{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:25:56Z","timestamp":1726064756157},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030387518"},{"type":"electronic","value":"9783030387525"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38752-5_32","type":"book-chapter","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T15:02:41Z","timestamp":1578409361000},"page":"409-423","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly-Based Intrusion Detection System Using One Dimensional and Two Dimensional Convolutions"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5770-0759","authenticated-orcid":false,"given":"Mohammed Hamid","family":"Abdulraheem","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7783-3874","authenticated-orcid":false,"given":"Najla Badie","family":"Ibraheem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,8]]},"reference":[{"key":"32_CR1","series-title":"SpringerBriefs on Cyber Security Systems and Networks","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1444-5","volume-title":"Network Intrusion Detection using Deep Learning","author":"K Kim","year":"2018","unstructured":"Kim, K., Aminanto, M.E., Tanuwidjaja, H.C.: Network Intrusion Detection using Deep Learning. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore (2018). \nhttps:\/\/doi.org\/10.1007\/978-981-13-1444-5"},{"key":"32_CR2","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-981-13-3459-7_3","volume-title":"Deep Learning: Convergence to Big Data Analytics","author":"J Ahmad","year":"2019","unstructured":"Ahmad, J., Farman, H., Jan, Z.: Deep learning methods and applications. In: Khan, M., Jan, B., Farman, H. (eds.) Deep Learning: Convergence to Big Data Analytics. SCS, pp. 31\u201342. Springer, Singapore (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-3459-7_3"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K.P., Poornachandran, P.: Applying convolutional neural network for network intrusion detection. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1222\u20131228. IEEE (2017)","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"32_CR4","unstructured":"Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: International Conference on Information Networking (ICOIN), pp. 712\u2013717. IEEE (2017)"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1007\/978-3-319-70139-4_87","volume-title":"Neural Information Processing","author":"Z Li","year":"2017","unstructured":"Li, Z., Qin, Z., Huang, K., Yang, X., Ye, S.: Intrusion detection using convolutional neural networks for representation learning. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, El-Sayed M. (eds.) ICONIP 2017. LNCS, vol. 10638, pp. 858\u2013866. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-70139-4_87"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/4184196","volume":"2017","author":"Y Yu","year":"2017","unstructured":"Yu, Y., Long, J., Cai, Z.: Network intrusion detection through stacking dilated convolutional autoencoders. Secur. Commun. Netw. 2017, 1\u201310 (2017)","journal-title":"Secur. Commun. Netw."},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liu, S., Zhao, X.: Intrusion Detection Algorithm Based on Convolutional Neural Network, DEStech Transactions on Engineering and Technology Research. ICETA (2018)","DOI":"10.12783\/dtetr\/iceta2017\/19916"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Lin, W.H., Lin, H.C., Wang, P., Wu, B.H., Tsai, J.Y.: Using convolutional neural networks to network intrusion detection for cyber threats. In: IEEE International Conference on Applied System Invention (ICASI), pp. 1107\u20131110. IEEE (2018)","DOI":"10.1109\/ICASI.2018.8394474"},{"key":"32_CR9","first-page":"50","volume":"46","author":"L Mohammadpour","year":"2018","unstructured":"Mohammadpour, L., Ling, T.C., Liew, C.S., Chong, C.Y.: A convolutional neural network for network intrusion detection system. Proc. Asia-Pac. Adv. Netw. 46, 50\u201355 (2018)","journal-title":"Proc. Asia-Pac. Adv. Netw."},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-030-13453-2_12","volume-title":"ECML PKDD 2018 Workshops","author":"A Chawla","year":"2019","unstructured":"Chawla, A., Lee, B., Fallon, S., Jacob, P.: Host based intrusion detection system with combined CNN\/RNN model. In: Alzate, C., et al. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11329, pp. 149\u2013158. