{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:50:31Z","timestamp":1742979031460,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030622220"},{"type":"electronic","value":"9783030622237"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62223-7_5","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:03:00Z","timestamp":1605002580000},"page":"50-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3888-8167","authenticated-orcid":false,"given":"Fangwei","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6566-9528","authenticated-orcid":false,"given":"Shaojie","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2054-9215","authenticated-orcid":false,"given":"Changguang","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2532-045X","authenticated-orcid":false,"given":"Qingru","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7(10), 41525\u201341550 (2019)","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"5_CR2","unstructured":"Mazini, M., Shirazi, B., Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J. King Saud Univ.-Comput. Inf. Scie. 31(4), 541\u2013553 (2019). https:\/\/doi.org\/0.1016\/j.jksuci.2018.03.011"},{"key":"5_CR3","unstructured":"Bao, Y., Wu, M., Chang, S., Barzilay, R.: Few-shot text classification with distributional signatures. In: International Conference on Learning Representations 2020, Addis Ababa, Ethiopia. IEEE Press (2020). http:\/\/arxiv.org\/abs\/1908.06039"},{"key":"5_CR4","unstructured":"Finn, C., Abbeel, P., Levine, S.: Model-agnostic meta-learning for fast adaptation of deep networks. In: Proceedings of the 34th International Conference on Machine Learning, Sydney, NSW, Australia, pp. 1126\u20131135. IEEE Press (2017)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Lin, Y., Wang, J., Tu, Y., Chen, L., Dou, Z.: Time-related network intrusion detection model: a deep learning method. In: 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, pp. 1\u20136. IEEE Press (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013302"},{"issue":"1","key":"5_CR6","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2018","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21(1), 686\u2013728 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5_CR7","unstructured":"Vigna, G., Kemmerer, R.A.: NetSTAT: a network-based intrusion detection approach. In: Proceedings 14th Annual Computer Security Applications Conference, Phoenix, pp. 25\u201334. IEEE Press (1998)"},{"issue":"1","key":"5_CR8","first-page":"579","volume":"12","author":"A Bivens","year":"2002","unstructured":"Bivens, A., Palagiri, C., Smith, R.: Network-based intrusion detection using neural networks. Intell. Eng. Syst. Artif. Neural Netw. 12(1), 579\u2013584 (2002)","journal-title":"Intell. Eng. Syst. Artif. Neural Netw."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Karatas, G., Sahingoz, O.K.: Neural network based intrusion detection systems with different training functions. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, pp. 1\u20136. IEEE Press (2018)","DOI":"10.1109\/ISDFS.2018.8355327"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Labonne, M., Olivereau, A., Polve, B., Zeghlache, D.: A Cascade-structured meta-specialists approach for neural network-based intrusion detection. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, pp. 1\u20136. IEEE Press (2019)","DOI":"10.1109\/CCNC.2019.8651856"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"DY Yeung","year":"2003","unstructured":"Yeung, D.Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recogn. 36(1), 229\u2013243 (2003)","journal-title":"Pattern Recogn."},{"issue":"4","key":"5_CR12","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/LES.2012.2218630","volume":"4","author":"M Rahmatian","year":"2012","unstructured":"Rahmatian, M., Kooti, H., Harris, I.G., Bozorgzadeh, E.: Hardware-assisted detection of malicious software in embedded systems. IEEE Embed. Syst. Lett. 4(4), 94\u201397 (2012)","journal-title":"IEEE Embed. Syst. Lett."},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-030-13453-2_12","volume-title":"ECML PKDD 2018 Workshops","author":"A Chawla","year":"2019","unstructured":"Chawla, A., Lee, B., Fallon, S., Jacob, P.: Host based intrusion detection system with combined CNN\/RNN model. In: Alzate, C., et al. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11329, pp. 149\u2013158. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-13453-2_12"},{"issue":"9","key":"5_CR14","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s12652-018-1093-8","volume":"10","author":"E Besharati","year":"2018","unstructured":"Besharati, E., Naderan, M., Namjoo, E.: LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. J. Ambient Intell. Humaniz. Comput. 10(9), 3669\u20133692 (2018). https:\/\/doi.org\/10.1007\/s12652-018-1093-8","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"6266","key":"5_CR15","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1126\/science.aab3050","volume":"350","author":"BM Lake","year":"2015","unstructured":"Lake, B.M., Salakhutdinov, R., Tenenbaum, J.B.: Human-level concept learning through probabilistic program induction. Science 350(6266), 1332\u20131338 (2015)","journal-title":"Science"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Sun, Q., Liu, Y., Chua, T.S., et al.: Meta-transfer learning for few-shot learning. