{"id":"https://openalex.org/W3113612934","doi":"https://doi.org/10.1109/tencon50793.2020.9293731","title":"Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS","display_name":"Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS","publication_year":2020,"publication_date":"2020-11-16","ids":{"openalex":"https://openalex.org/W3113612934","doi":"https://doi.org/10.1109/tencon50793.2020.9293731","mag":"3113612934"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon50793.2020.9293731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"proceedings-article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://arxiv.org/pdf/2012.14427","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084640876","display_name":"Mohit Sewak","orcid":"https://orcid.org/0000-0001-8375-5713"},"institutions":[{"id":"https://openalex.org/I4210124949","display_name":"Microsoft Research (India)","ror":"https://ror.org/02w7f3w92","country_code":"IN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210124949"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohit Sewak","raw_affiliation_strings":["Security & Compliance Research Microsoft, India"],"affiliations":[{"raw_affiliation_string":"Security & Compliance Research Microsoft, India","institution_ids":["https://openalex.org/I4210124949"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053903379","display_name":"Sanjay K. Sahay","orcid":"https://orcid.org/0000-0002-4640-2107"},"institutions":[{"id":"https://openalex.org/I4210148827","display_name":"Birla Institute of Technology and Science, Pilani - Goa Campus","ror":"https://ror.org/046sh6j17","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210148827","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjay K. Sahay","raw_affiliation_strings":["Department of CS & IS, Goa Campus, BITS Pilani, Goa, India"],"affiliations":[{"raw_affiliation_string":"Department of CS & IS, Goa Campus, BITS Pilani, Goa, India","institution_ids":["https://openalex.org/I4210148827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023050538","display_name":"Hemant Rathore","orcid":"https://orcid.org/0000-0001-7298-0210"},"institutions":[{"id":"https://openalex.org/I4210148827","display_name":"Birla Institute of Technology and Science, Pilani - Goa Campus","ror":"https://ror.org/046sh6j17","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210148827","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hemant Rathore","raw_affiliation_strings":["Department of CS & IS, Goa Campus, BITS Pilani, Goa, India"],"affiliations":[{"raw_affiliation_string":"Department of CS & IS, Goa Campus, BITS Pilani, Goa, India","institution_ids":["https://openalex.org/I4210148827"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":8,"citation_normalized_percentile":{"value":0.907246,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":null,"issue":null,"first_page":"414","last_page":"419"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9947,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.6488391},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.57672286},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.57515484},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.43331182}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86121917},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.6677389},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.65540016},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.6488391},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5851602},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.58056825},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.57672286},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.57515484},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.50977725},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.46038887},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.46018702},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.43331182},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.38777637},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.37879947},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.36080837},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.119198084},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon50793.2020.9293731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2012.14427","pdf_url":"http://arxiv.org/pdf/2012.14427","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2012.14427","pdf_url":"https://arxiv.org/pdf/2012.14427","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