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-13453-2_12"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Ding, Y., Zhai, Y.: Intrusion detection system for NSL-KDD dataset using convolutional neural networks. In: Proceedings of the 2nd International Conference on Computer Science and Artificial Intelligence \u2013 CSAI 2018, pp. 81\u201385. ACM (2018)","DOI":"10.1145\/3297156.3297230"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"48231","DOI":"10.1109\/ACCESS.2018.2863036","volume":"6","author":"S Naseer","year":"2018","unstructured":"Naseer, S., et al.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231\u201348246 (2018)","journal-title":"IEEE Access"},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"50850","DOI":"10.1109\/ACCESS.2018.2868993","volume":"6","author":"K Wu","year":"2018","unstructured":"Wu, K., Chen, Z., Li, W.: A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6, 50850\u201350859 (2018)","journal-title":"IEEE Access"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Liu, P.: An Intrusion detection system based on convolutional neural network. In: Proceedings of the 11th International Conference on Computer and Automation Engineering, pp. 62\u201367. ACM (2019)","DOI":"10.1145\/3313991.3314009"},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019)","journal-title":"IEEE Access"},{"key":"32_CR16","volume-title":"Python Deep Learning: Exploring Deep Learning Techniques and Neural Network Architectures with PyTorch","author":"I Vasilev","year":"2019","unstructured":"Vasilev, I., Slater, D., Spacagna, G., Roelants, P., Zocca, V.: Python Deep Learning: Exploring Deep Learning Techniques and Neural Network Architectures with PyTorch. Keras and TensorFlow. Packt, Birmingham (2019)"},{"key":"32_CR17","volume-title":"Deep Learning with Python","author":"F Chollet","year":"2017","unstructured":"Chollet, F.: Deep Learning with Python, 6th edn. Manning, New York (2017)","edition":"6"},{"key":"32_CR18","unstructured":"NumPy. \nhttps:\/\/www.numpy.org\/"},{"key":"32_CR19","unstructured":"learn scikit-learn Machine Learning in Python. \nhttps:\/\/scikit-learn.org\/stable\/"},{"key":"32_CR20","unstructured":"Python Data Analysis Library. \nhttps:\/\/pandas.pydata.org\/index.html"},{"key":"32_CR21","unstructured":"Keras: The Python Deep Learning Library. \nhttps:\/\/keras.io\/"},{"issue":"1","key":"32_CR22","first-page":"559","volume":"18","author":"G Lema\u00eetre","year":"2017","unstructured":"Lema\u00eetre, G., Nogueira, F., Aridas, C.K.: Imbalanced-learn: a Python toolbox to tackle the curse of imbalanced datasets in machine learning. J. Mach. Learn. Res. 18(1), 559\u2013563 (2017)","journal-title":"J. Mach. Learn. Res."},{"key":"32_CR23","unstructured":"University of New Brunswick. \nhttps:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html"},{"key":"32_CR24","unstructured":"Sklearn.preprocessing.quantile_transform. \nhttps:\/\/scikitlearn.org\/stable\/modules\/generated\/sklearn.preprocessing.quantile_transform.html"},{"key":"32_CR25","volume-title":"Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies","author":"JD Kelleher","year":"2015","unstructured":"Kelleher, J.D., Namee, B.M., D\u2019Arcy, A.: Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies. MIT Press, Cambridge (2015)"},{"key":"32_CR26","doi-asserted-by":"publisher","DOI":"10.1201\/9781315151670","volume-title":"Data Science and Analytics with Python","author":"J Rogel-Salazar","year":"2018","unstructured":"Rogel-Salazar, J.: Data Science and Analytics with Python. Chapman and Hall\/CRC, Philadelphia (2018)"}],"container-title":["Communications in Computer and Information Science","Applied Computing to Support Industry: Innovation and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38752-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T11:15:06Z","timestamp":1578654906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38752-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030387518","9783030387525"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38752-5_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACRIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Computing to Support Industry: Innovation and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ramadi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iraq","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acrit2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acritt.org.uk\/wp\/acrit-conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}