2012.99","DOI":"10.1109\/TKDE.2012.99"},{"key":"25","unstructured":"[25] T. Ahmed, B. Oreshkin, and M. Coates, \u201cMachine learning approaches to network anomaly detection,\u201d Proc. 2nd USENIX Work. Tackling Comput. Syst. Probl. with Mach. Learn. Tech., pp.7:1-7:6, 2007."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] D. Pokrajac, A. Lazarevic, and L.J. Latecki, \u201cIncremental Local Outlier Detection for Data Streams,\u201d 2007 IEEE Symp. Comput. Intell. Data Min., no.Cidm, pp.504-515, 2007. 10.1109\/cidm.2007.368917","DOI":"10.1109\/CIDM.2007.368917"},{"key":"27","unstructured":"[27] L. Van Der Maaten and G. Hinton, \u201cVisualizing Data using t-SNE,\u201d J. Mach. Learn. Res., vol.9, pp.2579-2605, 2008."},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] F. Schuster and A. Paul, \u201cPotentials of Using One-class SVM for Detecting Protocol-specific Anomalies in Industrial Networks,\u201d 2015 IEEE Symp. Series on Comput. Intell., pp.83-90, 2015.","DOI":"10.1109\/SSCI.2015.22"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/8\/E100.D_2016ICP0005\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T17:20:43Z","timestamp":1659288043000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/8\/E100.D_2016ICP0005\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2016icp0005","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}