{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:12:15Z","timestamp":1743055935907,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_26","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"273-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Forecasting Time-Series of Cyber-Security Data Aggregates"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6850-0277","authenticated-orcid":false,"given":"Miguel V.","family":"Carriegos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9236-0449","authenticated-orcid":false,"given":"Ram\u00f3n \u00c1ngel","family":"Fern\u00e1ndez-D\u00edaz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"issue":"6","key":"26_CR1","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1093\/jigpal\/jzw051","volume":"24","author":"T Andrysiak","year":"2016","unstructured":"Andrysiak, T., Saganowsky, \u0141., Chora\u015b, M., Kozik, R.: Proposal and comparison of network anomaly detection based long memory statistical models. Logic J. IGPL 24(6), 944\u2013956 (2016)","journal-title":"Logic J. IGPL"},{"issue":"6","key":"26_CR2","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1093\/jigpal\/jzw055","volume":"24","author":"J Borrego-D\u00edaz","year":"2016","unstructured":"Borrego-D\u00edaz, J., Ch\u00e1vez-Gonz\u00e1lez, A.M., Pro-Mart\u00edn, J.L., Matos-Arana, V.: Semantics for incident identification and resolution reports. Logic J. IGPL 24(6), 916\u2013932 (2016)","journal-title":"Logic J. IGPL"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1093\/jigpal\/jzz050","volume":"28","author":"A Botas","year":"2019","unstructured":"Botas, A., Rodr\u00edguez, R.J., Matell\u00e1n, V., Garc\u00eda, J.F., Trobajo, M.T., Carriegos, M.V.: On fingerprinting of public malware analysis services. Logic J. IGPL 28, 473\u2013486 (2019). jzz050","journal-title":"Logic J. IGPL"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Cartier, P., Perrin, Y.: Integration over finite sets. In: Diener, F., Diener, M. (eds.) Nonstandard Analysis in Practice, pp. 195\u2013204. Springer (1995)","DOI":"10.1007\/978-3-642-57758-1_9"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1093\/jigpal\/jzz062","volume":"28","author":"G De la Torre","year":"2020","unstructured":"De la Torre, G., Lago-Fern\u2019andez, L.F., Arroyo, D.: On the application of compression-based metrics to identifying anomalous behavior in web traffic. Logic J. IGPL 28, 546\u2013557 (2020). jzz062","journal-title":"Logic J. IGPL"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/3702808","volume":"2018","author":"N DeCastro-Garc\u00eda","year":"2018","unstructured":"DeCastro-Garc\u00eda, N., Mu\u00f1oz Casta\u00f1eda, A.L., Escudero Garc\u00eda, D., Carriegos, M.V.: On detecting and removing superficial redundancy in vector databases. Math. Probl. Eng. 2018, 1\u201314 (2018). ID3702808","journal-title":"Math. Probl. Eng."},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"DeCastro-Garc\u00eda, N., Mu\u00f1oz Casta\u00f1eda, A.L., Escudero Garc\u00eda, D., Carriegos, M.V.: Effect of the sampling of a dataset in the hyperparameter optimization phase over the efficiency of a machine learning algorithm. Complexity 17(1) (2019). ID6278908","DOI":"10.1155\/2019\/6278908"},{"key":"26_CR8","unstructured":"Fliess, M., Join, C.: A mathematical proof of the existence of trends in financial time-series (2009)"},{"key":"26_CR9","unstructured":"Fliess, M., Join, C., Bekcheva, M., Moradi, A., Mounier, H.: Easily implementable time series forecasting techniques for resource provisioning in cloud computing. In: 6th International Conference on Control, Decision and Information Technologies, Paris, France (2019). hal-02024835v3"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Goldblatt, R.: Lectures on the hyperreals. Graduate Texts in Mathematics, vol. 188. Springer (1998)","DOI":"10.1007\/978-1-4612-0615-6"},{"issue":"6","key":"26_CR11","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1080\/00029890.1982.11995456","volume":"89","author":"WS Hatcher","year":"1982","unstructured":"Hatcher, W.S.: Calculus is algebra. Am. Math. Mon. 89(6), 362\u2013370 (1982)","journal-title":"Am. Math. Mon."