{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T19:41:43Z","timestamp":1760470903141,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032084644"},{"type":"electronic","value":"9783032084651"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08465-1_17","type":"book-chapter","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T18:57:43Z","timestamp":1760468263000},"page":"210-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploratory Visualization of\u00a0IoT Attacks on\u00a0the\u00a0NF-CSE-CIC-IDS2018 Dataset"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8615-2916","authenticated-orcid":false,"given":"\u00c1lvaro","family":"Villar-Val","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9046-7397","authenticated-orcid":false,"given":"Diego","family":"Granados-Lopez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1614-9075","authenticated-orcid":false,"given":"Angel","family":"Arroyo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2444-5384","authenticated-orcid":false,"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"17_CR1","unstructured":"Reglamento (UE) 2024\/2847 https:\/\/www.boe.es\/buscar\/doc.php?id=DOUE-L-2024-81720. Accessed 22 May 2025"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Devi, M., Majumder, A.: Side-channel attack in internet of things: a survey. In: Applications of Internet of Things: Proceedings of ICCCIOT 2020, pp. 213\u2013222. Springer Singapore (2021)","DOI":"10.1007\/978-981-15-6198-6_20"},{"key":"17_CR3","unstructured":"What Are Downgrade Attacks? https:\/\/www.cyberark.com\/what-is\/downgrade-attacks\/. Accessed 3 June 2025"},{"key":"17_CR4","unstructured":"European Cyber Security Organisation ECSO Technical Paper on Internet of Things (IoT) https:\/\/ecs-org.eu\/ecso-uploads\/2023\/01\/ECSO_WG6_IoT-Technical_paper_final.pdf. Accessed 9 June 2025"},{"key":"17_CR5","volume-title":"Machine Learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T.M.: Machine Learning. McGraw-Hill (1997)"},{"issue":"17","key":"17_CR6","doi-asserted-by":"publisher","first-page":"9648","DOI":"10.3390\/app13179648","volume":"13","author":"K Demertzis","year":"2023","unstructured":"Demertzis, K., Rantos, K., Magafas, L., Iliadis, L.: A cross-modal dynamic attention neural architecture to detect anomalies in data streams from smart communication environments. Appl. Sci. 13(17), 9648 (2023)","journal-title":"Appl. Sci."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Iglesias, F., Hartl, A., Zseby, T., Zimek, A.: Are network attacks outliers? a study of space representations and unsupervised algorithms. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 159\u2013175. Cham: Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-43887-6_13"},{"issue":"2","key":"17_CR8","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153\u20131176 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2494502","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"17_CR9","doi-asserted-by":"publisher","first-page":"155","DOI":"10.4236\/jilsa.2024.163010","volume":"16","author":"M Roshanaei","year":"2024","unstructured":"Roshanaei, M., Khan, M.R., Sylvester, N.N.: Navigating AI cybersecurity: evolving landscape and challenges. J. Intell. Learn. Syst. Appl. 16(3), 155\u2013174 (2024). https:\/\/doi.org\/10.4236\/jilsa.2024.163010","journal-title":"J. Intell. Learn. Syst. Appl."},{"issue":"1","key":"17_CR10","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/s11263-015-0812-2","volume":"119","author":"X Zhu","year":"2015","unstructured":"Zhu, X., Vondrick, C., Fowlkes, C.C., Ramanan, D.: Do we need more training data? Int. J. Comput. Vision 119(1), 76\u201392 (2015). https:\/\/doi.org\/10.1007\/s11263-015-0812-2","journal-title":"Int. J. Comput. Vision"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Futur. Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020)","journal-title":"IEEE Access"},{"issue":"2018","key":"17_CR14","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1(2018), 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: NetFlow datasets for machine learning-based network intrusion detection systems. In: Deze, Z., Huang, H., Hou, R., Rho, S., Chilamkurti, N. (eds.) BDTA\/WiCON -2020. LNICSSITE, vol. 371, pp. 117\u2013135. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72802-1_9","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"17_CR16","unstructured":"https:\/\/www.ntop.org\/guides\/nprobe\/cli_options.html. Accessed 7 July 2025"},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.comnet.2018.11.010","volume":"148","author":"F Salo","year":"2019","unstructured":"Salo, F., Nassif, A.B., Essex, A.: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Netw. 148, 164\u2013175 (2019)","journal-title":"Comput. Netw."},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.aej.2024.07.044","volume":"107","author":"F Alqurashi","year":"2024","unstructured":"Alqurashi, F., Ahmad, I.: A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling. Alex. Eng. J. 107, 374\u2013389 (2024)","journal-title":"Alex. Eng. J."},{"key":"17_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102675","volume":"116","author":"Z Yang","year":"2022","unstructured":"Yang, Z.: A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput. Secur. 116, 102675 (2022)","journal-title":"Comput. Secur."