{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T13:38:11Z","timestamp":1768916291439,"version":"3.49.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031652226","type":"print"},{"value":"9783031652233","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-65223-3_7","type":"book-chapter","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T07:02:22Z","timestamp":1722322942000},"page":"100-112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparative Analysis of\u00a0AI-Based Methods for\u00a0Enhancing Cybersecurity Monitoring Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9243-7047","authenticated-orcid":false,"given":"Federica","family":"Uccello","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9327-0138","authenticated-orcid":false,"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"issue":"5","key":"7_CR1","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s00779-021-01568-7","volume":"25","author":"A Pawlicka","year":"2021","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M.: The stray sheep of cyberspace aka the actors who claim they break the law for the greater good. Pers. Ubiquit. Comput. 25(5), 843\u2013852 (2021)","journal-title":"Pers. Ubiquit. Comput."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Kozik, R., Chora\u015b, M.: Current cyber security threats and challenges in critical infrastructures protection. In: 2013 Second International Conference on Informatics & Applications (ICIA), pp.\u00a093\u201397 (2013)","DOI":"10.1109\/ICoIA.2013.6650236"},{"key":"7_CR3","unstructured":"E.\u00a0Commission, A european strategy for data.\u2019 https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/strategy-data"},{"issue":"2","key":"7_CR4","doi-asserted-by":"crossref","first-page":"55","DOI":"10.47831\/mjpas.v1i2.33","volume":"1","author":"Z Younus","year":"2023","unstructured":"Younus, Z., Alanezi, M.: A survey on network security monitoring: tools and functionalities. Mustansiriyah J. Pure Appli. Sci. 1(2), 55\u201386 (2023)","journal-title":"Mustansiriyah J. Pure Appli. Sci."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Pawlicki, M., Pawlicka, A., Kozik, R., Chora\u015b, M.: The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the cloud, edge and iot.Neurocomputing, 126533 (2023)","DOI":"10.1016\/j.neucom.2023.126533"},{"issue":"5","key":"7_CR6","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/JAS.2022.105548","volume":"9","author":"W Duo","year":"2022","unstructured":"Duo, W., Zhou, M., Abusorrah, A.: A survey of cyber attacks on cyber physical systems: recent advances and challenges. IEEE\/CAA J. Automatica Sinica 9(5), 784\u2013800 (2022)","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","volume":"7","author":"Y Li","year":"2021","unstructured":"Li, Y., Liu, Q.: A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Rep. 7, 8176\u20138186 (2021)","journal-title":"Energy Rep."},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"2037254","DOI":"10.1080\/08839514.2022.2037254","volume":"36","author":"B Guembe","year":"2022","unstructured":"Guembe, B., Azeta, A., Misra, S., Osamor, V.C., Fernandez-Sanz, L., Pospelova, V.: The emerging threat of ai-driven cyber attacks: a review. Appl. Artif. Intell. 36(1), 2037254 (2022)","journal-title":"Appl. Artif. Intell."},{"key":"7_CR9","unstructured":"Zhang, Z., et al.: Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artifi. Intell. Rev., 1\u201325 (2022)"},{"issue":"11","key":"7_CR10","doi-asserted-by":"publisher","first-page":"6610","DOI":"10.3390\/app13116610","volume":"13","author":"T Ban","year":"2023","unstructured":"Ban, T., Takahashi, T., Ndichu, S., Inoue, D.: Breaking alert fatigue: Ai-assisted siem framework for effective incident response. Appl. Sci. 13(11), 6610 (2023)","journal-title":"Appl. Sci."},{"issue":"2","key":"7_CR11","first-page":"2023","volume":"18","author":"P Radoglou-Grammatikis","year":"2023","unstructured":"Radoglou-Grammatikis, P.: Securecyber: an sdn-enabled siem for enhanced cybersecurity in the industrial internet of things. IEEE COMSOC MMTC Commun. - Front. 18(2), 2023 (2023)","journal-title":"IEEE COMSOC MMTC Commun. - Front."},{"issue":"6","key":"7_CR12","first-page":"6768","volume":"12","author":"H Alturkistani","year":"2022","unstructured":"Alturkistani, H., El-Affendi, M.A.: Optimizing cybersecurity incident response decisions using deep reinforcement learning. Inter. J. Electr. Comput. Eng. 12(6), 6768 (2022)","journal-title":"Inter. J. Electr. Comput. Eng."},{"key":"7_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102435","volume":"110","author":"S Al","year":"2021","unstructured":"Al, S., Dener, M.: Stl-hdl: a new hybrid network intrusion detection system for imbalanced dataset on big data environment. Comput. Sec. 110, 102435 (2021)","journal-title":"Comput. Sec."