{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:46:58Z","timestamp":1743000418505,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030966263"},{"type":"electronic","value":"9783030966270"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96627-0_7","type":"book-chapter","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:22:32Z","timestamp":1651839752000},"page":"69-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Applying of\u00a0Machine Learning for\u00a0Analyzing Network Traffic in\u00a0the\u00a0Conditions of\u00a0an\u00a0Unbalanced Data Sample"],"prefix":"10.1007","author":[{"given":"Babyr","family":"Rzayev","sequence":"first","affiliation":[]},{"given":"Ilya","family":"Lebedev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,7]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Ahlgren, B., Hidell, M., Ngai, E.: Internet of things for smart cities: interoperability and open data. IEEE Internet Comput. 20(6), 52\u201356 (2016). https:\/\/doi.org\/10.1109\/MIC.2016.124","DOI":"10.1109\/MIC.2016.124"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Salehi, H., Burgue\u00f1o, R.: Emerging artificial intelligence methods in structural engineering. Eng. Struct. 171, 170\u2013189 (2018). https:\/\/doi.org\/10.1016\/j.engstruct.2018.05.084","DOI":"10.1016\/j.engstruct.2018.05.084"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/s10618-021-00739-7","volume":"35","author":"E Oikarinen","year":"2021","unstructured":"Oikarinen, E., Tiittanen, H., Henelius, A.: Detecting virtual concept drift of regressors without ground truth values. Data Min. Knowl. Disc. 35(3), 821\u2013859 (2021). https:\/\/doi.org\/10.1007\/s10618-021-00739-7","journal-title":"Data Min. Knowl. Disc."},{"issue":"3","key":"7_CR4","doi-asserted-by":"publisher","first-page":"116","DOI":"10.5296\/npa.v2i3.480","volume":"2","author":"A Gokhale","year":"2010","unstructured":"Gokhale, A., McDonals, M.P., Drager, S., McKeever, W.: A cyber physical system perspective on the real time and reliable dissemination of information in intelligent transportation systems. Netw. Protoc. Algorithms 2(3), 116\u2013136 (2010). https:\/\/doi.org\/10.5296\/npa.v2i3.480","journal-title":"Netw. Protoc. Algorithms"},{"issue":"12","key":"7_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1186\/s13173-018-0076-0","volume":"24","author":"A Maletzke","year":"2018","unstructured":"Maletzke, A., dos Reis, D., Batista, G.: Combining instance selection and self-training to improve data stream quantification. J. Braz. Comput. Soc. 24(12), 123\u2013141 (2018). https:\/\/doi.org\/10.1186\/s13173-018-0076-0","journal-title":"J. Braz. Comput. Soc."},{"issue":"8","key":"7_CR6","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1002\/qre.781","volume":"22","author":"DW Kwon","year":"2006","unstructured":"Kwon, D.W., Ko, K., Vannucci, M., Reddy, A.L.N., Kim, S.: Wavelet methods for the detection of anomalies and their application to network traffic analysis. Qual. Reliab. Eng. Int. 22(8), 953\u2013969 (2006). https:\/\/doi.org\/10.1002\/qre.781","journal-title":"Qual. Reliab. Eng. Int."},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Semenov, V.V., Lebedev, I.S., Sukhoparov, M.E.: Approach to classification of the information security state of elements for cyberphysical systems by applying side electromagnetic radiation. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(1), 98\u2013105 (2018). (in Russian). https:\/\/doi.org\/10.17586\/2226-1494-2018-18-1-98-105","DOI":"10.17586\/2226-1494-2018-18-1-98-105"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"L\u00f3pez, V., Fernandez, A., Garcia, S., Palade, V., Herrera, F.: An insight into classification with imbalanced data: empirical results and current trends on using data intrinsic characteristics. Inf. Sci. 250(7), 113\u2013141 (2013). https:\/\/doi.org\/10.1016\/j.ins.2013.07.007","DOI":"10.1016\/j.ins.2013.07.007"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s00145-015-9224-2","volume":"30","author":"D Genkin","year":"2017","unstructured":"Genkin, D., Shamir, A., Tromer, E.: Acoustic cryptanalysis. J. Cryptol. 30(2), 392\u2013443 (2017). https:\/\/doi.org\/10.1007\/s00145-015-9224-2","journal-title":"J. Cryptol."},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Semenov, V.V., Lebedev, I.S., Sukhoparov, M.E., Salakhutdinova, K.I.: Application of an autonomous object behavior model to classify the cybersecurity state. In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems, pp. 104\u2013112 (2019). https:\/\/doi.org\/10.1007\/978-3-030-30859-9_9","DOI":"10.1007\/978-3-030-30859-9_9"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1142\/S0218488512400156","volume":"20","author":"A Palacios","year":"2012","unstructured":"Palacios, A., Sanchez, L., Couso, I.: Combining Adaboost with preprocessing algorithms for extracting fuzzy rules from low quality data in possibly imbalanced datasets. Int. J. Uncertain. Fuzzines Knowl.-Based Syst. 20(2), 51\u201371 (2012). https:\/\/doi.org\/10.1142\/S0218488512400156","journal-title":"Int. J. Uncertain. Fuzzines Knowl.-Based Syst."