{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T05:40:04Z","timestamp":1751780404871,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031975530"},{"type":"electronic","value":"9783031975547"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97554-7_4","type":"book-chapter","created":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T04:59:58Z","timestamp":1751777998000},"page":"44-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Decision Trees and\u00a0Machine Learning for\u00a0Cybersecurity: How Model Settings Affect Attack Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2463-9338","authenticated-orcid":false,"given":"Konrad","family":"Lukiewicz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1080-6767","authenticated-orcid":false,"given":"Michal","family":"Podpora","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7963-8602","authenticated-orcid":false,"given":"Grzegorz","family":"Dralus","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3247-5903","authenticated-orcid":false,"given":"Damian","family":"Mazur","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Dralus","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8417-1012","authenticated-orcid":false,"given":"Tomasz","family":"Kajdanowicz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7826-1292","authenticated-orcid":false,"given":"Aleksandra","family":"Kawala-Sterniuk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, R., et al.: A novel approach for spam detection using natural language processing with amals models. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3391023"},{"key":"4_CR2","unstructured":"Akhi, A.B., Kanon, E.J., Kabir, A., Banu, A.: Network intrusion classification employing machine learning: a survey. Ph.D. thesis (2019)"},{"issue":"3","key":"4_CR3","first-page":"315","volume":"13","author":"M Bassiouni","year":"2018","unstructured":"Bassiouni, M., Ali, M., El-Dahshan, E.: Ham and spam e-mails classification using machine learning techniques. J. Appl. Sec. Res. 13(3), 315\u2013331 (2018)","journal-title":"J. Appl. Sec. Res."},{"key":"4_CR4","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407 (2019)"},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TCSS.2016.2516039","volume":"2","author":"C Chen","year":"2015","unstructured":"Chen, C., et al.: A performance evaluation of machine learning-based streaming spam tweets detection. IEEE Trans. Comput. Social Syst. 2(3), 65\u201376 (2015)","journal-title":"IEEE Trans. Comput. Social Syst."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Das, L., Ahuja, L., Pandey, A.: Analysis of twitter spam detection using machine learning approach. In: 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), pp. 764\u2013769. IEEE (2022)","DOI":"10.1109\/ICIEM54221.2022.9853100"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.compeleceng.2019.01.004","volume":"74","author":"M Diale","year":"2019","unstructured":"Diale, M., Celik, T., Van Der Walt, C.: Unsupervised feature learning for spam email filtering. Comput. Electr. Eng. 74, 89\u2013104 (2019)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.eswa.2014.08.002","volume":"42","author":"S Elhag","year":"2015","unstructured":"Elhag, S., et al.: On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst. Appl. 42(1), 193\u2013202 (2015)","journal-title":"Expert Syst. Appl."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Etaiwi, W., Awajan, A.: The effects of features selection methods on spam review detection performance. In: 2017 International Conference on New Trends in Computing Sciences (ICTCS), pp. 116\u2013120. IEEE (2017)","DOI":"10.1109\/ICTCS.2017.50"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Garc\u00eda, S., Luengo, J., Herrera, F., et\u00a0al.: Data preprocessing in data mining, vol.\u00a072. Springer (2015)","DOI":"10.1007\/978-3-319-10247-4"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Gharaee, H., Hosseinvand, H.: A new feature selection ids based on genetic algorithm and svm. In: 2016 8th International Symposium on Telecommunications (IST), pp. 139\u2013144. IEEE (2016)","DOI":"10.1109\/ISTEL.2016.7881798"},{"issue":"28","key":"4_CR12","doi-asserted-by":"publisher","first-page":"35217","DOI":"10.1007\/s11042-020-10047-9","volume":"80","author":"V Jain","year":"2021","unstructured":"Jain, V., Phophalia, A.: M-ary random forest-a new multidimensional partitioning approach to random forest. Multimed. Tools Appl. 80(28), 35217\u201335238 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"4_CR13","unstructured":"Kaur, D., Bedi, R., Gupta, S.K., et\u00a0al.: Review of decision tree data mining algorithms: Id3 and c4. 5. In: International Conference on Information Technology and Computer Science, pp.\u00a05\u20138 (2015)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Kirubai, J.C.D., Priscila, S.S.: MLP-based defense mechanisms against cyber crime: Insights from dataset-driven attack prevention strategies. In: 2024 International Conference on Data Science and Network Security (ICDSNS), pp. 01\u201306. IEEE (2024)","DOI":"10.1109\/ICDSNS62112.2024.10691068"},{"key":"4_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2025.125439","volume":"385","author":"Y Li","year":"2025","unstructured":"Li, Y., Chen, G., Dong, Z.: Multi-view graph contrastive representative learning for intrusion detection in EV charging station. Appl. Energy 385, 125439 (2025)","journal-title":"Appl. Energy"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","volume":"78","author":"WC Lin","year":"2015","unstructured":"Lin, W.C., et al.: CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowl.