{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:07:38Z","timestamp":1767262058910,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031160714"},{"type":"electronic","value":"9783031160721"}],"license":[{"start":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T00:00:00Z","timestamp":1661904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T00:00:00Z","timestamp":1661904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-16072-1_36","type":"book-chapter","created":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T20:06:09Z","timestamp":1661889969000},"page":"493-504","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Trustworthy Artificial Intelligence for\u00a0Cyber Threat Analysis"],"prefix":"10.1007","author":[{"given":"Shuangbao Paul","family":"Wang","sequence":"first","affiliation":[]},{"given":"Paul A.","family":"Mullin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,31]]},"reference":[{"key":"36_CR1","unstructured":"Abdulraheem, M., Ibraheem, N.: A detailed analysis of new intrusion detection dataset. In: Semantic Scolar (2019)"},{"issue":"1","key":"36_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.26599\/BDMA.2019.9020016","volume":"3","author":"F Ablayev","year":"2020","unstructured":"Ablayev, F., Ablayev, M., Huang, J.Z., Khadiev, K., Salikhova, N., Dingming, W.: On quantum methods for machine learning problems part i: Quantum tools. Big Data Mining and Analytics 3(1), 41\u201355 (2020)","journal-title":"Big Data Mining and Analytics"},{"key":"36_CR3","unstructured":"Amazon. Aws, 3 (2022)"},{"key":"36_CR4","first-page":"543","volume":"5","author":"K Mohana","year":"2014","unstructured":"Mohana, K., Venugopal, V.K., Sathwik, H.N.: Data security using genetic algorithm and artificial neural network. Int. J. Sci. Eng. Res. 5, 543\u2013548 (2014)","journal-title":"Int. J. Sci. Eng. Res."},{"key":"36_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MIC.2021.3097604","volume":"25","author":"M Bernagozzi","year":"2021","unstructured":"Bernagozzi, M., Srivastava, B., Rossi, F., Usmani, S.: Gender bias in online language translators: visualization, human perception, and bias\/accuracy trade-offs. IEEE Internet Comput. 25, 53\u201363 (2021)","journal-title":"IEEE Internet Comput."},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Betarte, G., Pardo, A., Mart\u00ednez, R.: Web application attacks detection using machine learning techniques. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1065\u20131072 (2018)","DOI":"10.1109\/ICMLA.2018.00174"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Sagar, B.S., Niranjan, S., Kashyap, N., Sachin, D.N.: Providing cyber security using artificial intelligence - a survey. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), pp. 717\u2013720 (2019)","DOI":"10.1109\/ICCMC.2019.8819719"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Dilmaghani, S., Brust, M.R., Danoy, G., Cassagnes, N., Pecero, J., Bouvry, P.: Privacy and security of big data in AI systems: a research and standards perspective. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 5737\u20135743 (2019)","DOI":"10.1109\/BigData47090.2019.9006283"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Chen Ding, Tian-Yi Bao, and He-Liang Huang. Quantum-inspired support vector machine. IEEE Trans. Neural Networks Learn. Syst. 1\u201313 (2021)","DOI":"10.1109\/TNNLS.2021.3084467"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Edwards, D., Rawat, D.B.: Quantum adversarial machine learning: status, challenges and perspectives. In: 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 128\u2013133 (2020)","DOI":"10.1109\/TPS-ISA50397.2020.00026"},{"key":"36_CR11","unstructured":"Geron, A.: Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems, 2nd edn. O\u2019Reilly (2019)"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Gong, X., et al.: Estimating web attack detection via model uncertainty from inaccurate annotation. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 53\u201358 (2019)","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00019"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Gupta, S., Mohanta, S., Chakraborty, M., Ghosh, S.: Quantum machine learning-using quantum computation in artificial intelligence and deep neural networks: quantum computation and machine learning in artificial intelligence. