{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T10:06:24Z","timestamp":1777457184659,"version":"3.51.4"},"reference-count":44,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Big Data"],"published-print":{"date-parts":[[2024,10,1]]},"DOI":"10.1089\/big.2021.0268","type":"journal-article","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T11:00:17Z","timestamp":1655290817000},"page":"367-376","source":"Crossref","is-referenced-by-count":31,"title":["A Network Intrusion Detection System Using Hybrid Multilayer Deep Learning Model"],"prefix":"10.1177","volume":"12","author":[{"given":"Muhammad Basit","family":"Umair","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Engineering and Technology Taxila, Taxila, Pakistan."}]},{"given":"Zeshan","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering and Technology Taxila, Taxila, Pakistan."}]},{"given":"Muhammad Ahmad","family":"Faraz","sequence":"additional","affiliation":[{"name":"Gaitech Robotics, Shanghai, China."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6347-4890","authenticated-orcid":false,"given":"Muhammad Attique","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, HITEC University Taxila, Taxila, Pakistan."}]},{"given":"Yu-Dong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Leicester, Leicester, United Kingdom."}]},{"given":"Navid","family":"Razmjooy","sequence":"additional","affiliation":[{"name":"Independent Researcher, Rooigemlaan, Belgium."}]},{"given":"Sefedine","family":"Kadry","sequence":"additional","affiliation":[{"name":"Faculty of Applied Computing and Technology, Noroff University College, Kristiansand, Norway."}]}],"member":"179","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799879"},{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"B3","first-page":"407","volume":"71","author":"Umair MB","year":"2022","journal-title":"Comput Mater Contin"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999468"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77908-5"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.3390\/pr9050834"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08769-x"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2012.06.041"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.045"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.07.005"},{"key":"B13","first-page":"2747","author":"Riaz A","year":"2021","journal-title":"Comput Mater Contin"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3042433"},{"key":"B15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951468"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08806-9"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2018.08.005"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3067789"},{"key":"B19","first-page":"2217","volume":"69","author":"Ahmed M","year":"2021","journal-title":"Comput Mater Contin"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-141468"},{"key":"B21","first-page":"100198","volume":"21","author":"Song HM","year":"2020","journal-title":"Veh Commun"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.1049\/trit.2019.0077"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107450"},{"key":"B24","doi-asserted-by":"crossref","unstructured":"24. Potluri S, Ahmed S, Diedrich C. Convolutional neural networks for multi-class intrusion detection system. In: International Conference on Mining Intelligence and Knowledge Exploration, 2018, pp. 225\u2013238.","DOI":"10.1007\/978-3-030-05918-7_20"},{"key":"B25","doi-asserted-by":"crossref","unstructured":"25. Zhang B, Yu Y, Li J. Network intrusion detection based on stacked sparse autoencoder and binary tree ensemble method. In: 2018 IEEE International Conference on Communications Workshops (ICC Workshops), 2018, pp. 1\u20136.","DOI":"10.1109\/ICCW.2018.8403759"},{"key":"B26","unstructured":"26. Kim J, Shin N, Jo SY, et al. Method of intrusion detection using deep neural network. In: 2017 IEEE International Conference on Big Data and Smart Computing (BigComp), 2017, pp. 313\u2013316."},{"key":"B27","unstructured":"27. Kingma DP, Ba J. Adam: A method for stochastic optimization. arXiv Prepr. arXiv1412.6980, 2014."},{"key":"B28","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3302"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2927886"},{"key":"B30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04708-x"},{"key":"B32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.07.091"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2893549"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983953"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994947"},{"key":"B36","first-page":"1801","volume":"69","author":"Islam N","year":"2021","journal-title":"Comput Mater Contin"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0201"},{"key":"B38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107042"},{"key":"B39","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3059881"},{"key":"B40","first-page":"1929","volume":"15","author":"Srivastava N","year":"2014","journal-title":"J Mach Learn Res"},{"key":"B41","author":"Lee C-Y","year":"2016","journal-title":"Artif Intell Stat"},{"key":"B44","doi-asserted-by":"crossref","unstructured":"44. Sokolova M, Japkowicz N, Szpakowicz S. Beyond accuracy, F-score and ROC: A family of discriminant measures for performance evaluation. In: Australasian joint conference on artificial intelligence, 2006, pp. 1015\u20131021.","DOI":"10.1007\/11941439_114"},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.3390\/app9071392"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868993"}],"container-title":["Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/big.2021.0268","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/big.2021.0268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T13:03:55Z","timestamp":1777381435000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.1089\/big.2021.0268"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,1]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10,1]]}},"alternative-id":["10.1089\/big.2021.0268"],"URL":"https:\/\/doi.org\/10.1089\/big.2021.0268","relation":{},"ISSN":["2167-6461","2167-647X"],"issn-type":[{"value":"2167-6461","type":"print"},{"value":"2167-647X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,1]]}}}