-Based Syst. 78, 13\u201321 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Deep learning approach for IDS: using DNN for network anomaly detection. In: 4th International Congress on Information and Communication Technology: ICICT, pp. 471\u2013479. Springer (2020)","DOI":"10.1007\/978-981-15-0637-6_40"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Machalewski, T., Szymanek, M., Czubak, A., Turba, T.: Expressing impact of vulnerabilities: An expert-filled dataset and vector changer framework for modelling multistage attacks, based on CVE, CVSS and CWE. In: ECMS 2024 Proceedings, pp. 569\u2013578 (2024). https:\/\/doi.org\/10.7148\/2024-0569. Accessed 20 Feb 2025","DOI":"10.7148\/2024-0569"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"13271","DOI":"10.1007\/s11042-020-10367-w","volume":"80","author":"A Mahindru","year":"2021","unstructured":"Mahindru, A., Sangal, A.L.: FSDroid:-a feature selection technique to detect malware from android using machine learning techniques. Multimed. Tools Appl. 80, 13271\u201313323 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"559\u2013569","key":"4_CR20","first-page":"4","volume":"10","author":"W Mining","year":"2006","unstructured":"Mining, W.: Data mining: concepts and techniques. Morgan Kaufinann 10(559\u2013569), 4 (2006)","journal-title":"Morgan Kaufinann"},{"issue":"1","key":"4_CR21","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2018","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutorials 21(1), 686\u2013728 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"4_CR22","first-page":"1","volume":"1","author":"H Najadat","year":"2014","unstructured":"Najadat, H., Abdulla, N., et al.: Mobile SMS spam filtering based on mixing classifiers. Int. J. Adv. Comput. Res. 1, 1\u20137 (2014)","journal-title":"Int. J. Adv. Comput. Res."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Ouarda, A.: Image thresholding using type-2 fuzzy c-partition entropy and particle swarm optimization algorithm. In: International Conference on Computer Vision and Image Analysis Applications, pp.\u00a01\u20137. IEEE (2015)","DOI":"10.1109\/ICCVIA.2015.7351880"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Rusland, N.F., Wahid, N., Kasim, S., Hafit, H.: Analysis of na\u00efve bayes algorithm for email spam filtering across multiple datasets. In: IOP Conference Series: Materials Science and Engineering, vol.\u00a0226, p. 012091. IOP Publishing (2017)","DOI":"10.1088\/1757-899X\/226\/1\/012091"},{"issue":"1","key":"4_CR25","doi-asserted-by":"publisher","first-page":"97","DOI":"10.3390\/electronics9010097","volume":"9","author":"R Sagar","year":"2020","unstructured":"Sagar, R., Jhaveri, R., Borrego, C.: Applications in security and evasions in machine learning: a survey. Electronics 9(1), 97 (2020)","journal-title":"Electronics"},{"issue":"2","key":"4_CR26","doi-asserted-by":"publisher","first-page":"203","DOI":"10.3390\/sym12020203","volume":"12","author":"M Sarnovsky","year":"2020","unstructured":"Sarnovsky, M., Paralic, J.: Hierarchical intrusion detection using machine learning and knowledge model. Symmetry 12(2), 203 (2020)","journal-title":"Symmetry"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Udurume, M., et\u00a0al.: Comparative evaluation of network-based intrusion detection: Deep learning vs traditional machine learning approach. In: 2024 15th International Conference on Ubiquitous and Future Networks (ICUFN), pp. 520\u2013525. IEEE (2024)","DOI":"10.1109\/ICUFN61752.2024.10625037"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Vielberth, M.: Security information and event management (siem). In: Encyclopedia of Cryptography, Security and Privacy, pp.\u00a01\u20133. Springer (2021)","DOI":"10.1007\/978-3-642-27739-9_1681-1"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Vineeth, G.V.S.S.K., et\u00a0al.: Email spam: a new strategy of screening spam emails using natural language processing. In: 2023 3rd International Conference on AI and Smart Energy (ICAIS), pp. 710\u2013715. IEEE (2023)","DOI":"10.1109\/ICAIS56108.2023.10073758"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Xu, H., Sun, W., Javaid, A.: Efficient spam detection across online social networks. In: 2016 IEEE International Conference on Big Data Analysis (ICBDA), pp.\u00a01\u20136. IEEE (2016)","DOI":"10.1109\/ICBDA.2016.7509829"},{"issue":"2","key":"4_CR31","first-page":"269","volume":"10","author":"AB Yilmaz","year":"2022","unstructured":"Yilmaz, A.B., Taspinar, Y.S., Koklu, M.: Classification of malicious android applications using Naive Bayes and support vector machine algorithms. Int. J. Intell. Syst. Appl. Eng. 10(2), 269\u2013274 (2022)","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"4_CR32","unstructured":"Zhang, A., Lipton, Z.C., Li, M., Smola, A.J.: Dive into deep learning. Cambridge University Press (2023)"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Zhour, R., Khalid, C., Abdellatif, K.: Hybrid intrusion detection system based on random forest, decision tree and multilayer perceptron (mlp) algorithms. In: 2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/WINCOM59760.2023.10322983"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2025 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97554-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T05:00:11Z","timestamp":1751778011000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97554-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031975530","9783031975547"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97554-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}