},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.future.2022.02.011","volume":"132","author":"T Kim","year":"2022","unstructured":"Kim, T., Pak, W.: Real-time network intrusion detection using deferred decision and hybrid classifier. Futur. Gener. Comput. Syst. 132, 51\u201366 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"04","key":"7_CR15","doi-asserted-by":"publisher","first-page":"190","DOI":"10.36548\/jismac.2020.4.002","volume":"2","author":"S Smys","year":"2020","unstructured":"Smys, S., Basar, A., Wang, H., et al.: Hybrid intrusion detection system for internet of things (iot). J. ISMAC 2(04), 190\u2013199 (2020)","journal-title":"J. ISMAC"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Narayana Rao, K., Venkata Rao, K., Prasad Reddy, P.V.G.D.: A hybrid intrusion detection system based on sparse autoencoder and deep neural network. Computer Commun. 180, 77\u201388 (2021)","DOI":"10.1016\/j.comcom.2021.08.026"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"10754","DOI":"10.1109\/ACCESS.2022.3145002","volume":"10","author":"T Kim","year":"2022","unstructured":"Kim, T., Pak, W.: Robust network intrusion detection system based on machine-learning with early classification. IEEE Access 10, 10754\u201310767 (2022)","journal-title":"IEEE Access"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Subach, I., Mykytiuk, A.: Methodology of formation of fuzzy associative rules with weighted attributes from siem database for detection of cyber incidents in special information and communication systems. Inform. Technol. Sec. 11(1), 20 (2023)","DOI":"10.20535\/2411-1031.2023.11.1.283575"},{"issue":"4","key":"7_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3386250","volume":"11","author":"M Hus\u00e1k","year":"2020","unstructured":"Hus\u00e1k, M., Bajto\u0161, T., Ka\u0161par, J., Bou-Harb, E., \u010celeda, P.: Predictive cyber situational awareness and personalized blacklisting: a sequential rule mining approach. ACM Trans. Manag. Inform. Syst. (TMIS) 11(4), 1\u201316 (2020)","journal-title":"ACM Trans. Manag. Inform. Syst. (TMIS)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Sivanantham, S., Mohanraj, V., Suresh, Y., Senthilkumar, J.: Association rule mining frequent-pattern-based intrusion detection in network. Comput. Syst. Sci. Eng. 44(2) (2023)","DOI":"10.32604\/csse.2023.025893"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"4043","DOI":"10.1007\/s10489-020-02007-5","volume":"51","author":"P Lou","year":"2021","unstructured":"Lou, P., Lu, G., Jiang, X., Xiao, Z., Hu, J., Yan, J.: Cyber intrusion detection through association rule mining on multi-source logs. Appl. Intell. 51, 4043\u20134057 (2021)","journal-title":"Appl. Intell."},{"issue":"19","key":"7_CR22","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.3390\/electronics11193079","volume":"11","author":"S Patil","year":"2022","unstructured":"Patil, S., et al.: Explainable artificial intelligence for intrusion detection system. Electronics 11(19), 3079 (2022)","journal-title":"Electronics"},{"key":"7_CR23","unstructured":"Zhou, Q., Li, R., Xu, L., Nallanathan, A., Yang, J., Fu, A.: Towards explainable meta-learning for ddos detection,\u2019 arXiv preprint arXiv:2204.02255(2022)"},{"key":"7_CR24","first-page":"1","volume":"2021","author":"B Mahbooba","year":"2021","unstructured":"Mahbooba, B., Timilsina, M., Sahal, R., Serrano, M.: Explainable artificial intelligence (xai) to enhance trust management in intrusion detection systems using decision tree model. Complexity 2021, 1\u201311 (2021)","journal-title":"Complexity"},{"key":"7_CR25","unstructured":"Karna, S.K., Paudel, P., Saud, R., Bhandari, M.: Explainable prediction of features contributing to intrusion detection using ml algorithms and lime"},{"issue":"2","key":"7_CR26","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/computers12020032","volume":"12","author":"CS Kalutharage","year":"2023","unstructured":"Kalutharage, C.S., Liu, X., Chrysoulas, C., Pitropakis, N., Papadopoulos, P.: Explainable ai-based ddos attack identification method for iot networks. Computers 12(2), 32 (2023)","journal-title":"Computers"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Coppolino, L., et al.: Detection of radio frequency interference in satellite ground segments. In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), pp.\u00a0648\u2013653 (2023)","DOI":"10.1109\/CSR57506.2023.10225005"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Hegland, M.: The apriori algorithm\u2013a tutorial. Math. Comput. Imaging Sci. Inform. Process. 209\u2013262 (2007)","DOI":"10.1142\/9789812709066_0006"},{"key":"7_CR29","unstructured":"Bowen, D., Ungar, L.: Generalized shap: Generating multiple types of explanations in machine learning, arXiv preprint arXiv:2006.07155 (2020)"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Anchors: high-precision model-agnostic explanations. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a032 (2018)","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"7_CR31","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"7_CR32","unstructured":"Zolanvari, M., Teixeira, M.A., Gupta, L., Khan, K.M., Jain, R.: WUSTL-IIOT-2021 Dataset for IIoT Cybersecurity Research (October 2021). http:\/\/www.cse.wustl.edu\/~jain\/iiot2\/index.html"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-65223-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T01:43:47Z","timestamp":1732499027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-65223-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031652226","9783031652233"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-65223-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}