iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-030-36808-1_15
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:47:34Z","timestamp":1726062454587},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030368074"},{"type":"electronic","value":"9783030368081"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36808-1_15","type":"book-chapter","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T10:04:08Z","timestamp":1575626648000},"page":"131-139","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["CNN-LSTM Neural Networks for Anomalous Database Intrusion Detection in RBAC-Administered Model"],"prefix":"10.1007","author":[{"given":"Tae-Young","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sung-Bae","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,5]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2005.9","volume":"1","author":"E Bertino","year":"2005","unstructured":"Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secure Comput. 1, 2\u201319 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1805974.1805980","volume":"13","author":"Q Ni","year":"2010","unstructured":"Ni, Q., et al.: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(3), 24\u201334 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Li, D., Liu, C., Wei, Q., Liu, Z., Liu, B.: RBAC-based access control for SaaS systems. In: International Conference on Information Engineering and Computer Science (ICIECS), pp. 1\u20134 (2010)","DOI":"10.1109\/ICIECS.2010.5678213"},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1942776.1942778","volume":"39","author":"S Chen","year":"2011","unstructured":"Chen, S., et al.: TPC-E vs. TPC-C: Characterizing the new TPC-E benchmark via an I\/O comparison study. ACM SIGMOD Rec. 39(3), 5\u201310 (2011)","journal-title":"ACM SIGMOD Rec."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Ramachandran, R., Arya, P., Jayanthy, P.G.: A novel method for intrusion detection in relational databases. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 230\u2013235 (2017)","DOI":"10.1109\/ICACCI.2017.8125845"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Kumar, G.R., Mangathayaru, N., Narasimha, G.: An improved k-means clustering algorithm for intrusion detection using Gaussian function. In: International Conference on Engineering & MIS, pp. 69\u201379 (2015)","DOI":"10.1145\/2832987.2833082"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"SJ Horng","year":"2011","unstructured":"Horng, S.J., et al.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 38(1), 306\u2013313 (2011)","journal-title":"Expert Syst. Appl."},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.ins.2016.06.038","volume":"369","author":"CA Ronao","year":"2016","unstructured":"Ronao, C.A., Cho, S.-B.: Anomalous query access detection in RBAC-administered databases with random forest and PCA. Inf. Sci. 369, 238\u2013250 (2016)","journal-title":"Inf. Sci."},{"issue":"4","key":"15_CR10","first-page":"2828","volume":"7","author":"K Rai","year":"2016","unstructured":"Rai, K., Devi, M.S., Guleria, G.: Decision tree based algorithm for intrusion detection. Int. J. Adv. Netw. Appl. 7(4), 2828\u20132838 (2016)","journal-title":"Int. J. Adv. Netw. Appl."},{"issue":"3","key":"15_CR11","first-page":"40","volume":"3","author":"SA Mulay","year":"2010","unstructured":"Mulay, S.A., Devale, P.R., Garje, G.B.: Intrusion detection system using support vector machine and decision tree. Int. J. Comput. Appl. 3(3), 40\u201343 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.neucom.2018.05.137","volume":"354","author":"J-Y Kim","year":"2019","unstructured":"Kim, J.-Y., Cho, S.-B.: Exploiting deep convolutional neural networks for a neural-based learning classifier system. Neurocomputing 354, 61\u201370 (2019)","journal-title":"Neurocomputing"},{"issue":"4","key":"15_CR13","first-page":"247","volume":"9","author":"C Qiu","year":"2015","unstructured":"Qiu, C., Shan, J., Shandong, B.: Research on intrusion detection algorithm based on BP neural network. Int. J. Secur. Appl. 9(4), 247\u2013258 (2015)","journal-title":"Int. J. Secur. Appl."},{"issue":"1","key":"15_CR14","first-page":"338","volume":"3","author":"S Devaraju","year":"2013","unstructured":"Devaraju, S., Ramakrishnan, S.: Detection of accuracy for intrusion detection system using neural network classifier. Int. J. Emerg. Technol. Adv. Eng. 3(1), 338\u2013345 (2013)","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., Torralba, A.: Learning deep features for discriminative localization. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2921\u20132929 (2016)","DOI":"10.1109\/CVPR.2016.319"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-29859-3_11","volume-title":"Hybrid Artificial Intelligent Systems","author":"T-Y Kim","year":"2019","unstructured":"Kim, T.-Y., Cho, S.-B.: Particle swarm optimization-based CNN-LSTM networks for anomalous query access control in RBAC-administered model. In: P\u00e9rez Garc\u00eda, H., S\u00e1nchez Gonz\u00e1lez, L., Castej\u00f3n Limas, M., Quinti\u00e1n Pardo, H., Corchado Rodr\u00edguez, E. (eds.) HAIS 2019. LNCS (LNAI), vol. 11734, pp. 123\u2013132. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29859-3_11"}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36808-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T09:20:57Z","timestamp":1710235257000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-36808-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030368074","9783030368081"],"references-count":16,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-030-36808-1_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ajiips.com.au\/iconip2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}