{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:01:07Z","timestamp":1742929267433,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030878719"},{"type":"electronic","value":"9783030878726"}],"license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87872-6_12","type":"book-chapter","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T04:02:39Z","timestamp":1632196959000},"page":"116-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7744-7308","authenticated-orcid":false,"given":"Roberto","family":"Mag\u00e1n-Carri\u00f3n","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2662-798X","authenticated-orcid":false,"given":"Daniel","family":"Urda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5353-6760","authenticated-orcid":false,"given":"Ignacio","family":"D\u00edaz-Cano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0481-790X","authenticated-orcid":false,"given":"Bernab\u00e9","family":"Dorronsoro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,22]]},"reference":[{"key":"12_CR1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/978-981-15-7530-3_44","volume-title":"Big Data and Security","author":"R Ali","year":"2020","unstructured":"Ali, R., Ali, A., Iqbal, F., Khattak, A.M., Aleem, S.: A systematic review of artificial intelligence and machine learning techniques for cyber security. In: Tian, Y., Ma, T., Khan, M.K. (eds.) ICBDS 2019. CCIS, vol. 1210, pp. 584\u2013593. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-7530-3_44"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"12_CR3","volume-title":"Pattern Recognition and Machine Learning","author":"C Bishop","year":"2006","unstructured":"Bishop, C.: Pattern Recognition and Machine Learning. Springer, New York Inc., Information Science and Statistics, Berlin (2006)"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2019.101603","volume":"87","author":"J Camacho","year":"2019","unstructured":"Camacho, J., Garc\u00eda-Gim\u00e9nez, J.M., Fuentes-Garc\u00eda, N.M., Maci\u00e1-Fern\u00e1ndez, G.: Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle. Comput. Secur. 87, 1\u201311 (2019)","journal-title":"Comput. Secur."},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.cose.2016.02.008","volume":"59","author":"J Camacho","year":"2016","unstructured":"Camacho, J., P\u00e9rez-Villegas, A., Garc\u00eda-Teodoro, P., Maci\u00e1-Fern\u00e1ndez, G.: PCA-based multivariate statistical network monitoring for anomaly detection. Comput. Secur. 59, 118\u2013137 (2016)","journal-title":"Comput. Secur."},{"key":"12_CR7","unstructured":"ENISA: ENISA Threat Landscape Report (2020). https:\/\/bit.ly\/3gdsB1O. Accessed 9 June 2020"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.cose.2017.11.004","volume":"73","author":"G Maci\u00e1-Fern\u00e1ndez","year":"2018","unstructured":"Maci\u00e1-Fern\u00e1ndez, G., Camacho, J., Mag\u00e1n-Carri\u00f3n, R., Garc\u00eda-Teodoro, P., Ther\u00f3n, R.: UGR\u201916: a new dataset for the evaluation of cyclostationarity-based network IDSs. Comput. Secur. 73, 411\u2013424 (2018)","journal-title":"Comput. Secur."},{"issue":"5","key":"12_CR9","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.3390\/app10051775","volume":"10","author":"R Mag\u00e1n-Carri\u00f3n","year":"2020","unstructured":"Mag\u00e1n-Carri\u00f3n, R., Urda, D., Diaz-Cano, I., Dorronsoro, B.: Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches. Appl. Sci. 10(5), 1775 (2020)","journal-title":"Appl. Sci."},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"107219","DOI":"10.1016\/j.asoc.2021.107219","volume":"104","author":"K Stapor","year":"2021","unstructured":"Stapor, K., Ksieniewicz, P., Garc\u00eda, S., Wo\u017aniak, M.: How to design the fair experimental classifier evaluation. Appl. Soft Comput. 104, 107219 (2021)","journal-title":"Appl. Soft Comput."},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"146598","DOI":"10.1109\/ACCESS.2020.3013145","volume":"8","author":"I Wiafe","year":"2020","unstructured":"Wiafe, I., Koranteng, F.N., Obeng, E.N., Assyne, N., Wiafe, A., Gulliver, S.R.: Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access 8, 146598\u2013146612 (2020)","journal-title":"IEEE Access"}],"container-title":["Advances in Intelligent Systems and Computing","14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87872-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T07:04:48Z","timestamp":1642835088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87872-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"ISBN":["9783030878719","9783030878726"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87872-6_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021,9,22]]},"assertion":[{"value":"22 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS - ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.iceuteconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}