{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:17:46Z","timestamp":1743088666503,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030483241"},{"type":"electronic","value":"9783030483258"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-48325-8_23","type":"book-chapter","created":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T08:02:45Z","timestamp":1589356965000},"page":"354-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Better Infected Hosts Detection Combining Ensemble Learning and Threat Intelligence"],"prefix":"10.1007","author":[{"given":"Paula","family":"Venosa","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Francisco Javier","family":"Diaz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,14]]},"reference":[{"key":"23_CR1","unstructured":"Venosa, P., Garcia, S., Diaz, F.J.: Ensembling to improve infected hosts detection. In: XXV Congreso Argentino de Ciencias de la Computaci\u00f3n, CACIC 2019, pp. 1251\u20131260, October 2019. ISBN 978-987-688-377-1"},{"key":"23_CR2","unstructured":"Technology in the Stratosphere IPS Project (s.f.). \nhttps:\/\/www.stratosphereips.org\/technology"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Vanerio, J., Casas, P.: Ensemble-learning approaches for network security and anomaly detection. In: Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, pp. 1\u20136. ACM, August 2017","DOI":"10.1145\/3098593.3098594"},{"key":"23_CR4","unstructured":"VirusTotal (s.f.). \nhttps:\/\/www.virustotal.com\/"},{"key":"23_CR5","unstructured":"Panetta, K.: 5 Trends in Cybersecurity for 2017 and 2018 (2017). \nhttps:\/\/www.gartner.com\/smarterwithgartner\/5-trends-in-cybersecurity-for-2017-and-2018\/"},{"key":"23_CR6","unstructured":"ENISA: ENISA Threat Landscape Report 2017 15 Top Cyber-Threats and Trends, December 2018. \nhttps:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-report-2017"},{"key":"23_CR7","unstructured":"PANDA: 2017 in Figures: the exponential growth of Malware, December 2018. \nhttps:\/\/www.pandasecurity.com\/mediacenter\/malware\/2017-figures\/"},{"key":"23_CR8","unstructured":"AV-Test (2018). \nhttps:\/\/www.av-test.org\/en\/statistics\/malware\/"},{"key":"23_CR9","unstructured":"McAfee Labs: McAfee Labs Threat Report, December 2018. \nhttps:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-dec-2017.pdf"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Mohd, R.Z.A., Zuhairi, M.F., Shadil A.Z.A., Dao H.: Anomaly-based NIDS: a review of machine learning methods on malware detection. In: International Conference on Information and Communication Technology, Kuala Lumpur, pp. 266\u2013270 (2016)","DOI":"10.1109\/ICICTM.2016.7890812"},{"key":"23_CR11","doi-asserted-by":"publisher","DOI":"10.1201\/b12207","volume-title":"Ensemble Methods: Foundations and Algorithms (Chapman & Hall\/Crc Machine Learning & Pattern Recognition)","author":"ZH Zhou","year":"2012","unstructured":"Zhou, Z.H.: Ensemble Methods: Foundations and Algorithms (Chapman & Hall\/Crc Machine Learning & Pattern Recognition), 1st edn. Chapman and Hall\/CRC, New York (2012)","edition":"1"},{"key":"23_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7","volume-title":"Ensemble Machine Learning: Methods and Applications","author":"C Zhang","year":"2012","unstructured":"Zhang, C., Ma, Y.: Ensemble Machine Learning: Methods and Applications, 1st edn. Springer, New York (2012). \nhttps:\/\/doi.org\/10.1007\/978-1-4419-9326-7","edition":"1"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-009-9124-7","volume":"33","author":"L Rokach","year":"2009","unstructured":"Rokach, L.: Ensemble-based classifiers. Artif. Intell. Rev. 33, 1\u201339 (2009). \nhttps:\/\/doi.org\/10.1007\/s10462-009-9124-7","journal-title":"Artif. Intell. Rev."},{"key":"23_CR14","unstructured":"Sewell, M.: Ensemble learning. United Kingdom: UCL Research Note (UCL Department of Computer Science) (2011)"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.011","volume":"66","author":"G Folino","year":"2016","unstructured":"Folino, G., Sabatino, P.: Review Ensemble based collaborative and distributed intrusion detection systems: A survey. J. Netw. Comput. Appl. 66, 1\u20136 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2009","key":"23_CR16","first-page":"11994","volume":"36","author":"T Chih-Fong","year":"2009","unstructured":"Chih-Fong, T., Yu-Feng, H., Chia-Ying, L., Wei-Yang, L.