{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:54:33Z","timestamp":1762509273149,"version":"3.40.4"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877773","type":"print"},{"value":"9783031877780","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87778-0_2","type":"book-chapter","created":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T16:21:55Z","timestamp":1744734115000},"page":"10-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation of\u00a0Selected Few-Shot Learning Methods in\u00a0Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Eryk","family":"Winiecki","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"given":"Aleksandra","family":"Pawlicka","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,16]]},"reference":[{"key":"2_CR1","unstructured":"What is few-shot learning? https:\/\/www.ibm.com\/topics\/few-shot-learning"},{"key":"2_CR2","unstructured":"Almseidin, M., Alzubi, M., Kovacs, S., Alkasassbeh, M.: Evaluation of machine learning algorithms for intrusion detection system (2018). http:\/\/arxiv.org\/abs\/1801.02330"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"2_CR4","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey (2019). http:\/\/arxiv.org\/abs\/1901.03407"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/jair.953. https:\/\/www.jair.org\/index.php\/jair\/article\/view\/10302","DOI":"10.1613\/jair.953"},{"key":"2_CR6","unstructured":"Ch\u0229ci\u0144ski, W.: Kompendium wiedzy - IDS i IPS. White Hats (2020)"},{"key":"2_CR7","series-title":"AISC","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-33018-6_18","volume-title":"International Joint Conference CISIS\u201912-ICEUTE$$^\\prime $$12-SOCO$$^\\prime $$ 12 Special Sessions","author":"M Chora\u015b","year":"2013","unstructured":"Chora\u015b, M., Kozik, R., Puchalski, D., Ho\u0142ubowicz, W.: Correlation approach for SQL injection attacks detection. In: Herrero, \u00c1., et al. (eds.) International Joint Conference CISIS\u201912-ICEUTE$$^\\prime $$12-SOCO$$^\\prime $$ 12 Special Sessions. AISC, vol. 189, pp. 177\u2013185. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-33018-6_18"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 13(1), 21\u201327 (1967). https:\/\/doi.org\/10.1109\/TIT.1967.1053964. http:\/\/ieeexplore.ieee.org\/document\/1053964\/","DOI":"10.1109\/TIT.1967.1053964"},{"key":"2_CR9","unstructured":"CreativeComp: Systemy wykrywania i zapobiegania w\u0142amaniom (IDS\/IPS). CreativeComp (2024). https:\/\/ccit.pl\/systemy-wykrywania-i-zapobiegania-wlamaniom-ids-ips\/"},{"key":"2_CR10","unstructured":"Drynko, A.: Raport Digital 2024 Global Overview: Jaki by\u0142 2023 rok w Internecie i mediach spo\u0142eczno\u015bciowych. Nowy Marketing (2024). https:\/\/nowymarketing.pl\/raport-digital-2024-global-overview-jaki-byl-2023-rok-w-internecie-i-mediach-spolecznosciowych\/"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29(5) (2001). https:\/\/doi.org\/10.1214\/aos\/1013203451. https:\/\/projecteuclid.org\/journals\/annals-of-statistics\/volume-29\/issue-5\/Greedy-function-approximation-A-gradient-boosting-machine\/10.1214\/aos\/1013203451.full","DOI":"10.1214\/aos\/1013203451"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Iliyasu, A.S., Abdurrahman, U.A., Zheng, L.: Few-shot network intrusion detection using discriminative representation learning with supervised autoencoder. Appl. Sci. 12(5) (2022). https:\/\/doi.org\/10.3390\/app12052351. https:\/\/www.mdpi.com\/2076-3417\/12\/5\/2351","DOI":"10.3390\/app12052351"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Lu, Y., Yu, F., Reddy, M.K.K., Wang, Y.: Few-shot scene-adaptive anomaly detection (2020). http:\/\/arxiv.org\/abs\/2007.07843","DOI":"10.1007\/978-3-030-58558-7_8"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Mihailescu, M.E., et al.: The proposition and evaluation of the RoEduNet-SIMARGL2021 network intrusion detection dataset. Sensors 21(13), 4319 (2021). https:\/\/doi.org\/10.3390\/s21134319. https:\/\/www.mdpi.com\/1424-8220\/21\/13\/4319","DOI":"10.3390\/s21134319"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Nguyen, G., et al.: Machine Learning and Deep Learning frameworks and libraries for large-scale data mining: a survey. Artif. Intell. Rev. 52(1), 77\u2013124 (2019). https:\/\/doi.org\/10.1007\/s10462-018-09679-z. http:\/\/link.springer.com\/10.1007\/s10462-018-09679-z","DOI":"10.1007\/s10462-018-09679-z"},{"key":"2_CR16","unstructured":"OWASP: OWASP Top Ten 2025. OWASP (2024). https:\/\/owasp.org\/www-project-top-ten\/"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Pawlicki, M., Kozik, R., Chora\u015b, M.: Towards deployment shift inhibition through transfer learning in network intrusion detection. