{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:43Z","timestamp":1742914123027,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031416293"},{"type":"electronic","value":"9783031416309"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-41630-9_5","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T10:01:54Z","timestamp":1701338514000},"page":"45-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Interpreting Intrusions - The Role of\u00a0Explainability in\u00a0AI-Based Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[]},{"given":"Aleksandra","family":"Pawlicka","sequence":"additional","affiliation":[]},{"given":"M\u015bcis\u0142aw","family":"\u015arutek","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"5_CR1","unstructured":"Abadi, M., et\u00a0al.: Tensorflow: a system for large-scale machine learning. In: 12th $$\\{$$USENIX$$\\}$$ Symposium on Operating Systems Design and Implementation ($$\\{$$OSDI$$\\}$$ 2016), pp. 265\u2013283 (2016)"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"93575","DOI":"10.1109\/ACCESS.2022.3204171","volume":"10","author":"N Capuano","year":"2022","unstructured":"Capuano, N., Fenza, G., Loia, V., Stanzione, C.: Explainable artificial intelligence in cybersecurity: a survey. IEEE Access 10, 93575\u201393600 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3204171","journal-title":"IEEE Access"},{"key":"5_CR3","unstructured":"Doshi-Velez, F., Kim, B.: Towards a rigorous science of interpretable machine learning (2017). http:\/\/arxiv.org\/abs\/1702.08608"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Gunning, D., Stefik, M., Choi, J., Miller, T., Stumpf, S., Yang, G.Z.: XAI-Explainable artificial intelligence. Sci. Rob. 4(37) (2019). https:\/\/doi.org\/10.1126\/scirobotics.aay7120","DOI":"10.1126\/scirobotics.aay7120"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Gurumoorthy, K.S., Dhurandhar, A., Cecchi, G., Aggarwal, C.: Efficient data representation by selecting prototypes with importance weights. In: 2019 IEEE International Conference on Data Mining (ICDM), pp. 260\u2013269. IEEE (2019)","DOI":"10.1109\/ICDM.2019.00036"},{"issue":"1","key":"5_CR6","first-page":"6765","volume":"18","author":"L Li","year":"2017","unstructured":"Li, L., Jamieson, K., DeSalvo, G., Rostamizadeh, A., Talwalkar, A.: Hyperband: a novel bandit-based approach to hyperparameter optimization. J. Mach. Learn. Res. 18(1), 6765\u20136816 (2017)","journal-title":"J. Mach. Learn. Res."},{"key":"5_CR7","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In:\u00a0Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol.\u00a030. Curran Associates, Inc. (2017). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/8a20a8621978632d76c43dfd28b67767-Paper.pdf"},{"key":"5_CR8","unstructured":"Molnar, C.: Interpretable Machine Learning (Second Edition) A Guide for Making Black Box Models Explainable. Leanpub (2022). https:\/\/leanpub.com\/interpretable-machine-learning"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Mothilal, R.K., Sharma, A., Tan, C.: Explaining machine learning classifiers through diverse counterfactual explanations. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, pp. 607\u2013617 (2020)","DOI":"10.1145\/3351095.3372850"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Nwakanma, C.I., et al.: Explainable Artificial Intelligence (XAI) for intrusion detection and mitigation in intelligent connected vehicles: a review. Appl. Sci. 13(3), 1252 (2023). https:\/\/doi.org\/10.3390\/app13031252","DOI":"10.3390\/app13031252"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/j.neucom.2022.06.002","volume":"500","author":"M Pawlicki","year":"2022","unstructured":"Pawlicki, M., Kozik, R., Chora\u015b, M.: A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Neurocomputing 500, 1075\u20131087 (2022). https:\/\/doi.org\/10.1016\/j.neucom.2022.06.002","journal-title":"Neurocomputing"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Ribeiro, M., Singh, S., Guestrin, C.: Why should i trust you?: explaining the predictions of any classifier. In: 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Demonstrations, San Diego (2016)","DOI":"10.18653\/v1\/N16-3020"},{"key":"5_CR13","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-72802-1_9","volume-title":"Big Data Technologies and Applications","author":"M Sarhan","year":"2021","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: NetFlow datasets for machine learning-based network intrusion detection systems. In: Deze, Z., Huang, H., Hou, R., Rho, S., Chilamkurti, N. (eds.) BDTA\/WiCON -2020. LNICST, vol. 371, pp. 117\u2013135. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72802-1_9"},{"key":"5_CR14","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"5_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108356","volume":"103","author":"DK Sharma","year":"2022","unstructured":"Sharma, D.K., Mishra, J., Singh, A., Govil, R., Srivastava, G., Lin, J.C.W.: Explainable artificial intelligence for cybersecurity. Comput. Electr. Eng. 103, 108356 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108356","journal-title":"Comput. Electr. Eng."},{"issue":"12","key":"5_CR16","doi-asserted-by":"publisher","first-page":"12305","DOI":"10.1002\/int.23088","volume":"37","author":"F Yan","year":"2022","unstructured":"Yan, F., Wen, S., Nepal, S., Paris, C., Xiang, Y.: Explainable machine learning in cybersecurity: a survey. Int. J. Intell. Syst. 37(12), 12305\u201312334 (2022). https:\/\/doi.org\/10.1002\/int.23088","journal-title":"Int. J. Intell. Syst."}],"container-title":["Lecture Notes in Networks and Systems","Progress on Pattern Classification, Image Processing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-41630-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T10:02:53Z","timestamp":1701338573000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-41630-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031416293","9783031416309"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-41630-9_5","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IP&C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image Processing and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icipc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}