{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:40:21Z","timestamp":1753440021772},"reference-count":70,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,7,1]]},"DOI":"10.1587\/transinf.2019ici0001","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T22:14:17Z","timestamp":1593555257000},"page":"1433-1447","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Kwangjo","family":"KIM","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology (KAIST)"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] K. Kim, M.E. Aminanto, and H.C. Tanuwidjaja, Network Intrusion Detection Using Deep Learning: A Feature Learning Approach, Springer, 2018.","DOI":"10.1007\/978-981-13-1444-5"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] C. Kolias, G. Kambourakis, and M. Maragoudakis, \u201cSwarm intelligence in intrusion detection: A survey,\u201d Computers &amp; Security, vol.30, no.8, pp.625-642, 2011. 10.1016\/j.cose.2011.08.009","DOI":"10.1016\/j.cose.2011.08.009"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] A.G. Fragkiadakis, V.A. Siris, N.E. Petroulakis, and A.P. Traganitis, \u201cAnomaly-based intrusion detection of jamming attacks, local versus collaborative detection,\u201d Wireless Communications and Mobile Computing, vol.15, no.2, pp.276-294, 2015. 10.1002\/wcm.2341","DOI":"10.1002\/wcm.2341"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] R. Sommer and V. Paxson, \u201cOutside the closed world: On using machine learning for network intrusion detection,\u201d Proc. Symp. Security and Privacy, Berkeley, California, pp.305-316, IEEE, 2010. 10.1109\/sp.2010.25","DOI":"10.1109\/SP.2010.25"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] G. Anthes, \u201cDeep learning comes of age,\u201d Communications of the ACM, vol.56, no.6, pp.13-15, 2013. 10.1145\/2461256.2461262","DOI":"10.1145\/2461256.2461262"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] J. Schmidhuber, \u201cDeep learning in neural networks: An overview,\u201d Neural networks, vol.61, pp.85-117, 2015. 10.1016\/j.neunet.2014.09.003","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] L. Deng, \u201cA tutorial survey of architectures, algorithms, and applications for deep learning,\u201d APSIPA Transactions on Signal and Information Processing, vol.3, 2014. 10.1017\/atsip.2013.9","DOI":"10.1017\/atsip.2013.9"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] L. Deng and D. Yu, \u201cDeep learning: methods and applications,\u201d Foundations and Trends\u00ae in Signal Processing, vol.7, no.3-4, pp.197-387, 2014. 10.1561\/2000000039","DOI":"10.1561\/2000000039"},{"key":"9","unstructured":"[9] H. Motoda and H. Liu, \u201cFeature selection, extraction and construction,\u201d Communication of IICM (Institute of Information and Computing Machinery), Taiwan, vol.5, pp.67-72, 2002."},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] B. Tran, S. Picek, and B. Xue, \u201cAutomatic feature construction for network intrusion detection,\u201d Asia-Pacific Conference on Simulated Evolution and Learning, vol.10593, pp.569-580, Springer, 2017. 10.1007\/978-3-319-68759-9_46","DOI":"10.1007\/978-3-319-68759-9_46"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] M.E. Aminanto, R. Choi, H.C. Tanuwidjaja, P.D. Yoo, and K. Kim, \u201cDeep abstraction and weighted feature selection for Wi-Fi impersonation detection,\u201d IEEE Transactions on Information Forensics and Security, vol.13, no.3, pp.621-636, 2018. 10.1109\/tifs.2017.2762828","DOI":"10.1109\/TIFS.2017.2762828"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] T. Hamed, J.B. Ernst, and S.C. Kremer, \u201cA survey and taxonomy on data and pre-processing techniques of intrusion detection systems,\u201d Computer and Network Security Essentials, pp.113-134, Springer, 2018. 10.1007\/978-3-319-58424-9_7","DOI":"10.1007\/978-3-319-58424-9_7"},{"key":"13","unstructured":"[13] M.E. Aminanto and K. Kim, \u201cDetecting active attacks in Wi-Fi network by semi-supervised deep learning,\u201d Conference on Information Security and Cryptography 2017 Winter, 2016."