{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:17:33Z","timestamp":1743052653167,"version":"3.40.3"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031150296"},{"type":"electronic","value":"9783031150302"}],"license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-15030-2_7","type":"book-chapter","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T10:04:03Z","timestamp":1670407443000},"page":"147-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Defensive Machine Learning Methods and the Cyber Defence Chain"],"prefix":"10.1007","author":[{"given":"Hannu","family":"Turtiainen","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Costin","sequence":"additional","affiliation":[]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,1]]},"reference":[{"key":"7_CR1","unstructured":"Abbate, P.: Internet Crime Report 2020. Tech. rep., Federal Bureau of Investigation (2020). https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Alhawi, O.M., Baldwin, J., Dehghantanha, A.: Leveraging machine learning techniques for windows ransomware network traffic detection. In: Cyber Threat Intelligence. Springer, New York (2018)","DOI":"10.1007\/978-3-319-73951-9_5"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"101635","DOI":"10.1016\/j.cose.2019.101635","volume":"88","author":"FH Alqahtani","year":"2020","unstructured":"Alqahtani, F.H., Alsulaiman, F.A.: Is image-based captcha secure against attacks based on machine learning? An experimental study. Comput. Secur. 88, 101635 (2020)","journal-title":"Comput. Secur."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, K., Purdy, C.: Toward an online anomaly intrusion detection system based on deep learning. In: 15th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, New York (2016)","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"7_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5422","volume":"32","author":"SI Bae","year":"2020","unstructured":"Bae, S.I., Lee, G.B., Im, E.G.: Ransomware detection using machine learning algorithms. Concur. Comput. Pract. Exp. 32, e5422 (2020)","journal-title":"Concur. Comput. Pract. Exp."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Baek, S., Jung, Y., Mohaisen, A., Lee, S., Nyang, D.: Ssd-insider: internal defense of solid-state drive against ransomware with perfect data recovery. In: IEEE 38th International Conference on Distributed Computing Systems (ICDCS). IEEE, New York (2018)","DOI":"10.1109\/ICDCS.2018.00089"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Bauder, R.A., Khoshgoftaar, T.M.: Medicare fraud detection using machine learning methods. In: 16th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, New York (2017)","DOI":"10.1109\/ICMLA.2017.00-48"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Brown, A., Tuor, A., Hutchinson, B., Nichols, N.: Recurrent neural network attention mechanisms for interpretable system log anomaly detection. In: 1st Workshop on Machine Learning for Computing Systems (2018)","DOI":"10.1145\/3217871.3217872"},{"key":"7_CR9","unstructured":"Brumley, D.: The Cyber Grand Challenge and the future of cyber-autonomy. USENIX Login 43 (2018)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Cao, S., Yang, X., Chen, C., Zhou, J., Li, X., Qi, Y.: Titant: online real-time transaction fraud detection in ant financial (2019). http:\/\/arxiv.org\/abs\/1906.07407","DOI":"10.14778\/3352063.3352126"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Carneiro, N., Figueira, G., Costa, M.: A data mining based system for credit-card fraud detection in e-tail. Dec. Support Syst. 95 (2017)","DOI":"10.1016\/j.dss.2017.01.002"},{"key":"7_CR12","unstructured":"Center, H.S.C.C.: Ransomware Trends 2021. Tech. rep., Health Sector Cybersecurity Coordination Center (2021). https:\/\/www.hhs.gov\/sites\/default\/files\/ransomware-trends-2021.pdf"},{"key":"7_CR13","unstructured":"Chen, L., Yang, C.Y., Paul, A., Sahita, R.: Towards resilient machine learning for ransomware detection (2018). https:\/\/arxiv.org\/abs\/1812.09400"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Chhabra, G.S., Singh, V.P., Singh, M.: Cyber forensics framework for big data analytics in iot environment using machine learning. Multimedia Tools Appl. 79 (2020)","DOI":"10.1007\/s11042-018-6338-1"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Cruz-Perez, C., Starostenko, O., Uceda-Ponga, F., Alarcon-Aquino, V., Reyes-Cabrera, L.: Breaking reCAPTCHAs with unpredictable collapse: heuristic character segmentation and recognition. In: Mexican Conference on Pattern Recognition. Springer, New York (2012)","DOI":"10.1007\/978-3-642-31149-9_16"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Cusack, G., Michel, O., Keller, E.: Machine learning-based detection of ransomware using sdn. In: ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (2018)","DOI":"10.1145\/3180465.3180467"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Sanghai, S., Verma, D.: Adversarial classification. In: 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"7_CR18","unstructured":"DARPA: Cyber Grand Challenge (2016). https:\/\/www.darpa.mil\/about-us\/timeline\/cyber-grand-challenge"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Datta, P., Lodinger, N., Namin, A.S., Jones, K.S.: Predicting Consequences of Cyber-Attacks. In: IEEE International Conference on Big Data (Big Data). IEEE, New York (2020)","DOI":"10.1109\/BigData50022.2020.9377825"},{"key":"7_CR20","unstructured":"Dong, Y., Zhang, Y.: Adaptively Detecting Malicious Queries in Web Attacks (2017). http:\/\/arxiv.org\/abs\/1701.07774"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: Deeplog: anomaly detection and diagnosis from system logs through deep learning. In: ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari, M., Janjua, Z.H., Vecchio, M., Antonelli, F.: Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7, 6882\u20136897 (2020)","journal-title":"IEEE Internet Things J."},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"12284","DOI":"10.1109\/ACCESS.2018.2874098","volume":"6","author":"Y Fang","year":"2018","unstructured":"Fang, Y., Huang, C., Liu, L., Xue, M.: Research on malicious JavaScript detection technology based on LSTM. IEEE Access 6, 12284\u201312294 (2018)","journal-title":"IEEE Access"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Fotiadou, K., Velivassaki, T.H., Voulkidis, A., Skias, D., Tsekeridou, S., Zahariadis, T.: Network traffic anomaly detection via deep learning. Information 12 (2021). https:\/\/www.mdpi.com\/2078-2489\/12\/5\/215","DOI":"10.3390\/info12050215"},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1080\/15564886.2020.1829224","volume":"16","author":"AK Ghazi-Tehrani","year":"2021","unstructured":"Ghazi-Tehrani, A.K., Pontell, H.N.: Phishing evolves: analyzing the enduring cybercrime. Victims Offenders 16, 28 (2021)","journal-title":"Victims Offenders"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Gossweiler, R., Kamvar, M., Baluja, S.: What\u2019s up captcha? a captcha based on image orientation. In: 18th International Conference on World Wide Web (2009)","DOI":"10.1145\/1526709.1526822"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: 10th International conference on Mobile Systems, Applications, and Services (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Hoffman, W.: AI and the future of cyber competition. CSET Issue Brief (2021)","DOI":"10.51593\/2020CA007"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Huang, J., Xu, J., Xing, X., Liu, P., Qureshi, M.K.: Flashguard: leveraging intrinsic flash properties to defend against encryption ransomware. In: ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134035"},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s11265-020-01588-1","volume":"93","author":"X Huang","year":"2021","unstructured":"Huang, X., Ma, L., Yang, W., Zhong, Y.: A method for windows malware detection based on deep learning. J. Signal Process. Syst. 93, 265\u2013273 (2021)","journal-title":"J. Signal Process. Syst."},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"2597","DOI":"10.1007\/s11277-020-07166-9","volume":"112","author":"J Hwang","year":"2020","unstructured":"Hwang, J., Kim, J., Lee, S., Kim, K.: Two-stage ransomware detection using dynamic analysis and machine learning techniques. Wireless Personal Commun. 112, 2597\u20132609 (2020)","journal-title":"Wireless Personal Commun."