{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:10:50Z","timestamp":1742965850667,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030440404"},{"type":"electronic","value":"9783030440411"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44041-1_121","type":"book-chapter","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T19:02:51Z","timestamp":1585335771000},"page":"1437-1448","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Long-Lasting Reinforcement Learning Intrusion Detection Model"],"prefix":"10.1007","author":[{"given":"Roger Robson","family":"dos Santos","sequence":"first","affiliation":[]},{"given":"Eduardo Kugler","family":"Viegas","sequence":"additional","affiliation":[]},{"given":"Altair","family":"Santin","sequence":"additional","affiliation":[]},{"given":"Vinicius Vielmo","family":"Cogo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,28]]},"reference":[{"key":"121_CR1","unstructured":"Varonis. https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/ . Accessed 10 Dec 2019"},{"key":"121_CR2","unstructured":"Kaspersky. https:\/\/kaspersky.com\/ . Accessed 10 Dec 2019"},{"key":"121_CR3","unstructured":"Threatpost Windows Flaw. https:\/\/threatpost.com\/windows-uac-flaw-privilege-escalation\/150463\/ . Accessed 10 Dec 2019"},{"key":"121_CR4","doi-asserted-by":"crossref","unstructured":"Abreu, V., Santin, A.O., Viegas, E.K., Stihler, M.: A multi-domain role activation model. In: IEEE International Conference on Communications (ICC), pp. 3\u20138 (2017)","DOI":"10.1109\/ICC.2017.7997247"},{"issue":"2","key":"121_CR5","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"Sultana, N., Chilamkurti, N., Peng, W., Alhadad, R.: Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw. Appl. 12(2), 493\u2013501 (2019)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"121_CR6","first-page":"1351","volume":"6","author":"PB Singh","year":"2019","unstructured":"Singh, P.B., Chugh, U., Kathuria, M.: A review on intrusion detection system. Int. Res. J. Eng. Technol. (IRJET) 6, 1351\u20131358 (2019)","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"key":"121_CR7","doi-asserted-by":"crossref","unstructured":"Thaseen, S., Kumar, A.: An analysis of supervised tree based classifiers for intrusion detection system. In: Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) (2013)","DOI":"10.1109\/ICPRIME.2013.6496489"},{"key":"121_CR8","doi-asserted-by":"crossref","unstructured":"Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. In: Twelfth International Multi-Conference on Information Processing (2016)","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"121_CR9","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.future.2018.09.051","volume":"93","author":"E Viegas","year":"2019","unstructured":"Viegas, E., Santin, A., Bessan, A., Neves, N.: BigFlow: real-time and reliable anomaly-based intrusion detection for high-speed networks. Future Gener. Comput. Syst. 93, 473\u2013485 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"121_CR10","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.comnet.2019.05.013","volume":"159","author":"G Caminero","year":"2019","unstructured":"Caminero, G., Lopez-Martin, M., Carro, B.: Adversarial environment reinforcement learning algorithm for intrusion detection. Comput. Netw. 159, 96\u2013109 (2019)","journal-title":"Comput. Netw."},{"key":"121_CR11","doi-asserted-by":"crossref","unstructured":"Bom, L., Henken, R., Wiering, M.: Reinforcement learning to train Ms. Pac-Man using higher-order action-relative input. In: IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning (ADPRL) (2013)","DOI":"10.1109\/ADPRL.2013.6615002"},{"key":"121_CR12","unstructured":"Pan, X., You, Y., Wang, Z., Lu, C.: Virtual to real reinforcement learning for autonomous driving (2017). arXiv, arXiv:1704.03952"},{"key":"121_CR13","doi-asserted-by":"crossref","unstructured":"Pilarski, P.M., Dawson, M.R., Degris., T., Fahimi, F., Carey J.P., Sutton, R.S.: Online human training of a myoelectric