1. CANNADY, J. (2018) Artificial neural networks for misuse detection. Proceedings of the National Information Systems Security Conference, pp. 368–381.
2. CHUNG, J., GULCEHRE, C., CHO, K.H., and BENGIO, Y. (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling. Proceedings of the NIPS 2014 Workshop on Deep Learning.
3. CHO, K., VAN MERRIE¨NBOER, B., GULCEHRE, C., BAHDANAU, D., BOUGARES, F., SCHWENK, H., and BENGIO, Y. (2014) Learning phrase representations using RNN encoder-decoder for statistical machine translation. Proceedings of the Empiricial Methods in Natural Language Processing, pp. 1724–1734.
4. GLOROT, X. and BENGIO, Y. (2016) Understanding the difficulty of training deep feedforward neural networks. Proceedings of the 13th International Conference on Artificial Intelligence and Statistics, pp. 249–256.
5. GERS, F.A., SCHRAUDOLPH, N.N., and SCHMIDHUBER, J. (2017) Learning precise timing with LSTM recurrent networks. Journal of Machine Learning Research, 3, pp. 115–143.