{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T06:30:52Z","timestamp":1753684252727},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319633145"},{"type":"electronic","value":"9783319633152"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63315-2_58","type":"book-chapter","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T04:48:34Z","timestamp":1500526114000},"page":"663-671","source":"Crossref","is-referenced-by-count":5,"title":["The Concept of Applying Lifelong Learning Paradigm to Cybersecurity"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,21]]},"reference":[{"issue":"3","key":"58_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2200\/S00737ED1V01Y201610AIM033","volume":"10","author":"Z Chen","year":"2016","unstructured":"Chen, Z., Liu, B.: Lifelong machine learning. Synth. Lect. Artif. Intell. Mach. Learn. 10(3), 1\u2013145 (2016)","journal-title":"Synth. Lect. Artif. Intell. Mach. Learn."},{"issue":"5","key":"58_CR2","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1002\/sec.800","volume":"7","author":"S Garc\u00eda","year":"2014","unstructured":"Garc\u00eda, S., Zunino, A., Campo, M.: Survey on network-based botnet detection methods. Secur. Commun. Netw. 7(5), 878\u2013903 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"58_CR3","unstructured":"Pentina, A., Lampert, C.H.: Lifelong learning with non-i.i.d. tasks. In: Advances in Neural Information Processing Systems (2015)"},{"key":"58_CR4","unstructured":"Chen, Z., Lium, B.: Lifelong machine learning in the big data era. In: IJCAI 2015 Tutorial (2015)"},{"key":"58_CR5","unstructured":"Pentina, A., Lampert, C.H.: A PAC-Bayesian bound for lifelong learning. In: ICML (2014)"},{"key":"58_CR6","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1613\/jair.731","volume":"12","author":"J Baxter","year":"2000","unstructured":"Baxter, J.: A model of inductive bias learning. J. Artif. Intell. Res. (JAIR) 12, 149\u2013198 (2000)","journal-title":"J. Artif. Intell. Res. (JAIR)"},{"key":"58_CR7","first-page":"967","volume":"6","author":"A Maurer","year":"2005","unstructured":"Maurer, A.: Algorithmic stability and meta-learning. J. Mach. Learn. Res. 6, 967\u2013994 (2005)","journal-title":"J. Mach. Learn. Res."},{"key":"58_CR8","unstructured":"Balcan, M., Blum, A., Vempala, S.: Efficient representations for lifelong learning and autoencoding. In: Workshop on Computational Learning Theory (COLT) (2015)"},{"issue":"99","key":"58_CR9","first-page":"1","volume":"PP","author":"N Segev","year":"2015","unstructured":"Segev, N., et al.: Learn on source, refine on target: a model transfer learning framework with random forests. IEEE Trans. Pattern Anal. Mach. Intell. PP(99), 1 (2015)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"58_CR10","unstructured":"Ammar, H.B., Tutunov, R., Eaton, E.: Safe policy search for lifelong reinforcement learning with sublinear regret. In: Proceedings of the 32nd International Conference on Machine Learning, vol. 37, pp. 2361\u20132369. JMLR.org (2015)"},{"key":"58_CR11","first-page":"187","volume":"16","author":"Q Qiu","year":"2015","unstructured":"Qiu, Q., Sapiro, G.: Learning transformations for clustering and classification. J. Mach. Learn. Res. 16, 187\u2013225 (2015)","journal-title":"J. Mach. Learn. Res."},{"key":"58_CR12","unstructured":"Chen, Z., Liu, B.: Topic modeling using topics from many domains, lifelong learning and big data. In: Proceedings of the 31st International Conference on Machine Learning (2014)"},{"issue":"2","key":"58_CR13","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1109\/JSTARS.2015.2449738","volume":"9","author":"HL Yang","year":"2016","unstructured":"Yang, H.L., Crawford, M.M.: Domain adaptation with preservation of manifold geometry for hyperspectral image classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 9(2), 543\u2013555 (2016)","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"issue":"1","key":"58_CR14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/TGRS.2015.2449736","volume":"54","author":"HL Yang","year":"2016","unstructured":"Yang, H.L., Crawford, M.M.: Spectral and spatial proximity-based manifold alignment for multitemporal hyperspectral image classification. IEEE Trans. Geosci. Remote Sens. 54(1), 51\u201364 (2016)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"1","key":"58_CR15","first-page":"69","volume":"23","author":"G Widmer","year":"1996","unstructured":"Widmer, G., Kubat, M.: Learning in the presence of concept drift and hidden contexts. Mach. Learn. 23(1), 69\u2013101 (1996)","journal-title":"Mach. Learn."},{"issue":"1","key":"58_CR16","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1162\/EVCO_a_00121","volume":"23","author":"K Sim","year":"2015","unstructured":"Sim, K., Hart, E., Paechter, B.: A lifelong learning hyper-heuristic method for bin packing. Evol. Comput. 23(1), 37\u201367 (2015)","journal-title":"Evol. Comput."