},{"issue":"1","key":"17_CR20","doi-asserted-by":"publisher","first-page":"6567","DOI":"10.1038\/s41598-023-32966-x","volume":"13","author":"B Ozgode Yigin","year":"2023","unstructured":"Ozgode Yigin, B., Saygili, G.: Effect of distance measures on confidences of t-SNE embeddings and its implications on clustering for scRNA-seq data. Sci. Rep. 13(1), 6567 (2023)","journal-title":"Sci. Rep."},{"issue":"1","key":"17_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.331","volume":"7","author":"Z Zoghi","year":"2024","unstructured":"Zoghi, Z., Serpen, G.: UNSW-NB15 computer security dataset: analysis through visualization. Secur. Priv. 7(1), e331 (2024)","journal-title":"Secur. Priv."},{"issue":"2","key":"17_CR22","doi-asserted-by":"publisher","first-page":"246","DOI":"10.14429\/dsj.74.18953","volume":"74","author":"R Gondhalekar","year":"2024","unstructured":"Gondhalekar, R., Chattamvelli, R.: A comprehensive review of dimensionality reduction techniques for real-time network intrusion detection with applications in cybersecurity. Def. Sci. J. 74(2), 246\u2013255 (2024)","journal-title":"Def. Sci. J."},{"key":"17_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of outliers","author":"DM Hawkins","year":"1980","unstructured":"Hawkins, D.M.: Identification of outliers, vol. 11. Chapman and Hall, London (1980)"},{"issue":"4","key":"17_CR24","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1109\/TNSM.2020.3016246","volume":"17","author":"B Molina-Coronado","year":"2020","unstructured":"Molina-Coronado, B., Mori, U., Mendiburu, A., Miguel-Alonso, J.: Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process. IEEE Trans. Netw. Serv. Manage. 17(4), 2451\u20132479 (2020). https:\/\/doi.org\/10.1109\/TNSM.2020.3016246","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"1","key":"17_CR25","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1214\/aoms\/1177729885","volume":"21","author":"FE Grubbs","year":"1950","unstructured":"Grubbs, F.E.: Sample criteria for testing outlying observations. Ann. Math. Stat. 21(1), 27\u201358 (1950)","journal-title":"Ann. Math. Stat."},{"issue":"3","key":"17_CR26","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1080\/00401706.1972.10488948","volume":"14","author":"GL Tietjen","year":"1972","unstructured":"Tietjen, G.L., Moore, R.H.: Some Grubbs-type statistics for the detection of several outliers. Technometrics 14(3), 583\u2013597 (1972)","journal-title":"Technometrics"},{"key":"17_CR27","doi-asserted-by":"publisher","unstructured":"Jia, W., Sun, M., Lian, J., Hou, S.: Feature dimensionality reduction: a review. Complex Intell. Syst. (1), 1\u201331 (2022). https:\/\/doi.org\/10.1007\/s40747-021-00637-x","DOI":"10.1007\/s40747-021-00637-x"},{"key":"17_CR28","unstructured":"Scikit learn PCA documentation. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.decomposition.PCA.html. Accessed 7 July 2025"},{"issue":"2065","key":"17_CR29","doi-asserted-by":"publisher","first-page":"20150202","DOI":"10.1098\/rsta.2015.0202","volume":"374","author":"IT Jolliffe","year":"2016","unstructured":"Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Phil. Trans. R. Soc. A 374(2065), 20150202 (2016). https:\/\/doi.org\/10.1098\/rsta.2015.0202","journal-title":"Phil. Trans. R. Soc. A"},{"key":"17_CR30","unstructured":"Scikit learn t-SNE documentation. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.manifold.TSNE.html. Accessed 7 June 2025"},{"key":"17_CR31","unstructured":"A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018). https:\/\/registry.opendata.aws\/cse-cic-ids2018. Accessed 14 April 2025"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Niitsuma, H., Okada, T.: Covariance and PCA for categorical variables. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 523\u2013528. Berlin, Heidelberg: Springer Berlin Heidelberg (2005)","DOI":"10.1007\/11430919_61"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Wu, L.: Eg-conmix: an intrusion detection method based on graph contrastive learning. In: China National Conference on Big Data and Social Computing, pp. 19\u201334. Singapore: Springer Nature Singapore (2024)","DOI":"10.1007\/978-981-97-5803-6_2"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Iglesias, F., Hartl, A., Zseby, T., Zimek, A.: Are network attacks outliers? a study of space representations and unsupervised algorithms. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 159\u2013175. Cham: Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-43887-6_13"},{"issue":"1","key":"17_CR35","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1080\/00031305.1973.10478966","volume":"27","author":"FJ Anscombe","year":"1973","unstructured":"Anscombe, F.J.: Graphs in statistical analysis. Am. Stat. 27(1), 17\u201321 (1973)","journal-title":"Am. Stat."}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08465-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T19:03:01Z","timestamp":1760468581000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08465-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9783032084644","9783032084651"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08465-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Artificial Intelligence Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hais2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/haisconference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}