{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:58:54Z","timestamp":1775282334352,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.23919\/icact.2019.8701969","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:58:41Z","timestamp":1556837921000},"page":"654-659","source":"Crossref","is-referenced-by-count":33,"title":["Intrusion Detection by Deep Learning with TensorFlow"],"prefix":"10.23919","author":[{"given":"Navaporn","family":"Chockwanich","sequence":"first","affiliation":[]},{"given":"Vasaka","family":"Visoottiviseth","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Open Source IDS: Snort or Suricata?","author":"siemons","year":"2018","journal-title":"InfoSec Resources"},{"key":"ref11","article-title":"Snort","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfds.2017.05.001"},{"key":"ref13","author":"bonnin","year":"2016","journal-title":"Building Machine Learning Projects with TensorFlow"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.45"},{"key":"ref15","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"abadi","year":"2015"},{"key":"ref16","article-title":"Keras Documentation","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5120\/12775-9226"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2017.8247662"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2017.8035323"},{"key":"ref28","article-title":"Theanets 0.7.3 documentation","year":"2015"},{"key":"ref4","article-title":"TensorFlow","year":"0"},{"key":"ref27","article-title":"Activation Functions: Neural Networks &#x2013; Towards Data Science","author":"sharma","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.016"},{"key":"ref6","article-title":"McAfee Labs Threats Report: April 2017 | McAfee","year":"0"},{"key":"ref29","article-title":"tensorflow\/docs","year":"2018"},{"key":"ref5","article-title":"McAfee Labs Threats Report","year":"0"},{"key":"ref8","article-title":"McAfee Labs Threats Report: September 2017 | McAfee","year":"0"},{"key":"ref7","article-title":"McAfee Labs Threats Report: June 2017 | McAfee","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2013.6718975"},{"key":"ref9","article-title":"SANS Institute InfoSec Reading Room","author":"george","year":"2015"},{"key":"ref1","article-title":"The Best Open Source Network Intrusion Detection Tools","author":"nayyar","year":"2018","journal-title":"Open Source for You"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref22","article-title":"MAWILab - Data set &#x2013; 2017","author":"fontugne","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref24","article-title":"The CERT Network Situational Awareness Team (CERT NetSA)","year":"2006"},{"key":"ref23","article-title":"Bro Script Index","year":"2018"},{"key":"ref26","article-title":"What is the Difference Between a Batch and an Epoch in a Neural Network?","author":"brownlee","year":"2018","journal-title":"Machine Learning Mastery"},{"key":"ref25","article-title":"Index of \/open\/snort-2.9.0","year":"0"}],"event":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","location":"PyeongChang Kwangwoon_Do, Korea (South)","start":{"date-parts":[[2019,2,17]]},"end":{"date-parts":[[2019,2,20]]}},"container-title":["2019 21st International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8694794\/8701885\/08701969.pdf?arnumber=8701969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:06:44Z","timestamp":1558393604000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8701969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/icact.2019.8701969","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}