{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:09:12Z","timestamp":1759133352170,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319701387"},{"type":"electronic","value":"9783319701394"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70139-4_41","type":"book-chapter","created":{"date-parts":[[2017,10,28]],"date-time":"2017-10-28T01:24:18Z","timestamp":1509153858000},"page":"407-417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Evaluating Accuracy in Prudence Analysis for Cyber Security"],"prefix":"10.1007","author":[{"given":"Omaru","family":"Maruatona","sequence":"first","affiliation":[]},{"given":"Peter","family":"Vamplew","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Dazeley","sequence":"additional","affiliation":[]},{"given":"Paul A.","family":"Watters","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,29]]},"reference":[{"key":"41_CR1","unstructured":"Prayote, F.: Knowledge based anomaly detection. University of New South Wales, Ph.D. thesis (2007)"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Dazeley, R., Kang, B.: Rated MCRDR: finding non-linear relationships between classifications in MCRDR. In: 3rd International Conference on Hybrid Intelligent Systems, pp. 499\u2013508. IOS Press, Melbourne (2003)","DOI":"10.1007\/978-3-540-24581-0_21"},{"key":"41_CR3","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/0020-7101(95)01136-3","volume":"40","author":"G Edwards","year":"1995","unstructured":"Edwards, G., Kang, B., Preston, P., Compton, P.: Prudent expert systems with credentials: managing the expertise of decision support systems. Int. J. Bio-Med. Comput. 40, 125\u2013132 (1995)","journal-title":"Int. J. Bio-Med. Comput."},{"issue":"2","key":"41_CR4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1017\/S0269888909000241","volume":"24","author":"D Richards","year":"2009","unstructured":"Richards, D.: Two decades of ripple down rules research. Knowl. Eng. Rev. 24(2), 159\u2013184 (2009)","journal-title":"Knowl. Eng. Rev."},{"key":"41_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-52062-7_86","volume-title":"AI \u201888","author":"P Compton","year":"1990","unstructured":"Compton, P., Jansen, R.: Knowledge in context: a strategy for expert system maintenance. In: Barter, C.J., Brooks, M.J. (eds.) AI 1988. LNCS, vol. 406, pp. 292\u2013306. Springer, Heidelberg (1990). doi:10.1007\/3-540-52062-7_86"},{"key":"41_CR6","unstructured":"Kang, B., Compton, P., Preston, P.: Multiple classification ripple down rules: evaluation and possibilities. In: 9th Banff Knowledge Acquisition for Knowledge Based Systems Workshop, Banff, pp. 17\u201326 (1995)"},{"key":"41_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-32541-0_16","volume-title":"Knowledge Management and Acquisition for Intelligent Systems","author":"O Maruatona","year":"2012","unstructured":"Maruatona, O., Vamplew, P., Dazeley, R.: RM and RDM, a preliminary evaluation of two prudent RDR techniques. In: Richards, D., Kang, B.H. (eds.) PKAW 2012. LNCS, vol. 7457, pp. 188\u2013194. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32541-0_16"},{"key":"41_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/11941439_8","volume-title":"AI 2006: Advances in Artificial Intelligence","author":"P Compton","year":"2006","unstructured":"Compton, P., Cao, T.M.: Evaluation of incremental knowledge acquisition with simulated experts. In: Sattar, A., Kang, B.-h. (eds.) AI 2006. LNCS, vol. 4304, pp. 39\u201348. Springer, Heidelberg (2006). doi:10.1007\/11941439_8"},{"key":"41_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1007\/11941439_127","volume-title":"AI 2006: Advances in Artificial Intelligence","author":"A Prayote","year":"2006","unstructured":"Prayote, A., Compton, P.: Detecting anomalies and intruders. In: Sattar, A., Kang, B.-h. (eds.) AI 2006. LNCS, vol. 4304, pp. 1084\u20131088. Springer, Heidelberg (2006). doi:10.1007\/11941439_127"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Metz, C.E.: Basic principles of ROC analysis. In: Seminars in Nuclear Medicine, pp. 283\u2013298 (1978)","DOI":"10.1016\/S0001-2998(78)80014-2"},{"key":"41_CR11","unstructured":"Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehensive survey of data mining-based fraud detection research. Artif. Intell. Rev. (2005)"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Layton, R., Watters, P.A., Dazeley, R.: Automatically determining phishing campaigns using the USCAP methodology. In: Proceedings of the 5th APWG E-crime Research Summit (2010)","DOI":"10.1109\/ecrime.2010.5706698"},{"key":"41_CR13","unstructured":"Alazab, M., Venkatraman, S., Watters, P.A., Alazab, M.: Zero-day malware detection based on supervised learning algorithms of API call signatures. In: Proceedings of the 9th Australian Data Mining Conference (2011)"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Amin, A., Anwar, S., Shah, B., Khattak, A.M.: Compromised user credentials detection using temporal features: a prudent based approach. In: Proceedings of the 9th International Conference on Computer and Automation Engineering, pp. 104\u2013110 (2017)","DOI":"10.1145\/3057039.3057051"},{"key":"41_CR15","unstructured":"Haq, I.U., Gondal, I., Vamplew, P., Layton, R.: Generating Synthetic Datasets for Experimental Validation of Fraud Detection (2016)"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Finlayson, A., Compton, P.: Run-time validation of knowledge-based systems. In: Proceedings of the Seventh International Conference on Knowledge Capture, pp. 25\u201332 (2013)","DOI":"10.1145\/2479832.2479860"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70139-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T13:00:36Z","timestamp":1710334836000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70139-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319701387","9783319701394"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70139-4_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"29 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iconip2017.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}