{"id":"https://openalex.org/W2088476668","doi":"https://doi.org/10.1145/2513456.2513490","title":"Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data","display_name":"Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2088476668","doi":"https://doi.org/10.1145/2513456.2513490","mag":"2088476668"},"language":"en","primary_location":{"id":"doi:10.1145/2513456.2513490","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2513456.2513490","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068676382","display_name":"Ralf C. Staudemeyer","orcid":"https://orcid.org/0000-0001-6581-2542"},"institutions":[{"id":"https://openalex.org/I203238179","display_name":"Rhodes University","ror":"https://ror.org/016sewp10","country_code":"ZA","type":"education","lineage":["https://openalex.org/I203238179"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Ralf C. Staudemeyer","raw_affiliation_strings":["Rhodes University, Grahamstown, South Africa","Rhodes University,, Grahamstown, South Africa"],"affiliations":[{"raw_affiliation_string":"Rhodes University, Grahamstown, South Africa","institution_ids":["https://openalex.org/I203238179"]},{"raw_affiliation_string":"Rhodes University,, Grahamstown, South Africa","institution_ids":["https://openalex.org/I203238179"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030608087","display_name":"Christian W. Omlin","orcid":"https://orcid.org/0000-0003-0299-171X"},"institutions":[{"id":"https://openalex.org/I192619145","display_name":"University of the Witwatersrand","ror":"https://ror.org/03rp50x72","country_code":"ZA","type":"education","lineage":["https://openalex.org/I192619145"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Christian W. Omlin","raw_affiliation_strings":["University of the Witwatersrand, Johannesburg, South Africa","University of the Witwatersrand, Johannesburg,South Africa#TAB#"],"affiliations":[{"raw_affiliation_string":"University of the Witwatersrand, Johannesburg, South Africa","institution_ids":["https://openalex.org/I192619145"]},{"raw_affiliation_string":"University of the Witwatersrand, Johannesburg,South Africa#TAB#","institution_ids":["https://openalex.org/I192619145"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068676382"],"corresponding_institution_ids":["https://openalex.org/I203238179"],"apc_list":null,"apc_paid":null,"fwci":1.131,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.81925676,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"218","last_page":"224"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8055415153503418},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.7832041382789612},{"id":"https://openalex.org/keywords/long-short-term-memory","display_name":"Long short term memory","score":0.7336287498474121},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7005233764648438},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6352142691612244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6128439903259277},{"id":"https://openalex.org/keywords/receiver-operating-characteristic","display_name":"Receiver operating characteristic","score":0.540785551071167},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5046819448471069},{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.49890995025634766},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.48861104249954224},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.48199978470802307},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.4679265022277832},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3945344388484955},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3804565668106079},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3250686526298523}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8055415153503418},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.7832041382789612},{"id":"https://openalex.org/C133488467","wikidata":"https://www.wikidata.org/wiki/Q6673524","display_name":"Long short term memory","level":4,"score":0.7336287498474121},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7005233764648438},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6352142691612244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6128439903259277},{"id":"https://openalex.org/C58471807","wikidata":"https://www.wikidata.org/wiki/Q327120","display_name":"Receiver operating characteristic","level":2,"score":0.540785551071167},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5046819448471069},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.49890995025634766},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.48861104249954224},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.48199978470802307},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.4679265022277832},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3945344388484955},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3804565668106079},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3250686526298523},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2513456.2513490","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2513456.2513490","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W58481704","https://openalex.org/W135902891","https://openalex.org/W1591480890","https://openalex.org/W1866355538","https://openalex.org/W1952056635","https://openalex.org/W1984205520","https://openalex.org/W1988918299","https://openalex.org/W1992489994","https://openalex.org/W1999427165","https://openalex.org/W2064675550","https://openalex.org/W2065028222","https://openalex.org/W2085305295","https://openalex.org/W2098454077","https://openalex.org/W2099940443","https://openalex.org/W2110485445","https://openalex.org/W2120617515","https://openalex.org/W2130802299","https://openalex.org/W2150355110","https://openalex.org/W2158698691","https://openalex.org/W2328176404","https://openalex.org/W2542181107","https://openalex.org/W4250875505","https://openalex.org/W4256238177"],"related_works":["https://openalex.org/W4385280324","https://openalex.org/W2912153778","https://openalex.org/W4387163678","https://openalex.org/W2133389611","https://openalex.org/W4288108708","https://openalex.org/W2973430807","https://openalex.org/W2984436043","https://openalex.org/W2912831041","https://openalex.org/W2890685186","https://openalex.org/W2904359912"],"abstract_inverted_index":{"This":[0],"paper":[1],"evaluates":[2],"the":[3,42,84,91,98],"performance":[4,49],"of":[5,41,47,67],"long":[6],"short-term":[7],"memory":[8,22],"recurrent":[9],"neural":[10],"networks":[11,19],"(LSTM-RNN)":[12],"on":[13,37],"classifying":[14],"intrusion":[15],"detection":[16],"data.":[17,86],"LSTM":[18,32,56,74],"can":[20,24],"learn":[21,78,89],"and":[23,35,53,59,97],"therefore":[25],"model":[26],"data":[27],"as":[28],"a":[29,38,65],"time":[30],"series.":[31],"is":[33,75],"trained":[34],"tested":[36],"processed":[39],"version":[40],"KDDCup99":[43],"dataset.":[44],"A":[45],"variety":[46],"suitable":[48],"measures":[50],"are":[51,61,103],"discussed":[52],"applied.":[54],"Our":[55],"network":[57],"structure":[58],"parameters":[60],"experimentally":[62],"obtained":[63],"within":[64],"series":[66],"experiments":[68],"presented.":[69],"Results":[70],"finally":[71],"show":[72],"that":[73,90],"able":[76],"to":[77],"all":[79],"attack":[80],"classes":[81],"hidden":[82],"in":[83],"training":[85],"Furthermore":[87],"we":[88],"receiver":[92],"operating":[93],"characteristic":[94],"(ROC)":[95],"curve":[96],"corresponding":[99],"area-under-the-curve":[100],"(AUC)":[101],"value":[102],"well":[104,108],"suited":[105],"for":[106],"selecting":[107],"performing":[109],"networks.":[110]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