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, pp. 403\u2013412. IEEE Press (2019)","DOI":"10.1109\/CVPR.2019.00049"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Adam, K., Smagulova, K., James, A.: Memristive LSTM network hardware architecture for time-series predictive modeling problems. In: 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Chengdu, pp. 459\u2013462. IEEE Press (2018)","DOI":"10.1109\/APCCAS.2018.8605649"},{"key":"5_CR18","unstructured":"Fei, N., Lu, Z., Gao, Y., Xiang, T., Wen J.: Meta-learning across meta-tasks for few-shot learning. arXiv preprint arXiv:2002.04274 (2020)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Ma, J., Zhao, Z., Yi, X., Chen, J., Hong, L., Chi, E.H.: Modeling task relationships in multi-task learning with multi-gate mixture-of-experts. In: The 24th ACM SIGKDD International Conference, London, pp. 1930\u20131939. ACM Press (2018)","DOI":"10.1145\/3219819.3220007"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-1-4471-0219-9_20","volume-title":"International Conference on Artificial Neural Networks","author":"FA Gers","year":"2001","unstructured":"Gers, F.A., Eck, D., Schmidhuber, J.: Applying LSTM to time series predictable through time-window approaches. In: Tagliaferri, R., Marinaro, M. (eds.) International Conference on Artificial Neural Networks, pp. 193\u2013200. Springer, Berlin (2001). https:\/\/doi.org\/10.1007\/978-1-4471-0219-9_20"},{"key":"5_CR21","unstructured":"Ramos, J.: Using TF-IDF to determine word relevance in document queries. In: Proceedings of the First Instructional Conference on Machine Learning, Washington DC, pp. 133\u2013142. IEEE Press (2013)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Pagliardini, M., Gupta, P., Jaggi, M.: Unsupervised learning of sentence embeddings using compositional n-gram features. arXiv preprint arXiv:1703.02507 (2017)","DOI":"10.18653\/v1\/N18-1049"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Aloysius, N., Geetha, M.: A review on deep convolutional neural networks. In: 2017 International Conference on Communication and Signal Processing (ICCSP), Chennai, pp. 588\u2013592. IEEE Press (2017)","DOI":"10.1109\/ICCSP.2017.8286426"},{"key":"5_CR24","unstructured":"Koch, G., Zemel, R., Salakhutdinov, R.: Siamese neural networks for one-shot image recognition. In: ICML Deep Learning Workshop, Lille, pp. 1\u201327. Elsevier Press (2015)"},{"key":"5_CR25","unstructured":"Shazeer, N., Mirhoseini, A., Maziarz, K., David A.: Outrageously large neural networks: the sparsely-gated mixture-of-experts layer. arXiv preprint arXiv:1701.06538 (2017)"},{"key":"5_CR26","unstructured":"Eigen, D., Ranzato, M.A., Sutskever, I.: Learning factored representations in a deep mixture of experts. arXiv preprint arXiv:1312.4314 (2013)"},{"key":"5_CR27","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML 2010), Haifa, pp. 807\u2013814. IEEE Press (2010)"},{"key":"5_CR28","unstructured":"Asadi, K., Littman, M.L.: An alternative softmax operator for reinforcement learning. In: Proceedings of the 34th International Conference on Machine Learning-Volume, Sydney, Australia, vol. 79, pp. 243\u2013252. JMLR Press (2017)"},{"key":"5_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-642-35289-8_25","volume-title":"Neural Networks: Tricks of the Trade","author":"L Bottou","year":"2012","unstructured":"Bottou, L.: Stochastic gradient descent tricks. In: Montavon, G., Orr, G.B., M\u00fcller, K.-R. (eds.) Neural Networks: Tricks of the Trade. LNCS, vol. 7700, pp. 421\u2013436. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35289-8_25"},{"issue":"3","key":"5_CR30","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11416-019-00330-1","volume":"15","author":"R Eskandari","year":"2019","unstructured":"Eskandari, R., Shajari, M., Ghahfarokhi, M.M.: ERES: an extended regular expression signature for polymorphic worm detection. J. Comput. Virol. Hacking Tech. 15(3), 177\u2013194 (2019). https:\/\/doi.org\/10.1007\/s11416-019-00330-1","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"19","key":"5_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.5234","volume":"31","author":"CK Ng","year":"2019","unstructured":"Ng, C.K., Jiang, F., Zhang, L., Zhou, W.: Static malware clustering using enhanced deep embedding method. Concurr. Comput.: Pract. Exp. 31(19), 1\u201316 (2019)","journal-title":"Concurr. Comput.: Pract. Exp."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62223-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:05:44Z","timestamp":1605002744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62223-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030622220","9783030622237"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62223-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}