2012.14427","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2012.14427","pdf_url":"http://arxiv.org/pdf/2012.14427","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":["https://openalex.org/W3113612934"],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1545528966","https://openalex.org/W1666731339","https://openalex.org/W1689711448","https://openalex.org/W1893133781","https://openalex.org/W2059422848","https://openalex.org/W2064675550","https://openalex.org/W2079215333","https://openalex.org/W2116261113","https://openalex.org/W2121029939","https://openalex.org/W2136848157","https://openalex.org/W2468505451","https://openalex.org/W2532612352","https://openalex.org/W2557513839","https://openalex.org/W2632775315","https://openalex.org/W2752241832","https://openalex.org/W2753669113","https://openalex.org/W2782578820","https://openalex.org/W2791879367","https://openalex.org/W2799908179","https://openalex.org/W2886383271","https://openalex.org/W2887787078","https://openalex.org/W2949755578","https://openalex.org/W2951146859","https://openalex.org/W2955343150","https://openalex.org/W2963611921","https://openalex.org/W3008071995","https://openalex.org/W3098955034","https://openalex.org/W3099388751","https://openalex.org/W3100268192","https://openalex.org/W3106196258"],"related_works":["https://openalex.org/W4360982091","https://openalex.org/W3211525895","https://openalex.org/W3176864451","https://openalex.org/W2439951656","https://openalex.org/W2187910102","https://openalex.org/W2160451571","https://openalex.org/W2128507946","https://openalex.org/W2053632570","https://openalex.org/W1998188341","https://openalex.org/W1573526548"],"abstract_inverted_index":{"Recurrent":[0],"deep":[1],"learning":[2],"language":[3,41],"models":[4],"like":[5,139,216,224],"the":[6,29,53,93,101,106,111,140,154,164,168,170,186,191,194,200,217,225,228],"LSTM":[7,23,70,116,134,174,218],"are":[8,44,97],"often":[9],"used":[10],"to":[11,65,85,120,163],"provide":[12],"advanced":[13],"cyber-defense":[14],"for":[15,21,25,78,177,197,227],"high-value":[16],"assets.":[17],"The":[18],"underlying":[19],"assumption":[20],"using":[22,123],"networks":[24],"malware-detection":[26],"is":[27,182],"that":[28,63,161],"op-code":[30,90,125],"sequence":[31,126],"of":[32,50,56,109,114,133,143,146,153,167,172,193,230],"a":[33,39,79,149],"malware":[34,87,121],"could":[35],"be":[36],"treated":[37],"as":[38,76,118],"(spoken)":[40,198],"representation.":[42],"There":[43],"differences":[45],"between":[46],"any":[47],"spoken-language":[48],"(sequence":[49,55],"words/sentences)":[51],"and":[52,136,157,190],"machine-language":[54],"op-codes).":[57],"In":[58,100],"this":[59],"paper":[60],"we":[61,103,209],"demonstrate":[62],"due":[64],"these":[66],"inherent":[67],"differences,":[68],"an":[69,115,173,178],"model":[71],"with":[72,130],"its":[73,89],"default":[74],"configuration":[75],"tuned":[77,98],"spoken-language,":[80],"may":[81],"not":[82],"work":[83],"well":[84],"detect":[86],"(using":[88],"sequence)":[91],"unless":[92],"network's":[94],"essential":[95],"hyper-parameters":[96,113,138],"appropriately.":[99],"process,":[102],"also":[104,210],"determine":[105],"relative":[107],"importance":[108],"all":[110],"different":[112,131],"network":[117,175],"applied":[119],"detection":[122],"their":[124,205,221],"representations.":[127],"We":[128,159],"experimented":[129],"configurations":[132],"networks,":[135],"altered":[137],"embedding-size,":[141],"number":[142,145],"hidden-layers,":[144],"LSTM-units":[147],"in":[148],"hidden":[150],"layers,":[151],"pruning/padding-length":[152],"input-vector,":[155],"activation-function,":[156],"batch-size.":[158],"discovered":[160],"owing":[162],"enhanced":[165],"complexity":[166],"malware/machine-language,":[169],"performance":[171],"configured":[176],"Intrusion":[179],"Detection":[180],"System,":[181],"very":[183],"sensitive":[184],"towards":[185],"number-of-hidden-layers,":[187],"input":[188],"sequence-length":[189],"choice":[192],"activation-function.":[195],"Also,":[196],"language-modeling,":[199],"recurrent":[201],"architectures":[202,215],"by-far":[203],"outperforms":[204],"non-recurrent":[206],"counterparts.":[207],"Therefore,":[208],"assess":[211],"how":[212],"sequential":[213],"DL":[214],"compares":[219],"against":[220],"non-sequential":[222],"counterparts":[223],"MLP-DNN":[226],"purpose":[229],"malware-detection.":[231]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3113612934","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-04-15T23:33:40.305123","created_date":"2021-01-05"}