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] M.E. Aminanto and K. Kim, \u201cDetecting impersonation attack in Wi-Fi networks using deep learning approach,\u201d Information Security Applications: 17th International Workshop, WISA 2016, vol.10144, pp.136-147, 2016. 10.1007\/978-3-319-56549-1_12","DOI":"10.1007\/978-3-319-56549-1_12"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] M.E. Aminanto and K. Kim, \u201cImproving detection of Wi-Fi impersonation by fully unsupervised deep learning,\u201d Information Security Applications: 18th International Workshop, WISA 2017, vol.10763, pp.212-223, 2017. 10.1007\/978-3-319-93563-8_18","DOI":"10.1007\/978-3-319-93563-8_18"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] K. Scarfone and P. Mell, \u201cGuide to intrusion detection and prevention systems (idps),\u201d NIST special publication, vol.800, no.2007, 2007. 10.6028\/nist.sp.800-94","DOI":"10.6028\/NIST.SP.800-94"},{"key":"17","unstructured":"[17] J.P. Anderson, \u201cComputer security threat monitoring and surveillance,\u201d Technical Report, James P. Anderson Company, 1980."},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] D.E. Denning, \u201cAn intrusion-detection model,\u201d IEEE Transactions on software engineering, vol.SE-13, no.2, pp.222-232, 1987. 10.1109\/tse.1987.232894","DOI":"10.1109\/TSE.1987.232894"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] A.H. Farooqi and F.A. Khan, \u201cIntrusion detection systems for wireless sensor networks: A survey,\u201d Proc. Future Generation Information Technology Conference, Jeju Island, Korea, vol.56, pp.234-241, Springer, 2009. 10.1007\/978-3-642-10844-0_29","DOI":"10.1007\/978-3-642-10844-0_29"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] R. Mitchell and I.-R. Chen, \u201cBehavior rule specification-based intrusion detection for safety critical medical cyber physical systems,\u201d IEEE Trans. Dependable Secure Comput., vol.12, no.1, pp.16-30, Jan. 2015. 10.1109\/tdsc.2014.2312327","DOI":"10.1109\/TDSC.2014.2312327"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] I. Butun, S.D. Morgera, and R. Sankar, \u201cA survey of intrusion detection systems in wireless sensor networks,\u201d IEEE Commun. Surveys Tuts., vol.16, no.1, pp.266-282, 2014. 10.1109\/surv.2013.050113.00191","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"22","unstructured":"[22] M.E. Aminanto and K. Kim, \u201cDeep learning in intrusion detection system: An overview,\u201d International Research Conference on Engineering and Technology 2016, 2016."},{"key":"23","unstructured":"[23] Z. Wang, \u201cThe applications of deep learning on traffic identification,\u201d Conf. BlackHat, Las Vegas, USA, UBM, 2015."},{"key":"24","unstructured":"[24] P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.A. Manzagol, \u201cStacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion,\u201d Journal of Machine Learning Research, vol.11, no.Dec, pp.3371-3408, 2010."},{"key":"25","unstructured":"[25] R. Salakhutdinov and G. Hinton, \u201cDeep Boltzmann machines,\u201d Artificial Intelligence and Statistics, pp.448-455, 2009."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] M.A. Salama, H.F. Eid, R.A. Ramadan, A. Darwish, and A.E. Hassanien, \u201cHybrid intelligent intrusion detection scheme,\u201d Soft computing in industrial applications, vol.96, pp.293-303, 2011. 10.1007\/978-3-642-20505-7_26","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] H. Poon and P. Domingos, \u201cSum-product networks: A new deep architecture,\u201d 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops), pp.689-690, IEEE, 2011. 10.1109\/iccvw.2011.6130310","DOI":"10.1109\/ICCVW.2011.6130310"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] R.C. Staudemeyer, \u201cApplying long short-term memory recurrent neural networks to intrusion detection,\u201d South African Computer Journal, vol.56, no.1, pp.136-154, 2015. 10.18489\/sacj.v56i1.248","DOI":"10.18489\/sacj.v56i1.248"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] S. Hochreiter and J. Schmidhuber, \u201cLong short-term memory,\u201d Neural computation, vol.9, no.8, pp.1735-1780, 1997. 