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), pp. 268\u2013274 (2017)","DOI":"10.1109\/IEMECON.2017.8079602"},{"key":"36_CR14","first-page":"5893","volume":"2","author":"Swapnil Ramesh Kumbar","year":"2014","unstructured":"Swapnil Ramesh Kumbar: Int. J. Innov. Res. Comput. Commun. Eng. An overview on use of artificial intelligence techniques in effective security management 2, 5893\u20135898 (2014)","journal-title":"An overview on use of artificial intelligence techniques in effective security management"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Lohia, P.K., Natesan\u00a0Ramamurthy, K., Bhide, M., Saha, D., Varshney, K.R., Puri, R.: Bias mitigation post-processing for individual and group fairness. In: ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2847\u20132851 (2019)","DOI":"10.1109\/ICASSP.2019.8682620"},{"key":"36_CR16","unstructured":"Microsoft. Azure counterfeit, 3 (2022)"},{"key":"36_CR17","unstructured":"Mittu, R., Lawless, W.F.: Human factors in cybersecurity and the role for AI. In: 2015 AAAI Spring Symposium, pp. 39\u201343 (2015)"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Mohanty, J.P., Swain, A., Mahapatra, K.: Headway in quantum domain for machine learning towards improved artificial intelligence. In: 2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), pp. 145\u2013149 (2019)","DOI":"10.1109\/iSES47678.2019.00040"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Ngoc, H.L., Cong\u00a0Hung, T., Huy, N.D., Thanh\u00a0Hang, N.T.: Early phase warning solution about system security based on log analysis. In: 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), pp. 398\u2013403 (2019)","DOI":"10.1109\/NICS48868.2019.9023899"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Obaidat, M., Singh, N., Vergara, G.: Artificial intelligence bias minimization via random sampling technique of adversary data. In: 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1226\u20131230 (2021)","DOI":"10.1109\/CCWC51732.2021.9375929"},{"key":"36_CR21","first-page":"28","volume":"09","author":"HM Rajan","year":"2017","unstructured":"Rajan, H.M.: Artificial intelligence in cyber security-an investigation. Int. Res. J. Comput. Sci. 09, 28\u201330 (2017)","journal-title":"Int. Res. J. Comput. Sci."},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Su, T.-J., Wang, S.-M., Chen, Y.-F., Liu, C.-L.: Attack detection of distributed denial of service based on splunk. In: 2016 International Conference on Advanced Materials for Science and Engineering (ICAMSE), pp. 397\u2013400 (2016)","DOI":"10.1109\/ICAMSE.2016.7840355"},{"issue":"3","key":"36_CR23","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","volume":"16","author":"Z Tian","year":"2020","unstructured":"Tian, Z., Luo, C., Qiu, J., Xiaojiang, D., Guizani, M.: A distributed deep learning system for web attack detection on edge devices. IEEE Trans. Industr. Inf. 16(3), 1963\u20131971 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"16","key":"36_CR24","doi-asserted-by":"publisher","first-page":"2750","DOI":"10.1002\/sec.603","volume":"8","author":"C Torrano-Gimenez","year":"2015","unstructured":"Torrano-Gimenez, C., Nguyen, H.T., Alvarez, G., Franke, K.: Combining expert knowledge with automatic feature extraction for reliable web attack detection. Secur. Commun. Networks 8(16), 2750\u20132767 (2015)","journal-title":"Secur. Commun. Networks"},{"key":"36_CR25","first-page":"157","volume":"3","author":"P Wang","year":"2015","unstructured":"Wang, P., Kelly, W.: A novel threat analysis and risk mitigation approach to prevent cyber intrusions. Colloquium Inf. Syst. Secu. Educ. (CISSE) 3, 157\u2013174 (2015)","journal-title":"Colloquium Inf. Syst. Secu. Educ. (CISSE)"},{"key":"36_CR26","doi-asserted-by":"crossref","unstructured":"Wang, S., Kelly, W.: inVideo - a novel big data analytics tool for video data analytics. In: IEEE\/NIST IT Pro Conference, pp. 1\u201319 (2014)","DOI":"10.1109\/ITPRO.2014.7029303"},{"key":"36_CR27","volume-title":"Computer Architecture and Organization - Fundamentals and Architecture Security","author":"SP Wang","year":"2021","unstructured":"Wang, S.P.: Computer Architecture and Organization - Fundamentals and Architecture Security, 1st edn. Springer, Singapor (2021)","edition":"1"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Wang, S.P., Sakk, E.: Quantum algorithms: overviews, foundations, and speedups. In: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), pp. 17\u201321 (2021)","DOI":"10.1109\/CSP51677.2021.9357505"},{"key":"36_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, D.Y., Kou, Z., Wang, D.: Fairfl: a fair federated learning approach to reducing demographic bias in privacy-sensitive classification models. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 1051\u20131060 (2020)","DOI":"10.1109\/BigData50022.2020.9378043"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16072-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T20:06:43Z","timestamp":1661890003000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16072-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,31]]},"ISBN":["9783031160714","9783031160721"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16072-1_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,8,31]]},"assertion":[{"value":"31 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}