},{"key":"58_CR17","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.eswa.2016.07.037","volume":"64","author":"\u015e Con\u0163iu","year":"2016","unstructured":"Con\u0163iu, \u015e., Groza, A.: Improving remote sensing crop classification by argumentation-based conflict resolution in ensemble learning. Expert Syst. Appl. 64, 269\u2013286 (2016)","journal-title":"Expert Syst. Appl."},{"key":"58_CR18","doi-asserted-by":"crossref","unstructured":"Chora\u015b, M., Kozik, R., Bruna, M.P.T., Yautsiukhin, A., Churchill, A., Maciejewska, I., Eguinoa, I., Jomni, A.: Comprehensive approach to increase cyber security and resielience. In: Proceedings of ARES (International Conference on Availability, Reliability and Security), Touluse, pp. 686\u2013692. IEEE (2015)","DOI":"10.1109\/ARES.2015.30"},{"key":"58_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-319-45378-1_31","volume-title":"Computer Information Systems and Industrial Management","author":"R Kozik","year":"2016","unstructured":"Kozik, R., Chora\u015b, M., Renk, R., Ho\u0142ubowicz, W.: Cyber security of the application layer of mission critical industrial systems. In: Saeed, K., Homenda, W. (eds.) CISIM 2016. LNCS, vol. 9842, pp. 342\u2013351. Springer, Cham (2016). doi: 10.1007\/978-3-319-45378-1_31"},{"key":"58_CR20","series-title":"Studies in Systems, Decision and Control","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-319-51043-9_7","volume-title":"Managing the Complexity of Critical Infrastructures","author":"M Chora\u015b","year":"2017","unstructured":"Chora\u015b, M., Kozik, R., Flizikowski, A., Renk, R., Ho\u0142ubowicz, W.: Cyber threats impacting critical infrastructures. In: Setola, R., Rosato, V., Kyriakides, E., Rome, E. (eds.) Managing the Complexity of Critical Infrastructures. Studies in Systems, Decision and Control, vol. 90, pp. 139\u2013161. Springer, Heidelberg (2017). doi: 10.1007\/978-3-319-51043-9_7"},{"key":"58_CR21","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-33018-6_18","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u201912-SOCO\u201912 Special Sessions","author":"M Chora\u015b","year":"2012","unstructured":"Chora\u015b, M., Kozik, R., Puchalski, D., Ho\u0142ubowicz, W.: Correlation approach for SQL injection attacks detection. In: Herrero, \u00c1., et al. (eds.) International Joint Conference CISIS\u201912-ICEUTE\u201912-SOCO\u201912 Special Sessions. AISC, vol. 189, pp. 177\u2013186. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33018-6_18"},{"issue":"5","key":"58_CR22","doi-asserted-by":"crossref","first-page":"1858","DOI":"10.1016\/j.eswa.2012.10.025","volume":"40","author":"SA G\u00f3mez","year":"2013","unstructured":"G\u00f3mez, S.A., Ches\u00f1evar, C.I., Simari, G.R.: ONTOarg: a decision support framework for ontology integration based on argumentation. Expert Syst. Appl. 40(5), 1858\u20131870 (2013)","journal-title":"Expert Syst. Appl."},{"key":"58_CR23","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.eswa.2016.07.027","volume":"64","author":"MO Moguillansky","year":"2016","unstructured":"Moguillansky, M.O., Simari, G.R.: A generalized abstract argumentation framework for inconsistency-tolerant ontology reasoning. Expert Syst. Appl. 64, 141\u2013168 (2016)","journal-title":"Expert Syst. Appl."},{"key":"58_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/978-3-642-13022-9_67","volume-title":"Trends in Applied Intelligent Systems","author":"M Chora\u015b","year":"2010","unstructured":"Chora\u015b, M., Kozik, R., Flizikowski, A., Ho\u0142ubowicz, W.: Ontology applied in decision support system for critical infrastructures protection. In: Garc\u00eda-Pedrajas, N., Herrera, F., Fyfe, C., Ben\u00edtez, J.M., Ali, M. (eds.) IEA\/AIE 2010. LNCS, vol. 6096, pp. 671\u2013680. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13022-9_67"},{"issue":"3","key":"58_CR25","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s10462-010-9154-1","volume":"33","author":"J Bentahar","year":"2010","unstructured":"Bentahar, J., Moulin, B., B\u00e9langer, M.: A taxonomy of argumentation models used for knowledge representation. Artif. Intell. Rev. 33(3), 211\u2013259 (2010)","journal-title":"Artif. Intell. Rev."},{"key":"58_CR26","unstructured":"OWASP: The Open Web Application Project \u2013 OWASP Top Ten"},{"issue":"15","key":"58_CR27","doi-asserted-by":"crossref","first-page":"2901","DOI":"10.1002\/sec.1549","volume":"9","author":"R Kozik","year":"2016","unstructured":"Kozik, R., Chora\u015b, M., Ho\u0142ubowicz, W.: Evolutionary-based packets classification for anomaly detection in web layer. Secur. Commun. Netw. 9(15), 2901\u20132910 (2016)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63315-2_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T23:13:16Z","timestamp":1569885196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63315-2_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633145","9783319633152"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63315-2_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}