10.1162\/neco.1997.9.8.1735","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] J. Kim, J. Kim, H.L.T. Thu, and H. Kim, \u201cLong short term memory recurrent neural network classifier for intrusion detection,\u201d 2016 International Conference on Platform Technology and Service (PlatCon), pp.1-5, IEEE, 2016. 10.1109\/platcon.2016.7456805","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, \u201cGradient-based learning applied to document recognition,\u201d Proceedings of the IEEE, vol.86, no.11, pp.2278-2324, 1998. 10.1109\/5.726791","DOI":"10.1109\/5.726791"},{"key":"32","unstructured":"[32] M.A. Nielsen, Neural Networks and Deep Learning, vol.2018, p.170, Determination Press, 2015."},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] A. Graves, \u201cSequence transduction with recurrent neural networks,\u201d arXiv preprint arXiv:1211.3711, 2012.","DOI":"10.1007\/978-3-642-24797-2_3"},{"key":"34","unstructured":"[34] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, \u201cGenerative adversarial nets,\u201d Advances in Neural Information Processing Systems, pp.2672-2680, 2014."},{"key":"35","unstructured":"[35] A. Dimokranitou, Adversarial Autoencoders for Anomalous Event Detection in Images, Ph.D. thesis, Purdue University, 2017."},{"key":"36","doi-asserted-by":"crossref","unstructured":"[36] S.S. Roy, A. Mallik, R. Gulati, M.S. Obaidat, and P.V. Krishna, \u201cA deep learning based artificial neural network approach for intrusion detection,\u201d International Conference on Mathematics and Computing, vol.655, pp.44-53, Springer, 2017. 10.1007\/978-981-10-4642-1_5","DOI":"10.1007\/978-981-10-4642-1_5"},{"key":"37","unstructured":"[37] \u201cKdd Cup&apos;99,\u201d http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html, accessed 1 Oct. 2019."},{"key":"38","doi-asserted-by":"crossref","unstructured":"[38] S. Potluri and C. Diedrich, \u201cAccelerated deep neural networks for enhanced intrusion detection system,\u201d 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp.1-8, IEEE, 2016. 10.1109\/etfa.2016.7733515","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"39","unstructured":"[39] H. Larochelle, Y. Bengio, J. Louradour, and P. Lamblin, \u201cExploring strategies for training deep neural networks,\u201d Journal of Machine Learning Research, vol.10, no.Jan, pp.1-40, 2009."},{"key":"40","unstructured":"[40] \u201cNsl-kdd dataset.\u201d https:\/\/www.unb.ca\/cic\/datasets\/nsl.html, accessed 1 Oct. 2019."},{"key":"41","doi-asserted-by":"crossref","unstructured":"[41] A. Javaid, Q. Niyaz, W. Sun, and M. Alam, \u201cA deep learning approach for network intrusion detection system,\u201d Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp.21-26, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2016. 10.4108\/eai.3-12-2015.2262516","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"42","doi-asserted-by":"crossref","unstructured":"[42] Y. Yu, J. Long, and Z. Cai, \u201cSession-based network intrusion detection using a deep learning architecture,\u201d Modeling Decisions for Artificial Intelligence, vol.10571, pp.144-155, Springer, 2017. 10.1007\/978-3-319-67422-3_13","DOI":"10.1007\/978-3-319-67422-3_13"},{"key":"43","doi-asserted-by":"publisher","unstructured":"[43] Y. Liu, S. Liu, and Y. Wang, \u201cRoute intrusion detection based on long short term memory recurrent neural network,\u201d DEStech Transactions on Computer Science and Engineering, no.cii, 2017. 10.12783\/dtcse\/cii2017\/17278","DOI":"10.12783\/dtcse\/cii2017\/17278"},{"key":"44","doi-asserted-by":"crossref","unstructured":"[44] T.A. Tang, L. Mhamdi, D. McLernon, S.A.R. Zaidi, and M. Ghogho, \u201cDeep learning approach for network intrusion detection in software defined networking,\u201d 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp.258-263, IEEE, 2016. 10.1109\/wincom.2016.7777224","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"45","doi-asserted-by":"publisher","unstructured":"[45] C. Yin, Y. Zhu, J. Fei, and X. He, \u201cA deep learning approach for intrusion detection using recurrent neural networks,\u201d IEEE Access, vol.5, pp.21954-21961, 2017. 