},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.eswa.2017.12.022","volume":"97","author":"T Sethi","year":"2018","unstructured":"Sethi, T., Kantardzic, M.: Handling adversarial concept drift in streaming data. Expert. Syst. Appl. 97, 18\u201340 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2017.12.022","journal-title":"Expert. Syst. Appl."},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/JIOT.2013.2296516","volume":"1","author":"J Jin","year":"2014","unstructured":"Jin, J., Gubbi, J., Marusic, S., Palaniswami, M.: An information framework for creating a smart city through internet of things. IEEE Internet Things J. 1(2), 112\u2013121 (2014). https:\/\/doi.org\/10.1109\/JIOT.2013.2296516","journal-title":"IEEE Internet Things J."},{"key":"7_CR14","unstructured":"Sukhoparov, M.E., Semenov, V.V., Salakhutdinova, K.I., Lebedev, I.S.: Identification of anomalous functioning of Industry 4.0 devices based on behavioral patterns: information security problems. Comput. Syst. (1), 96\u2013102 (2020). (in Russian)"},{"key":"7_CR15","unstructured":"Semenov, V., Lebedev, I., Sukhoparov, M.: Identification of the state of individual elements of cyber-physical systems based on external behavioral characteristics. J. Appl. Inform. 13(5, 77), 72\u201383 (2018). (in Russian)"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Sukhoparov, M.E., Lebedev, I.S.: Identification the information security status for the internet of things devices in information and telecommunication systems. Syst. Control, Commun. Secur. (3), 252\u2013268 (2020). (in Russian). https:\/\/doi.org\/10.24411\/2410-9916-2020-10310","DOI":"10.24411\/2410-9916-2020-10310"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Rzayev, B.T., Lebedev, I.S.: Applying bagging in finding network traffic anomalies. Sci. Tech. J. Inf. Technol., Mech. Opt. 21(2), 234\u2013240 (2021). (in Russian). 10.17586\/2226\u20131494-2021-21-2-234-240","DOI":"10.17586\/2226-1494-2021-21-2-234-240"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Ingre, B., Yadav, A.: Performance Analysis of NSL-KDD dataset using ANN. In: Proceedings of the 4th International Conference on Signal Processing and Communication Engineering Systems (SPACES), pp. 92\u201396 (2015). 10.1109\/SPACES.2015.7058223","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Dhanabal, L., Shantharajah, Dr. S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446\u2013452 (2015). https:\/\/doi.org\/10.17148\/IJARCCE.2015.4696","DOI":"10.17148\/IJARCCE.2015.4696"},{"key":"7_CR20","unstructured":"Vorontcov, K.V.: Lectures on algorithmic compositions. http:\/\/www.machinelearning.ru\/wiki\/images\/0\/0d\/Voron-MLCompositions.pdf. Last accessed 11 May 2021"},{"key":"7_CR21","doi-asserted-by":"publisher","unstructured":"D\u2019yakonov, A.G.: Solution methods for classification problems with categorical attributes. Comput. Math. Model. 26(3), 408\u2013428 (2015). https:\/\/doi.org\/10.1007\/s10598-015-9281-2","DOI":"10.1007\/s10598-015-9281-2"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1201\/b12207","volume-title":"Ensemble Methods: Foundations and Algorithms","author":"Z-H Zhou","year":"2012","unstructured":"Zhou, Z.-H.: Ensemble Methods: Foundations and Algorithms, p. 222. CRC Press, New York (2012)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, Z.-H., Feng J.: Deep forest. Natl. Sci. Rev. 6(1), 74\u201386 (2019). arXiv:170208835v4. Last accessed 20 May 2021","DOI":"10.1093\/nsr\/nwy108"},{"issue":"1","key":"7_CR24","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.ymssp.2017.11.024","volume":"107","author":"S Khan","year":"2018","unstructured":"Khan, S., Yairi, T.: A review on the application of deep learning in system health management. Mech. Syst. Signal Process. 107(1), 241\u2013265 (2018). https:\/\/doi.org\/10.1016\/j.ymssp.2017.11.024","journal-title":"Mech. Syst. Signal Process."},{"key":"7_CR25","unstructured":"Pedersen, T.: A simple approach to building ensembles of Naive Bayesian classifiers for word sense disambiguation. In: NAACL 2000: Proceedings of the 1st North American chapter of the Association for Computational Linguistics Conference, pp. 63\u201369 (2000)"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Kaftannikov, I.L., Parasich, A.V.: Problems of training set\u2019s formation in machine learning tasks. Bulletin of the South Ural State University. Series Computer Technology, Aotimatic Control, Radio Electronics 16(3), 15\u201324 (2016). (in Russian). https:\/\/doi.org\/10.14529\/ctcr160302","DOI":"10.14529\/ctcr160302"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recognit. Lett. 27(8), 861\u2013874 (2006). https:\/\/doi.org\/10.1016\/j.patrec.2005.10.010","DOI":"10.1016\/j.patrec.2005.10.010"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96627-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:23:42Z","timestamp":1651839822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96627-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030966263","9783030966270"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96627-0_7","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/idc2021.unirc.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}