},{"key":"7_CR32","unstructured":"Jain, A.K., Gupta, B.: Comparative analysis of features based machine learning approaches for phishing detection. In: 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, New York (2016)"},{"key":"7_CR33","first-page":"5","volume":"10","author":"AK Jain","year":"2019","unstructured":"Jain, A.K., Gupta, B.B.: A machine learning based approach for phishing detection using hyperlinks information. J. Amb. Intell. Human. Comput. 10, 5 (2019)","journal-title":"J. Amb. Intell. Human. Comput."},{"key":"7_CR34","unstructured":"Le, H., Pham, Q., Sahoo, D., Hoi, S.C.: URLNet: Learning a URL representation with deep learning for malicious URL detection (2018). http:\/\/arxiv.org\/abs\/1802.03162"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Le, Q., Boydell, O., Namee, B.M., Scanlon, M.: Deep learning at the shallow end: Malware classification for non-domain experts (2018). https:\/\/arxiv.org\/abs\/1807.08265","DOI":"10.1016\/j.diin.2018.04.024"},{"key":"7_CR36","doi-asserted-by":"publisher","first-page":"110205","DOI":"10.1109\/ACCESS.2019.2931136","volume":"7","author":"K Lee","year":"2019","unstructured":"Lee, K., Lee, S.Y., Yim, K.: Machine learning based file entropy analysis for ransomware detection in backup systems. IEEE Access 7, 110205\u2013110215 (2019)","journal-title":"IEEE Access"},{"key":"7_CR37","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"JH Li","year":"2018","unstructured":"Li, J.H.: Cyber security meets artificial intelligence: a survey. Front. Inf. Technol. Electron. Eng. 19, 1462\u20131474 (2018)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Likarish, P., Jung, E., Jo, I.: Obfuscated malicious javascript detection using classification techniques. In: 4th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, New York (2009)","DOI":"10.1109\/MALWARE.2009.5403020"},{"key":"7_CR39","unstructured":"Lockheed Martin Corporation: GAINING THE ADVANTAGE: Applying Cyber Kill Chain\u24c7Methodology to Network Defense (2015). https:\/\/www.lockheedmartin.com\/content\/dam\/lockheed-martin\/rms\/documents\/cyber\/Gaining_the_Advantage_Cyber_Kill_Chain.pdf"},{"key":"7_CR40","unstructured":"Maes, S., Tuyls, K., Vanschoenwinkel, B., Manderick, B.: Credit card fraud detection using bayesian and neural networks. In: 1st International NAISO Congress on Neuro Fuzzy Technologies (2002)"},{"key":"7_CR41","doi-asserted-by":"publisher","first-page":"7700","DOI":"10.1109\/ACCESS.2018.2803446","volume":"6","author":"LF Maim\u00f3","year":"2018","unstructured":"Maim\u00f3, L.F., G\u00f3mez, \u00c1.L.P., Clemente, F.J.G., P\u00e9rez, M.G., P\u00e9rez, G.M.: A self-adaptive deep learning-based system for anomaly detection in 5g networks. IEEE Access 6, 7700\u20137712 (2018)","journal-title":"IEEE Access"},{"key":"7_CR42","unstructured":"NIST: NIST Cybersecurity framework (2018). https:\/\/www.nist.gov\/cyberframework"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Noorbehbahani, F., Rasouli, F., Saberi, M.: Analysis of machine learning techniques for ransomware detection. In: 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, New York (2019)","DOI":"10.1109\/ISCISC48546.2019.8985139"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., P\u00e9rez-Cabo, D.: No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation. IEEE Trans. Inf. Forensics Secur. 12 (2017)","DOI":"10.1109\/TIFS.2017.2718479"},{"key":"7_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3406093","volume":"21","author":"S Otoum","year":"2021","unstructured":"Otoum, S., Kantarci, B., Mouftah, H.: A comparative study of ai-based intrusion detection techniques in critical infrastructures. ACM Trans. Internet Technol. 21, 1\u201322 (2021)","journal-title":"ACM Trans. Internet Technol."},{"key":"7_CR46","unstructured":"OWASP Foundation: OWASP Cyber Defense Matrix. https:\/\/owasp.org\/www-project-cyber-defense-matrix\/"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"\u00d6zg\u00fcr, A., Erdem, H.: A review of kdd99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints 4, e1954v1 (2016)","DOI":"10.7287\/peerj.preprints.1954v1"},{"key":"7_CR48","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.ssci.2019.06.001","volume":"118","author":"N Paltrinieri","year":"2019","unstructured":"Paltrinieri, N., Comfort, L., Reniers, G.: Learning about risk: machine learning for risk assessment. Safe. sci. 118, 475\u2013486 (2019)","journal-title":"Safe. sci."