10.1109\/access.2017.2762418","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"46","unstructured":"[46] \u201cKddtest+,\u201d https:\/\/github.com\/defcom17\/NSL_KDD\/blob\/master\/KDDTest%2B.txt, accessed 1 Oct. 2019."},{"key":"47","doi-asserted-by":"crossref","unstructured":"[47] Z. Li, Z. Qin, K. Huang, X. Yang, and S. Ye, \u201cIntrusion detection using convolutional neural networks for representation learning,\u201d International Conference on Neural Information Processing, vol.10638, pp.858-866, Springer, 2017. 10.1007\/978-3-319-70139-4_87","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"48","doi-asserted-by":"crossref","unstructured":"[48] L. Bontemps, V.L. Cao, J. McDermott, and N.A. Le-Khac, \u201cCollective anomaly detection based on long short-term memory recurrent neural networks,\u201d International Conference on Future Data and Security Engineering, vol.10018, pp.141-152, Springer, 2016. 10.1007\/978-3-319-48057-2_9","DOI":"10.1007\/978-3-319-48057-2_9"},{"key":"49","unstructured":"[49] M.K. Putchala, Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU), Ph.D. thesis, Wright State University, 2017."},{"key":"50","unstructured":"[50] P.K. Bediako, \u201cLong short-term memory recurrent neural network for detecting ddos flooding attacks within tensorflow implementation framework,\u201d master&apos;s thesis, Lulea University, 2017."},{"key":"51","doi-asserted-by":"crossref","unstructured":"[51] S.-G. Choi and S.-B. Cho, \u201cAdaptive database intrusion detection using evolutionary reinforcement learning,\u201d International Joint Conference SOCO17, CISIS17, ICEUTE17, Spain, Sept. 6-8, 2017, Proceeding, vol.649, pp.547-556, Springer, 2017. 10.1007\/978-3-319-67180-2_53","DOI":"10.1007\/978-3-319-67180-2_53"},{"key":"52","doi-asserted-by":"crossref","unstructured":"[52] M. Feng and H. Xu, \u201cDeep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack,\u201d 2017 IEEE Symposium Series on Computational Intelligence (SSCI), pp.1-8, IEEE, 2017. 10.1109\/ssci.2017.8285298","DOI":"10.1109\/SSCI.2017.8285298"},{"key":"53","doi-asserted-by":"publisher","unstructured":"[53] F. Palmieri, U. Fiore, and A. Castiglione, \u201cA distributed approach to network anomaly detection based on independent component analysis,\u201d Concurrency and Computation: Practice and Experience, vol.26, no.5, pp.1113-1129, 2014. 10.1002\/cpe.3061","DOI":"10.1002\/cpe.3061"},{"key":"54","doi-asserted-by":"publisher","unstructured":"[54] C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, \u201cIntrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset,\u201d IEEE Commun. Surveys Tuts., vol.18, no.1, pp.184-208, 2015. 10.1109\/comst.2015.2402161","DOI":"10.1109\/COMST.2015.2402161"},{"key":"55","unstructured":"[55] M. Sabhnani and G. Serpen, \u201cApplication of machine learning algorithms to KDD intrusion detection dataset within misuse detection context,\u201d Proc. Int. Conf. Machine Learning; Models, Technologies and Applications (MLMTA), Las Vegas, USA, pp.209-215, 2003."},{"key":"56","doi-asserted-by":"crossref","unstructured":"[56] D.T. Larose, Discovering Knowledge in Data: An introduction to data mining, John Wiley &amp; Sons, 2014.","DOI":"10.1002\/9781118874059"},{"key":"57","doi-asserted-by":"publisher","unstructured":"[57] H. Bostani and M. Sheikhan, \u201cModification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept,\u201d Pattern Recognition, vol.62, pp.56-72, 2017. 10.1016\/j.patcog.2016.08.027","DOI":"10.1016\/j.patcog.2016.08.027"},{"key":"58","doi-asserted-by":"crossref","unstructured":"[58] W. Wang, X. Zhang, S. Gombault, and S.J. Knapskog, \u201cAttribute normalization in network intrusion detection,\u201d Proc. Int. Symp. Pervasive Systems, Algorithms, and Networks (ISPAN), Kaohsiung, Taiwan, pp.448-453, IEEE, Dec. 2009. 10.1109\/i-span.2009.49","DOI":"10.1109\/I-SPAN.2009.49"},{"key":"59","doi-asserted-by":"crossref","unstructured":"[59] N.Y. Almusallam, Z. Tari, P. Bertok, and A.Y. Zomaya, \u201cDimensionality reduction for intrusion detection systems in multi-data streams \u2014 a review and proposal of unsupervised feature selection scheme,\u201d Emergent Computation, vol.24, pp.467-487, 2017. 