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(2009), 11994\u201312000 (2009)","journal-title":"Expert Syst. Appl."},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Didaci, L., Giacinto, G., Roli, F.: Ensemble Learning for Intrusion Detection in Computer Networks. ACM J. (2002)","DOI":"10.1007\/978-1-4613-0231-5_8"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Miller, S., Busby-Earle, C.: Multi-perspective machine learning (MPML) a machine learning model for multi-faceted learning problems (2018). \nhttps:\/\/doi.org\/10.1109\/csci.2017.60","DOI":"10.1109\/csci.2017.60"},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Miller, S., Busby-Earle, C.: Multi-perspective machine learning a classifier ensemble method for intrusion detection (2018) \nhttps:\/\/doi.org\/10.1145\/\/CSCI.2017","DOI":"10.1145\/\/CSCI.2017"},{"key":"23_CR20","doi-asserted-by":"publisher","first-page":"418","DOI":"10.3906\/elk-1702-279","volume":"26","author":"D Necati","year":"2018","unstructured":"Necati, D., G\u00f6khan, D.: Modified stacking ensemble approach to detect network intrusionNecati DEM\u0130R, G\u00f6khan DALKILI\u00c7. Turkish J. Electr. Eng. Comput. Sci. 26, 418\u2013433 (2018)","journal-title":"Turkish J. Electr. Eng. Comput. Sci."},{"key":"23_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-017-9436-x","author":"L Mai","year":"2017","unstructured":"Mai, L., Kun Noh, D.: Cluster Ensemble with Link-Based Approach for Botnet Detection. J. Netw. Syst. Manage. (2017). \nhttps:\/\/doi.org\/10.1007\/s10922-017-9436-x","journal-title":"J. Netw. Syst. Manage."},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","volume":"45","author":"S Garcia","year":"2014","unstructured":"Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of Botnet detection methods. Comput. Secur. J. 45, 100\u2013123 (2014). \nhttps:\/\/doi.org\/10.1016\/j.cose.2014.05.011","journal-title":"Comput. Secur. J."},{"key":"23_CR23","volume-title":"A Comprehensive Guide to Ensemble Learning (with Python codes)","author":"S Aishwayra","year":"2018","unstructured":"Aishwayra, S.: A Comprehensive Guide to Ensemble Learning (with Python codes). Analytics Vidhya, Haryana (2018)"},{"key":"23_CR24","unstructured":"Scikit-learn python library (s.f). \nhttps:\/\/scikit-learn.org\/stable\/"},{"key":"23_CR25","unstructured":"Confusion Matrix Online Calculator (s.f). \nhttp:\/\/onlineconfusionmatrix.com\/"},{"key":"23_CR26","unstructured":"What is Threat Intelligence? (s.f). \nhttps:\/\/www.forcepoint.com\/cyber-edu\/threat-intelligence"},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"371","DOI":"10.11591\/ijeecs.v10.i1","volume":"10","author":"M Abu","year":"2018","unstructured":"Abu, M., Rahayu, S., Ariffin, D., Aswami, D., Robiah, Y.: Cyber threat intelligence \u2013 issue and challenges. Indonesian J. Electr. Eng. Comput. Sci. 10, 371\u2013379 (2018). \nhttps:\/\/doi.org\/10.11591\/ijeecs.v10.i1","journal-title":"Indonesian J. Electr. Eng. Comput. Sci."}],"container-title":["Communications in Computer and Information Science","Computer Science \u2013 CACIC 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-48325-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T08:08:49Z","timestamp":1589357329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-48325-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030483241","9783030483258"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-48325-8_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CACIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Argentine Congress of Computer Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"R\u00edo Cuarto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Argentina","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cacic2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cacic2019.exa.unrc.edu.ar\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"RedUNCI","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"185","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.05","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}