{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:51:54Z","timestamp":1743097914220,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031535543"},{"type":"electronic","value":"9783031535550"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53555-0_13","type":"book-chapter","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:02:10Z","timestamp":1707800530000},"page":"130-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Innovative Approach to\u00a0Real-Time Concept Drift Detection in\u00a0Network Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9243-7047","authenticated-orcid":false,"given":"Federica","family":"Uccello","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9327-0138","authenticated-orcid":false,"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"13_CR1","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-319-26989-4_4","volume-title":"Big Data Analysis: New Algorithms for a New Society","author":"I \u017dliobait\u0117","year":"2016","unstructured":"\u017dliobait\u0117, I., Pechenizkiy, M., Gama, J.: An overview of concept drift applications. In: Japkowicz, N., Stefanowski, J. (eds.) Big Data Analysis: New Algorithms for a New Society. SBD, vol. 16, pp. 91\u2013114. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-26989-4_4"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"108239","DOI":"10.1016\/j.compeleceng.2022.108239","volume":"102","author":"A Kuppa","year":"2022","unstructured":"Kuppa, A., Le-Khac, N.-A.: Learn to adapt: robust drift detection in security domain. Comput. Electr. Eng. 102, 108239 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"13_CR3","unstructured":"Mendes, C., Rios, T.N.: Explainable artificial intelligence and cybersecurity: a systematic literature review. arXiv:2303.01259 (2023)"},{"issue":"1","key":"13_CR4","first-page":"299","volume":"14","author":"NS Salman","year":"2023","unstructured":"Salman, N.S., Abdulrahman, A.A.: Survey on intrusion detection system based on analysis concept drift: status and future directions. Int. J. Nonlinear Anal. Appl. 14(1), 299\u2013307 (2023)","journal-title":"Int. J. Nonlinear Anal. Appl."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Coppolino, L., et al.: Detection of radio frequency interference in satellite ground segments. In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), pp.\u00a0648\u2013653. IEEE (2023)","DOI":"10.1109\/CSR57506.2023.10225005"},{"issue":"6","key":"13_CR6","doi-asserted-by":"publisher","first-page":"3692","DOI":"10.1109\/TII.2021.3108464","volume":"18","author":"H Qiao","year":"2022","unstructured":"Qiao, H., Novikov, B., Blech, J.O.: Concept drift analysis by dynamic residual projection for effectively detecting botnet cyber-attacks in IoT scenarios. IEEE Trans. Ind. Inf. 18(6), 3692\u20133701 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"2","key":"13_CR7","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/IOTM.0001.2100012","volume":"4","author":"L Yang","year":"2021","unstructured":"Yang, L., Shami, A.: A lightweight concept drift detection and adaptation framework for IoT data streams. IEEE Internet Things Mag. 4(2), 96\u2013101 (2021)","journal-title":"IEEE Internet Things Mag."},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"108702","DOI":"10.1016\/j.compeleceng.2023.108702","volume":"108","author":"M Amin","year":"2023","unstructured":"Amin, M., Al-Obeidat, F., Tubaishat, A., Shah, B., Anwar, S., Tanveer, T.A.: Cyber security and beyond: detecting malware and concept drift in AI-based sensor data streams using statistical techniques. Comput. Electr. Eng. 108, 108702 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"105947","DOI":"10.1016\/j.ijepes.2020.105947","volume":"119","author":"M Mohammadpourfard","year":"2020","unstructured":"Mohammadpourfard, M., Weng, Y., Pechenizkiy, M., Tajdinian, M., Mohammadi-Ivatloo, B.: Ensuring cybersecurity of smart grid against data integrity attacks under concept drift. Int. J. Elect. Power Energy Syst. 119, 105947 (2020)","journal-title":"Int. J. Elect. Power Energy Syst."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Wang, X.: ENIDrift: a fast and adaptive ensemble system for network intrusion detection under real-world drift. In: Proceedings of the 38th Annual Computer Security Applications Conference, pp. 785\u2013798 (2022)","DOI":"10.1145\/3564625.3567992"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Rajeswari, P.V.N., Shashi, M., Rao, T.K., Rajya\u00a0Lakshmi, M., Kiran, L.V.: Effective intrusion detection system using concept drifting data stream and support vector machine. Concurrency Comput. Pract. Experience. 34(21), e7118 (2022)","DOI":"10.1002\/cpe.7118"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Rajeswari, P., Shashi, M.: Concept-drift based identification of suspicious activity at specific IP addresses using machine learning. Int. J. Recent Technol. Eng. 8(3), 6651\u20136655 (2019)","DOI":"10.35940\/ijrte.C5699.098319"},{"key":"13_CR13","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"issue":"1\/2","key":"13_CR14","doi-asserted-by":"publisher","first-page":"100","DOI":"10.2307\/2333009","volume":"41","author":"ES Page","year":"1954","unstructured":"Page, E.S.: Continuous inspection schemes. Biometrika 41(1\/2), 100\u2013115 (1954)","journal-title":"Biometrika"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Bifet, A., Gavalda, R.: Learning from time-changing data with adaptive windowing. In: Proceedings of the 2007 SIAM International Conference on Data Mining, pp.\u00a0443\u2013448. SIAM (2007)","DOI":"10.1137\/1.9781611972771.42"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53555-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:06:54Z","timestamp":1707800814000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53555-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535543","9783031535550"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53555-0_13","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}