},{"key":"7_CR49","unstructured":"Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J., Cavallaro, L.: TESSERACT: eliminating experimental bias in malware classification across space and time. In: 28th USENIX Security Symposium (USENIX Security) (2019)"},{"key":"7_CR50","first-page":"19","volume":"30","author":"J Perols","year":"2011","unstructured":"Perols, J.: Financial statement fraud detection: An analysis of statistical and machine learning algorithms. Audit.: J. Pract. Theory 30, 19\u201350 (2011)","journal-title":"Theory"},{"key":"7_CR51","unstructured":"Perry Carpenter: Using the Predict, Prevent, Detect, Respond Framework to Communicate Your Security Program Strategy (2016). https:\/\/www.gartner.com\/en\/documents\/3286317\/using-the-predict-prevent-detect-respond-framework-to-co"},{"key":"7_CR52","unstructured":"Polyakov, A.: Machine Learning for Cybersecurity 101 (2018). https:\/\/towardsdatascience.com\/machine-learning-for-cybersecurity-101-7822b802790b"},{"key":"7_CR53","unstructured":"Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., Nicholas, C.: Malware detection by eating a whole exe (2017). Preprint. arXiv:1710.09435"},{"key":"7_CR54","first-page":"17","volume":"43","author":"C Ravi","year":"2012","unstructured":"Ravi, C., Manoharan, R.: Malware detection using windows API sequence and machine learning. Int. J. Comput. Appl. 43, 17 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"7_CR55","first-page":"73","volume":"2018","author":"M Rege","year":"2018","unstructured":"Rege, M., Mbah, R.B.K.: Machine learning for cyber defense and attack. Data Analytics 2018, 73\u201378 (2018)","journal-title":"Data Analytics"},{"key":"7_CR56","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2 (2013)"},{"key":"7_CR57","unstructured":"Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., Ahmadi, M.: Microsoft malware classification challenge (2018). https:\/\/arxiv.org\/abs\/1802.10135"},{"key":"7_CR58","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz, O.K., Buber, E., Demir, O., Diri, B.: Machine learning based phishing detection from URLs. Exp. Syst. Appl. 117, 345\u2013357 (2019)","journal-title":"Exp. Syst. Appl."},{"key":"7_CR59","doi-asserted-by":"crossref","unstructured":"Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: European Intelligence and Security Informatics Conference. IEEE, New York (2012)","DOI":"10.1109\/EISIC.2012.34"},{"key":"7_CR60","doi-asserted-by":"crossref","unstructured":"Shaukat, S.K., Ribeiro, V.J.: Ransomwall: A layered defense system against cryptographic ransomware attacks using machine learning. In: 10th International Conference on Communication Systems & Networks (COMSNETS). IEEE, New York (2018)","DOI":"10.1109\/COMSNETS.2018.8328219"},{"key":"7_CR61","doi-asserted-by":"crossref","unstructured":"Singh, P., Tapaswi, S., Gupta, S.: Malware detection in pdf and office documents: a survey. Inf. Secur. J.: Global Perspect. 29, 134\u2013153 (2020)","DOI":"10.1080\/19393555.2020.1723747"},{"key":"7_CR62","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2015.132","volume":"13","author":"J Song","year":"2015","unstructured":"Song, J., Alves-Foss, J.: The DARPA cyber grand challenge: a competitor\u2019s perspective. IEEE Secur. Priv. 13, 72\u201376 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR63","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MSP.2016.14","volume":"14","author":"J Song","year":"2016","unstructured":"Song, J., Alves-Foss, J.: The DARPA cyber grand challenge: a competitor\u2019s perspective, part 2. IEEE Secur. Priv. 14, 71\u201381 (2016)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR64","unstructured":"Stokes, J.W., Agrawal, R., McDonald, G.: Neural classification of malicious scripts: a study with javascript and vbscript (2018). http:\/\/arxiv.org\/abs\/1805.05603"},{"key":"7_CR65","unstructured":"Sun, L., Versteeg, S., Boztas, S., Rao, A.: Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study (2016). http:\/\/arxiv.org\/abs\/1609.06676"},{"key":"7_CR66","unstructured":"The MITRE Corporation: MITRE D3FEND Framework. https:\/\/d3fend.mitre.org\/"},{"key":"7_CR67","unstructured":"Tidy, J.: Colonial hack: How did cyber-attackers shut off pipeline? https:\/\/www.bbc.com\/news\/technology-57063636"},{"key":"7_CR68","doi-asserted-by":"crossref","unstructured":"Tran, P.H., Tran, K.P., Huong, T.T., Heuchenne, C., HienTran, P., Le, T.M.H.: Real time