},{"key":"26_CR12","first-page":"1","volume":"2019","author":"Z Hilal Kilimci","year":"2019","unstructured":"Hilal Kilimci, Z., Okay Akyuz, A., Uysal, M., Akyokus, S., Ozan Uysal, M., Atak Bulbul, B., Ekmis, M.A.: An improved demand forecasting model using deep learning approach and proposed decision integration strategy for supply chain. Complexity 2019, 1\u201315 (2019). ID9067367","journal-title":"Complexity"},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/4067135","volume":"2019","author":"MF Iqbal","year":"2019","unstructured":"Iqbal, M.F., Zahid, M., Habib, D., John, L.K.: Efficient prediction of network traffic for real-time applications. J. Comput. Netw. Commun. 2019, 1\u201311 (2019). ID4067135","journal-title":"J. Comput. Netw. Commun."},{"key":"26_CR14","doi-asserted-by":"publisher","DOI":"10.1515\/9781400884223","volume-title":"Non-Standard Analysis","author":"A Robinson","year":"1996","unstructured":"Robinson, A.: Non-Standard Analysis. Princeton University Press, Princeton (1996)"},{"key":"26_CR15","first-page":"535","volume":"39","author":"C Lobry","year":"2008","unstructured":"Lobry, C., Sari, T.: Nonstandard analysis and representation of reality. Int. J. Control 39, 535\u2013576 (2008)","journal-title":"Int. J. Control"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Mart\u00edn del Rey, A., Hern\u00e1ndez Guill\u00e9n, J.D., Rodr\u00edguez S\u00e1nchez, G.: Study of the malware SCIRS model with different incidence rates. Logic J. IGPL 27(2), 202\u2013213 (2018)","DOI":"10.1093\/jigpal\/jzy033"},{"issue":"1","key":"26_CR17","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1515\/math-2017-0094","volume":"15","author":"JR Moya","year":"2017","unstructured":"Moya, J.R., DeCastro-Garc\u00eda, N., Fern\u00e1ndez-D\u00edaz, R.A., Lorenzana Tamargo, J.: Expert knowledge and data analysis for detecting advanced persistant threats. Open Math. 15(1), 1108\u20131122 (2017)","journal-title":"Open Math."},{"issue":"2","key":"26_CR18","doi-asserted-by":"publisher","first-page":"e0191939","DOI":"10.1371\/journal.pone.0191939","volume":"13","author":"A Mozo","year":"2018","unstructured":"Mozo, A., Ordozgoiti, B., G\u00f3mez-Carnaval, S.: Forecasting short-term data center network traffic load with convolutional neural networks. PLoS ONE 13(2), e0191939 (2018)","journal-title":"PLoS ONE"},{"key":"26_CR19","unstructured":"Rodr\u00edguez-Santos, H.: Big data, IA y anal\u00edtica predictiva. INCIBE Blog. \nhttps:\/\/www.incibe-cert.es\/blog\n\n. Accessed 23 Oct 2019"},{"key":"26_CR20","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1093\/jigpal\/jzz059","volume":"28","author":"\u0141 Saganowsky","year":"2020","unstructured":"Saganowsky, \u0141., Andrysiak, T.: Time series forecasting with model selection applied to anomaly detection in network traffic. Logic J. IGPL 28, 531\u2013545 (2020). jzz059","journal-title":"Logic J. IGPL"},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1093\/jigpal\/jzz060","volume":"28","author":"M Sainz","year":"2020","unstructured":"Sainz, M., Garitano, I., Iturbe, M., Zurutuza, M.: Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: a proof by concept. Logic J. IGPL 28, 461\u2013472 (2020). jzz060","journal-title":"Logic J. IGPL"},{"issue":"2","key":"26_CR22","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1093\/jigpal\/jzy030","volume":"27","author":"R Vega Vega","year":"2019","unstructured":"Vega Vega, R., Quinti\u00e1n, H., Calvo-Rolle, J.L., Herrero, A., Corchado, E.: Gaining deep knowledge of Android malware families through dimensionality reduction techniques. Logic J. IGPL 27(2), 160\u2013176 (2019)","journal-title":"Logic J. IGPL"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:12:02Z","timestamp":1599477122000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}