{"id":"https://openalex.org/W2868264782","doi":"https://doi.org/10.1109/siu.2018.8404817","title":"Network anomaly detection with deep learning","display_name":"Network anomaly detection with deep learning","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2868264782","doi":"https://doi.org/10.1109/siu.2018.8404817","mag":"2868264782"},"language":"en","primary_location":{"id":"doi:10.1109/siu.2018.8404817","is_oa":false,"landing_page_url":"https://doi.org/10.1109/siu.2018.8404817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 26th Signal Processing and Communications Applications Conference (SIU)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035330469","display_name":"U\u011fur \u00c7ekmez","orcid":"https://orcid.org/0000-0003-2968-092X"},"institutions":[{"id":"https://openalex.org/I4210141511","display_name":"TUBITAK BILGEM","ror":"https://ror.org/057kvja37","country_code":"TR","type":"government","lineage":["https://openalex.org/I4210141511"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Ugur Cekmez","raw_affiliation_strings":["T\u00dcB\u0130TAK B\u0130LGEM BTE, Kocaeli, T\u00fcrkiye"],"affiliations":[{"raw_affiliation_string":"T\u00dcB\u0130TAK B\u0130LGEM BTE, Kocaeli, T\u00fcrkiye","institution_ids":["https://openalex.org/I4210141511"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045962482","display_name":"Zeki Erdem","orcid":null},"institutions":[{"id":"https://openalex.org/I4210141511","display_name":"TUBITAK BILGEM","ror":"https://ror.org/057kvja37","country_code":"TR","type":"government","lineage":["https://openalex.org/I4210141511"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Zeki Erdem","raw_affiliation_strings":["T\u00dcB\u0130TAK B\u0130LGEM BTE, Kocaeli, T\u00fcrkiye"],"affiliations":[{"raw_affiliation_string":"T\u00dcB\u0130TAK B\u0130LGEM BTE, Kocaeli, T\u00fcrkiye","institution_ids":["https://openalex.org/I4210141511"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085505828","display_name":"A. G\u00f6khan Yavuz","orcid":"https://orcid.org/0000-0002-6490-0396"},"institutions":[{"id":"https://openalex.org/I4101805","display_name":"Y\u0131ld\u0131z Technical University","ror":"https://ror.org/0547yzj13","country_code":"TR","type":"education","lineage":["https://openalex.org/I4101805"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ali Gokhan Yavuz","raw_affiliation_strings":["Yildiz Teknik Universitesi, Istanbul, TR"],"affiliations":[{"raw_affiliation_string":"Yildiz Teknik Universitesi, Istanbul, TR","institution_ids":["https://openalex.org/I4101805"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074737067","display_name":"\u00d6zg\u00fcr Koray \u015eahing\u00f6z","orcid":"https://orcid.org/0000-0002-1588-8220"},"institutions":[{"id":"https://openalex.org/I197185219","display_name":"Istanbul K\u00fclt\u00fcr University","ror":"https://ror.org/05jvrwv37","country_code":"TR","type":"education","lineage":["https://openalex.org/I197185219"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ozgur Koray Sahingoz","raw_affiliation_strings":["Istanbul Kultur Universitesi, Istanbul, Istanbul, TR"],"affiliations":[{"raw_affiliation_string":"Istanbul Kultur Universitesi, Istanbul, Istanbul, TR","institution_ids":["https://openalex.org/I197185219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006363669","display_name":"Ali Buldu","orcid":"https://orcid.org/0000-0002-8508-3065"},"institutions":[{"id":"https://openalex.org/I74897591","display_name":"Marmara University","ror":"https://ror.org/02kswqa67","country_code":"TR","type":"education","lineage":["https://openalex.org/I74897591"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ali Buldu","raw_affiliation_strings":["Marmara Universitesi, Istanbul, Istanbul, TR"],"affiliations":[{"raw_affiliation_string":"Marmara Universitesi, Istanbul, Istanbul, TR","institution_ids":["https://openalex.org/I74897591"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035330469"],"corresponding_institution_ids":["https://openalex.org/I4210141511"],"apc_list":null,"apc_paid":null,"fwci":1.9495,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.87579839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7919928431510925},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6642649173736572},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6603283286094666},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6579772233963013},{"id":"https://openalex.org/keywords/comparability","display_name":"Comparability","score":0.5561700463294983},