data-driven approaches for credit card fraud detection. In: International Conference on e-Business and Applications (2018)","DOI":"10.1145\/3194188.3194196"},{"key":"7_CR69","unstructured":"Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., Robinson, S.: Deep learning for unsupervised insider threat detection in structured cybersecurity data streams (2017). http:\/\/arxiv.org\/abs\/1710.00811"},{"key":"7_CR70","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIP.2002.801590","volume":"11","author":"A Vailaya","year":"2002","unstructured":"Vailaya, A., Zhang, H., Yang, C., Liu, F.I., Jain, A.K.: Automatic image orientation detection. IEEE Trans. Image Process 11, 746\u2013755 (2002)","journal-title":"IEEE Trans. Image Process"},{"issue":"6","key":"7_CR71","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1177\/0735633121992516","volume":"59","author":"BW Weaver","year":"2021","unstructured":"Weaver, B.W., Braly, A.M., Lane, D.M.: Training users to identify phishing emails. J. Educ. Comput. Res. 59(6), 1169\u20131183 (2021)","journal-title":"J. Educ. Comput. Res."},{"key":"7_CR72","first-page":"2427","volume":"11","author":"F Wei","year":"2019","unstructured":"Wei, F., Wan, Z., He, H.: Cyber-attack recovery strategy for smart grid based on deep reinforcement learning. IEEE Transactions on Smart Grid 11, 2427\u20132439 (2019)","journal-title":"IEEE Transactions on Smart Grid"},{"key":"7_CR73","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.cherd.2020.04.018","volume":"159","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Chen, S., Rincon, D., Christofides, P.D.: Post cyber-attack state reconstruction for nonlinear processes using machine learning. Chem. Eng. Res. Des. 159, 248\u2013261 (2020)","journal-title":"Chem. Eng. Res. Des."},{"key":"7_CR74","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H., Wang, C.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018)","journal-title":"IEEE Access"},{"key":"7_CR75","doi-asserted-by":"crossref","unstructured":"Ye, C., Li, Y., He, B., Li, Z., Sun, J.: Gpu-accelerated graph label propagation for real-time fraud detection. In: International Conference on Management of Data (2021)","DOI":"10.1145\/3448016.3452774"},{"key":"7_CR76","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.3390\/app9102010","volume":"9","author":"N Yu","year":"2019","unstructured":"Yu, N., Darling, K.: A low-cost approach to crack python captchas using AI-based chosen-plaintext attack. Applied Sciences 9, 2010\u20138574 (2019)","journal-title":"Applied Sciences"},{"key":"7_CR77","unstructured":"Yu, S.: Cyber defense matrix. https:\/\/cyberdefensematrix.com\/"},{"key":"7_CR78","doi-asserted-by":"crossref","unstructured":"Yulianto, A., Sukarno, P., Suwastika, N.A.: Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset. In: Journal of Physics: Conference Series. IOP Publishing, Bristol (2019)","DOI":"10.1088\/1742-6596\/1192\/1\/012018"},{"key":"7_CR79","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Xiao, X., Mercaldo, F., Ni, S., Martinelli, F., Sangaiah, A.K.: Classification of ransomware families with machine learning based on n-gram of opcodes. Future Generation Computer Systems 90, 211\u2013221 (2019)","journal-title":"Future Generation Computer Systems"},{"key":"7_CR80","unstructured":"Zhang, J.: MLPdf: an effective machine learning based approach for PDF malware detection (2018). https:\/\/arxiv.org\/abs\/1808.06991"},{"key":"7_CR81","unstructured":"Zhang, L., Li, M., Zhang, H.J.: Boosting image orientation detection with indoor vs. outdoor classification. In: 6th IEEE Workshop on Applications of Computer Vision. IEEE (2002)"},{"key":"7_CR82","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks (2019). https:\/\/arxiv.org\/abs\/1909.03496"}],"container-title":["Artificial Intelligence and Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15030-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T10:09:52Z","timestamp":1670407792000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15030-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"ISBN":["9783031150296","9783031150302"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15030-2_7","relation":{},"subject":[],"published":{"date-parts":[[2022,8,1]]},"assertion":[{"value":"1 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}