{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:24:59Z","timestamp":1757618699471,"version":"3.44.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031976223"},{"type":"electronic","value":"9783031976230"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97623-0_6","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:21:19Z","timestamp":1752139279000},"page":"93-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: Using Machine Learning to\u00a0Infer Network Structure from\u00a0Security Metadata"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0342-6015","authenticated-orcid":false,"given":"Asfa","family":"Khalid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1273-6501","authenticated-orcid":false,"given":"Se\u00e1n \u00d3g","family":"Murphy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0767-7888","authenticated-orcid":false,"given":"Cormac J.","family":"Sreenan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4020-0889","authenticated-orcid":false,"given":"Utz","family":"Roedig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"6_CR1","unstructured":"Dell Technologies: Data confidence drives better decisions. https:\/\/www.delltechnologies.com\/asset\/en-us\/solutions\/business-solutions\/industry-market\/data-confidence-drives-better-decisions.pdf. Accessed 1 May 2025"},{"key":"6_CR2","unstructured":"GitHub - Project-Alvarium: Repository containing work related to the forthcoming Java SDK implementation. https:\/\/github.com\/project-alvarium\/alvarium-sdk-java. Accessed 1 May 2025"},{"key":"6_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-55415-5_17","volume-title":"ICT Systems Security and Privacy Protection","author":"D Herrmann","year":"2014","unstructured":"Herrmann, D., Maa\u00df, M., Federrath, H.: Evaluating the security of a DNS query obfuscation scheme for private web surfing. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 205\u2013219. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55415-5_17"},{"issue":"6","key":"6_CR4","doi-asserted-by":"publisher","first-page":"2779","DOI":"10.1109\/TNET.2021.3101692","volume":"29","author":"T Hou","year":"2021","unstructured":"Hou, T., Wang, T., Lu, Z., Liu, Y.: Combating adversarial network topology inference by proactive topology obfuscation. IEEE\/ACM Trans. Network. 29(6), 2779\u20132792 (2021)","journal-title":"IEEE\/ACM Trans. Network."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Humaira, H., Rasyidah, R.: Determining the appropriate cluster number using elbow method for K-means algorithm. In: Proceedings of 2nd Workshop on Multidisciplinary and Applications, pp.\u00a01\u20138 (2020)","DOI":"10.4108\/eai.24-1-2018.2292388"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-031-87781-0_11","volume-title":"Advanced Information Networking and Applications","author":"A Khalid","year":"2025","unstructured":"Khalid, A., \u00d3g Murphy, S., Sreenan, C.J., Roedig, U.: Obfuscating network structure from blockchain analysis. In: Barolli, L. (ed.) Advanced Information Networking and Applications, pp. 95\u2013104. Springer, Cham (2025)"},{"key":"6_CR7","unstructured":"Khandkar, V.S., Hanawal, M.K.: Masking host identity on internet: encrypted TLS\/SSL handshake. arXiv preprint arXiv:2101.04556 (2021)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2164-6-35","volume":"6","author":"L Lovmar","year":"2005","unstructured":"Lovmar, L., Ahlford, A., Jonsson, M., Syv\u00e4nen, A.C.: Silhouette scores for assessment of SNP genotype clusters. BMC Genomics 6, 1\u20136 (2005)","journal-title":"BMC Genomics"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s13748-017-0135-3","volume":"7","author":"JM Luna-Romera","year":"2018","unstructured":"Luna-Romera, J.M., Garc\u00eda-Guti\u00e9rrez, J., Mart\u00ednez-Ballesteros, M., Riquelme Santos, J.C.: An approach to validity indices for clustering techniques in big data. Progress Artif. Intell. 7, 81\u201394 (2018)","journal-title":"Progress Artif. Intell."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Masood, R., Vatsalan, D., Ikram, M., Kaafar, M.A.: Incognito: a method for obfuscating web data. In: Proceedings of the 2018 World Wide Web Conference, pp. 267\u2013276 (2018)","DOI":"10.1145\/3178876.3186093"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Wu, J.: Cluster analysis and K-means clustering: an introduction. In: Advances in K-Means Clustering: A Data Mining Thinking, pp. 1\u201316. Springer (2012)","DOI":"10.1007\/978-3-642-29807-3_1"},{"issue":"6","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.3233\/IDA-163129","volume":"21","author":"J Xiao","year":"2017","unstructured":"Xiao, J., Lu, J., Li, X.: Davies Bouldin index based hierarchical initialization K-means. Intell. Data Anal. 21(6), 1327\u20131338 (2017)","journal-title":"Intell. Data Anal."}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97623-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T04:09:38Z","timestamp":1757218178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97623-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976223","9783031976230"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97623-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}