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5524022579193115},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4102880358695984},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39004647731781006},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35461312532424927}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7919928431510925},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6642649173736572},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6603283286094666},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6579772233963013},{"id":"https://openalex.org/C197947376","wikidata":"https://www.wikidata.org/wiki/Q5155608","display_name":"Comparability","level":2,"score":0.5561700463294983},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5524022579193115},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4102880358695984},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39004647731781006},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35461312532424927},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/siu.2018.8404817","is_oa":false,"landing_page_url":"https://doi.org/10.1109/siu.2018.8404817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 26th Signal Processing and Communications Applications Conference (SIU)","raw_type":"proceedings-article"},{"id":"pmh:oai:openaccess.marmara.edu.tr:11424/247912","is_oa":false,"landing_page_url":"https://hdl.handle.net/11424/247912","pdf_url":null,"source":{"id":"https://openalex.org/S4306401380","display_name":"Dspace Repository (Marmara \u00dcniversitesi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I74897591","host_organization_name":"Marmara University","host_organization_lineage":["https://openalex.org/I74897591"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1576368429","https://openalex.org/W1982563504","https://openalex.org/W1998177457","https://openalex.org/W2016508760","https://openalex.org/W2099940443","https://openalex.org/W2399941526","https://openalex.org/W2426032775","https://openalex.org/W2552899443","https://openalex.org/W2736937187","https://openalex.org/W2767547957","https://openalex.org/W2803090662"],"related_works":["https://openalex.org/W2365594754","https://openalex.org/W2575292835","https://openalex.org/W4287902769","https://openalex.org/W3001140700","https://openalex.org/W2995453361","https://openalex.org/W3021704418","https://openalex.org/W4390295458","https://openalex.org/W1990407237","https://openalex.org/W2092282998","https://openalex.org/W4380075502"],"abstract_inverted_index":{"Along":[0],"with":[1],"the":[2,12,16,41,67,73,90,99,102,118,130,141,164,167,169,175,181],"developing":[3],"new":[4,74,84],"technologies,":[5],"security":[6],"breaches":[7],"have":[8],"become":[9,70],"one":[10],"of":[11,43,78,86,101,125,133,143,163,166],"major":[13],"concerns":[14],"in":[15,40],"cyber":[17],"world.":[18],"In":[19,80,138,161],"order":[20,81],"to":[21,82,96,107,114,180],"provide":[22,38,115],"safety,":[23],"anti-viruses,":[24],"firewalls,":[25],"intrusion":[26],"detection/prevention":[27],"systems":[28,69],"and":[29,47,57,75,104,152,158,174],"many":[30],"others":[31],"are":[32,123,135,177],"used":[33,173],"together.":[34],"However,":[35],"these":[36,59],"tools":[37,60],"protection":[39],"boundaries":[42],"their":[44,54],"pre-defined":[45],"rules":[46],"databases,":[48],"thus":[49],"being":[50],"as":[51,53],"secure":[52],"updated":[55],"profiles":[56],"while":[58],"exhibit":[61],"high":[62],"performance":[63,142],"against":[64,72,156],"conventional":[65],"attacks,":[66,87,92],"protected":[68],"weak":[71],"complex":[76],"type":[77],"attacks.":[79],"prevent":[83],"kinds":[85],"for":[88],"example,":[89],"zero-day":[91],"it":[93],"is":[94,154,172],"necessary":[95],"constantly":[97],"monitor":[98],"flow":[100,132],"events":[103],"make":[105],"inferences":[106,128],"detect":[108],"abnormal":[109],"behavior.":[110,160],"At":[111],"this":[112,139],"point,":[113],"robust":[116],"solutions,":[117],"deep":[119,145],"learning":[120,146],"models":[121],"that":[122],"capable":[124],"making":[126],"high-performance":[127],"from":[129],"natural":[131],"data":[134],"frequently":[136],"used.":[137],"study,":[140],"a":[144],"model,":[147],"including":[148],"automatic":[149],"feature":[150],"extraction":[151],"autoencoders,":[153],"measured":[155],"normal":[157],"anomalous":[159],"terms":[162],"comparability":[165],"measurements,":[168],"NSL-KDD":[170],"dataset":[171],"results":[176],"improved":[178],"compared":[179],"literature.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