prosthesis controller via actor-critic reinforcement learning. In: IEEE International Conference on Rehabilitation Robotics (2011)","DOI":"10.1109\/ICORR.2011.5975338"},{"key":"121_CR14","doi-asserted-by":"crossref","unstructured":"Nanda, N.B., Parikh, A.: Hybrid approach for network intrusion detection system using random forest classifier and rough set theory for rules generation. In: International Conference on Advanced Informatics for Computing Research - ICAICR 2019 (2019)","DOI":"10.1007\/978-981-15-0111-1_25"},{"key":"121_CR15","unstructured":"Sukumar, J.V.A., Pranav, I., Neetish, M.M., Narayanan, J.: Network intrusion detection using improved genetic k-means algorithm. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2018)"},{"key":"121_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.cose.2018.05.014","volume":"78","author":"E Viegas","year":"2019","unstructured":"Viegas, E., Santin, A., Oliveira, L., Fran\u00e7a, A., Jasinski, R., Pedroni, V.: A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems. Comput. Secur. 78, 16\u201332 (2019)","journal-title":"Comput. Secur."},{"key":"121_CR17","doi-asserted-by":"crossref","unstructured":"Darkaie, M., Tavoli, R.: Providing a method to reduce the false alarm rate in network intrusion detection systems using the multilayer perceptron technique and backpropagation algorithm. In: 5th Conference on Knowledge Based Engineering and Innovation (KBEI) (2019)","DOI":"10.1109\/KBEI.2019.8735024"},{"key":"121_CR18","doi-asserted-by":"publisher","first-page":"48697","DOI":"10.1109\/ACCESS.2018.2867564","volume":"6","author":"C Xu","year":"2019","unstructured":"Xu, C., Shen, J., Du, X., Zhang, F.: An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6, 48697\u201348707 (2019)","journal-title":"IEEE Access"},{"key":"121_CR19","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TC.2016.2560839","volume":"66","author":"E Viegas","year":"2017","unstructured":"Viegas, E., Santin, A.O., Franca, A., Jasinski, R., Pedroni, V.A., Oliveira, L.S.: Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems. IEEE Trans. Comput. 66, 163\u2013177 (2017)","journal-title":"IEEE Trans. Comput."},{"issue":"2020","key":"121_CR20","doi-asserted-by":"publisher","first-page":"112963","DOI":"10.1016\/j.eswa.2019.112963","volume":"141","author":"M Lopez-Martin","year":"2020","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A.: Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst. Appl. 141(2020), 112963 (2020)","journal-title":"Expert Syst. Appl."},{"key":"121_CR21","doi-asserted-by":"crossref","unstructured":"Viegas, E., Santin, A.O., Abreu, V., Oliveira, L.S.: Enabling anomaly-based intrusion detection through model generalization. In: IEEE Symposium on Computers and Communications (ISCC), pp. 934\u2013939 (2018)","DOI":"10.1109\/ISCC.2018.8538524"},{"key":"121_CR22","unstructured":"MAWILab. http:\/\/www.fukuda-lab.org\/mawilab . Accessed 10 Dec 2019"},{"key":"121_CR23","doi-asserted-by":"crossref","unstructured":"MAWI. http:\/\/mawi.wide.ad.jp\/mawi\/ . Accessed 10 Dec 2019","DOI":"10.6007\/IJARBSS\/v10-i9\/7824"},{"key":"121_CR24","unstructured":"TensorFlow. https:\/\/www.tensorflow.org\/ . Accessed 10 Dec 2019"},{"key":"121_CR25","first-page":"279","volume":"8","author":"P Dayan","year":"1992","unstructured":"Dayan, P.: Q-Learning. Mach. Learn. 8, 279\u2013292 (1992)","journal-title":"Mach. Learn."},{"key":"121_CR26","unstructured":"OpenAI. https:\/\/gym.openai.com\/ . Accessed 10 Dec 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44041-1_121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T10:37:02Z","timestamp":1615027022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44041-1_121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030440404","9783030440411"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44041-1_121","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caserta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0d","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}