{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:11:22Z","timestamp":1743102682136,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319234601"},{"type":"electronic","value":"9783319234618"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23461-8_6","type":"book-chapter","created":{"date-parts":[[2015,8,28]],"date-time":"2015-08-28T08:20:16Z","timestamp":1440750016000},"page":"85-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Learning Detector of Malicious Network Traffic from Weak Labels"],"prefix":"10.1007","author":[{"given":"Vojtech","family":"Franc","sequence":"first","affiliation":[]},{"given":"Michal","family":"Sofka","sequence":"additional","affiliation":[]},{"given":"Karel","family":"Bartos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,29]]},"reference":[{"key":"6_CR1","unstructured":"Cisco 2014 annual security report. http:\/\/www.cisco.com\/web\/offers\/lp\/2014-annual-security-report\/index.html"},{"key":"6_CR2","unstructured":"List of 1 million top web sites. http:\/\/www.alexa.com"},{"key":"6_CR3","unstructured":"VirusTotal service. https:\/\/www.virustotal.com"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit, eCrime 2007, pp. 60\u201369. ACM, New York (2007)","DOI":"10.1145\/1299015.1299021"},{"key":"6_CR5","unstructured":"Andrews, S., Tsochantaridis, I., Hofmann, T.: Support vector machines for multiple-instance learning. In: Proc. of Neural Information Processing Systems (2002)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F.: Know your neighbors: Web spam detection using the web topology. In: Proceedings of SIGIR. ACM, Amsterdam, July 2007","DOI":"10.1145\/1277741.1277814"},{"key":"6_CR7","unstructured":"Farnham, G., Leune, K.: Tools and standards for cyber threat intelligence projects. Technical report, SANS Institute InfoSec Reading Room, vol.10 (2013)"},{"key":"6_CR8","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1145\/1390156.1390197","volume-title":"Proceedings of the 25th Annual International Conference on Machine Learning (ICML 2008)","author":"V Franc","year":"2008","unstructured":"Franc, V., Sonnenburg, S.: Optimized cutting plane algorithm for support vector machines. In: McCallum, A., Roweis, S. (eds.) Proceedings of the 25th Annual International Conference on Machine Learning (ICML 2008), pp. 320\u2013327. ACM, New York (2008)"},{"key":"6_CR9","unstructured":"Gu, G., Zhang, J., Lee, W.: BotSniffer: detecting botnet command and control channels in network traffic. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), February 2008"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Identifying suspicious URLs: an application of large-scale online learning. In: Danyluk, A.P., Bottou, L., Littman, M.L. (eds.) Proceedings of the 26th Annual International Conference on Machine Learning, ICML 2009, Montreal, Quebec, Canada, June 14\u201318, 2009. ACM International Conference Proceeding Series, vol. 382, pp. 681\u2013688. ACM (2009)","DOI":"10.1145\/1553374.1553462"},{"key":"6_CR11","unstructured":"Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI 2010, pp. 26\u201326. USENIX Association, Berkeley (2010)"},{"key":"6_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-017-3217-8","volume-title":"Ten Lectures on Statistical and Structural Pattern Recognition","author":"MI Schlesinger","year":"2002","unstructured":"Schlesinger, M.I., Hlav\u00e1\u010d, V.: Ten Lectures on Statistical and Structural Pattern Recognition. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"6_CR13","unstructured":"Shamir, O., Zhang, T.: Stochastic gradient descent for non-smooth optimization: Convergence results and optimal averaging schemes. In: Proc. of International Conference on Machine Learning (2012)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Vapnik, V.N.: The Nature of Statistical Learning Theory. Springer Verlag (1995)","DOI":"10.1007\/978-1-4757-2440-0"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23461-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T01:56:46Z","timestamp":1653098206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23461-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319234601","9783319234618"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23461-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}