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp.\u00a01\u20136. ACM, New York (2022). https:\/\/doi.org\/10.1145\/3538969.3544428. https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544428","DOI":"10.1145\/3538969.3544428"},{"key":"2_CR18","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Rayavarapu, S.M., Prasanthi, T.S., Rao, G.S., Kumar, G.S.: Generative adversarial networks for anomaly detection in cyber security: a review. In: 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 662\u2013666. IEEE (2023). https:\/\/doi.org\/10.1109\/ICESC57686.2023.10193331. https:\/\/ieeexplore.ieee.org\/document\/10193331\/","DOI":"10.1109\/ICESC57686.2023.10193331"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Rocco, I., Arandjelovi\u0107, R., Sivic, J.: Convolutional neural network architecture for geometric matching (2017). https:\/\/arxiv.org\/abs\/1703.05593","DOI":"10.1109\/CVPR.2017.12"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Habibi Lashkari, A., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp. 108\u2013116. SCITEPRESS - Science and Technology Publications (2018). https:\/\/doi.org\/10.5220\/0006639801080116. http:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/ 0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Strickland, C., et al.: DRL-GAN: a hybrid approach for binary and multiclass network intrusion detection. Sensors 24(9), 2746 (2024). https:\/\/doi.org\/10.3390\/s24092746. https:\/\/www.mdpi.com\/1424-8220\/24\/9\/2746","DOI":"10.3390\/s24092746"},{"key":"2_CR23","unstructured":"Vinyals, O., Blundell, C., Lillicrap, T., koray Kavukcuoglu, Wierstra, D.: Matching networks for one shot learning. In: Lee, D., Sugiyama, M., Luxburg, U., Guyon, I., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol.\u00a029. Curran Associates, Inc. (2016). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2016\/file\/ 90e1357833654983612fb05e3ec9148c-Paper.pdf"},{"key":"2_CR24","unstructured":"Vinyals, O., Blundell, C., Lillicrap, T., Kavukcuoglu, K., Wierstra, D.: Matching networks for one shot learning. In: Advances in Neural Information Processing Systems, vol.\u00a029, pp. 3630\u20133638 (2016)"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Wang, Y., Jiang, Y., Lan, J.: Intrusion detection using few-shot learning based on triplet graph convolutional network. J. Web Eng. (2021). https:\/\/doi.org\/10.13052\/jwe1540-9589.2059. https:\/\/journals.riverpublishers.com\/index.php\/JWE\/article\/view\/6947","DOI":"10.13052\/jwe1540-9589.2059"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Wu, P., Guo, H., Buckland, R.: A Transfer learning approach for network intrusion detection. In: 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), pp. 281\u2013285. IEEE (2019). https:\/\/doi.org\/10.1109\/ICBDA.2019.8713213. https:\/\/ieeexplore.ieee.org\/document\/8713213\/","DOI":"10.1109\/ICBDA.2019.8713213"},{"key":"2_CR27","doi-asserted-by":"publisher","unstructured":"Yi, T., Chen, X., Yang, M., Li, Q., Zhu, Y.: NFHP-RN: a method of few-shot network attack detection based on the network flow holographic picture-ResNet. Comput. Model. Eng. Sci. 140(1), 929\u2013955 (2024). https:\/\/doi.org\/10.32604\/cmes.2024.048793. https:\/\/www.techscience.com\/CMES\/v140n1\/56216","DOI":"10.32604\/cmes.2024.048793"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87778-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T16:22:00Z","timestamp":1744734120000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87778-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877773","9783031877780"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87778-0_2","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}