10.1007\/978-3-319-46376-6_22","DOI":"10.1007\/978-3-319-46376-6_22"},{"key":"60","doi-asserted-by":"publisher","unstructured":"[60] Q. Wei and R.L. Dunbrack Jr, \u201cThe role of balanced training and testing data sets for binary classifiers in bioinformatics,\u201d Public Library of Science (PloS) one, vol.8, no.7, pp.1-12, 2013. 10.1371\/journal.pone.0067863","DOI":"10.1371\/journal.pone.0067863"},{"key":"61","doi-asserted-by":"crossref","unstructured":"[61] Q. Xu, C. Zhang, L. Zhang, and Y. Song, \u201cThe learning effect of different hidden layers stacked autoencoder,\u201d Proc. Int. Con. Intelligent Human-Machine Systems and Cybernetics (IHMSC), Zhejiang, China, pp.148-151, IEEE, Aug. 2016. 10.1109\/ihmsc.2016.280","DOI":"10.1109\/IHMSC.2016.280"},{"key":"62","doi-asserted-by":"publisher","unstructured":"[62] H.Z.M. Shafri and F.S.H. Ramle, \u201cA comparison of support vector machine and decision tree classifications using satellite data of langkawi island,\u201d Information Technology Journal, vol.8, no.1, pp.64-70, 2009. 10.3923\/itj.2009.64.70","DOI":"10.3923\/itj.2009.64.70"},{"key":"63","doi-asserted-by":"publisher","unstructured":"[63] L. Guerra, L.M. McGarry, V. Robles, C. Bielza, P. Larra\u00f1aga, and R. Yuste, \u201cComparison between supervised and unsupervised classifications of neuronal cell types: a case study,\u201d Developmental neurobiology, vol.71, no.1, pp.71-82, 2011. 10.1002\/dneu.20809","DOI":"10.1002\/dneu.20809"},{"key":"64","doi-asserted-by":"publisher","unstructured":"[64] M.F. M\u00f8ller, \u201cA scaled conjugate gradient algorithm for fast supervised learning,\u201d Neural Networks, vol.6, no.4, pp.525-533, 1993. 10.1016\/s0893-6080(05)80056-5","DOI":"10.1016\/S0893-6080(05)80056-5"},{"key":"65","doi-asserted-by":"publisher","unstructured":"[65] I. Guyon, J. Weston, S. Barnhill, and V. Vapnik, \u201cGene selection for cancer classification using support vector machines,\u201d Machine Learning, vol.46, no.1-3, pp.389-422, 2002. 10.1023\/a:1012487302797","DOI":"10.1023\/A:1012487302797"},{"key":"66","doi-asserted-by":"crossref","unstructured":"[66] A. \u00d6zg\u00fcr and H. Erdem, \u201cA review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015,\u201d PeerJ PrePrints, vol.4, p.e1954v1, 2016. 10.7287\/peerj.preprints.1954","DOI":"10.7287\/peerj.preprints.1954"},{"key":"67","doi-asserted-by":"publisher","unstructured":"[67] Y. Bengio, \u201cLearning deep architectures for ai,\u201d Foundations and trends\u00ae in Machine Learning, vol.2, no.1, pp.1-127, 2009. 10.1561\/2200000006","DOI":"10.1561\/2200000006"},{"key":"68","doi-asserted-by":"publisher","unstructured":"[68] Y. Wang, W.-D. Cai, and P.-C. Wei, \u201cA deep learning approach for detecting malicious javascript code,\u201d Security and Communication Networks, vol.9, no.11, pp.1520-1534, 2016. 10.1002\/sec.1441","DOI":"10.1002\/sec.1441"},{"key":"69","doi-asserted-by":"publisher","unstructured":"[69] P. Louvieris, N. Clewley, and X. Liu, \u201cEffects-based feature identification for network intrusion detection,\u201d Neurocomputing, vol.121, pp.265-273, 2013. 10.1016\/j.neucom.2013.04.038","DOI":"10.1016\/j.neucom.2013.04.038"},{"key":"70","doi-asserted-by":"publisher","unstructured":"[53] F. Palmieri, U. Fiore, and A. Castiglione, \u201cA distributed approach to network anomaly detection based on independent component analysis,\u201d Concurrency and Computation: Practice and Experience, vol.26, no.5, pp.1113-1129, 2014. 10.1002\/cpe.3061","DOI":"10.1002\/cpe.3061"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019ICI0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T11:23:52Z","timestamp":1667215432000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019ICI0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":70,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019ici0001","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}