{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:50:52Z","timestamp":1725558652703},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642143991"},{"type":"electronic","value":"9783642144004"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14400-4_1","type":"book-chapter","created":{"date-parts":[[2010,6,26]],"date-time":"2010-06-26T05:18:09Z","timestamp":1277529489000},"page":"1-16","source":"Crossref","is-referenced-by-count":0,"title":["Moving Targets"],"prefix":"10.1007","author":[{"given":"Giorgio","family":"Giacinto","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1128817.1128824","volume-title":"ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security","author":"M. Barreno","year":"2006","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 16\u201325. ACM, New York (2006)"},{"key":"1_CR2","unstructured":"Bayer, U., Comparetti, P., Hlauschek, C., Kr\u00fcgel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: 16th Annual Network and Distributed System Security Symposium, NDSS 2009 (2009)"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MMUL.2009.25","volume":"16","author":"M. Bertini","year":"2009","unstructured":"Bertini, M., Del Bimbo, A., Serra, G., Torniai, C., Cucchiara, R., Grana, C., Vezzani, R.: Dynamic pictorially enriched ontologies for digital video libraries. IEEE Multimedia\u00a016(2), 42\u201351 (2009)","journal-title":"IEEE Multimedia"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Biggio, B., Fumera, G., Roli, F.: Adversarial pattern classification using multiple classifiers and randomisation (2008)","DOI":"10.1007\/978-3-540-89689-0_54"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-02326-2_14","volume-title":"Multiple Classifier Systems","author":"B. Biggio","year":"2009","unstructured":"Biggio, B., Fumera, G., Roli, F.: Multiple classifier systems for adversarial classification tasks. In: Benediktsson, J.A., Kittler, J., Roli, F. (eds.) MCS 2009. LNCS, vol.\u00a05519, pp. 132\u2013141. Springer, Heidelberg (2009)"},{"key":"1_CR6","unstructured":"Kruegel, C., Kirda, E., Zhou, X., Wang, X., Kolbitsch, C., Comparetti, P.: Effective and efficient malware detection at the end host. In: USENIX 2009 - Security Symposium (2009)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-540-79547-6_30","volume-title":"Computer Vision Systems","author":"S.A. Chatzichristofis","year":"2008","unstructured":"Chatzichristofis, S.A., Boutalis, Y.S.: Cedd: Color and edge directivity descriptor: A compact descriptor for image indexing and retrieval. In: Gasteratos, A., Vincze, M., Tsotsos, J.K. (eds.) ICVS 2008. LNCS, vol.\u00a05008, pp. 312\u2013322. Springer, Heidelberg (2008)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Corona, I., Ariu, D., Giacinto, G.: Hmm-web: A framework for the detection of attacks against web applications. In: IEEE International Conference on Communications, ICC 2009, June 2009, pp. 1\u20136 (2009)","DOI":"10.1109\/ICC.2009.5199054"},{"issue":"4","key":"1_CR9","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.inffus.2009.03.001","volume":"10","author":"I. Corona","year":"2009","unstructured":"Corona, I., Giacinto, G., Mazzariello, C., Roli, F., Sansone, C.: Information fusion for computer security: State of the art and open issues. Inf. Fusion\u00a010(4), 274\u2013284 (2009)","journal-title":"Inf. Fusion"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Cretu, G.F., Stavrou, A., Locasto, M.E., Stolfo, S.J., Keromytis, A.D.: Casting out demons: Sanitizing training data for anomaly sensors. In: IEEE Symposium on Security and Privacy, SP 2008, May 2008, pp. 81\u201395 (2008)","DOI":"10.1109\/SP.2008.11"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/1014052.1014066","volume-title":"KDD 2004: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"N. Dalvi","year":"2004","unstructured":"Dalvi, N., Domingos, P., Mausam, Sanghai, S., Verma, D.: Adversarial classification. In: KDD 2004: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 99\u2013108. ACM, New York (2004)"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1348246.1348248","volume":"40","author":"R. Datta","year":"2008","unstructured":"Datta, R., Joshi, D., Li, J., Wang, J.Z.: Image retrieval: Ideas, influences, and trends of the new age. ACM Comput. Surv.\u00a040(2), 1\u201360 (2008)","journal-title":"ACM Comput. Surv."},{"key":"1_CR13","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2000","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Hoboken (2000)","edition":"2"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1023\/A:1007420529897","volume":"32","author":"M.B. Harries","year":"1998","unstructured":"Harries, M.B., Sammut, C., Horn, K.: Extracting hidden context. Mach. Learn.\u00a032(2), 101\u2013126 (1998)","journal-title":"Mach. Learn."},{"volume-title":"Semantic Multimedia and Ontologies - Theory and Applications","year":"2008","key":"1_CR15","unstructured":"Kompatsiaris, Y., Hobson, P. (eds.): Semantic Multimedia and Ontologies - Theory and Applications. Springer, Heidelberg (2008)"},{"issue":"1","key":"1_CR16","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/34.824819","volume":"22","author":"A.K. Jain","year":"2000","unstructured":"Jain, A.K., Duin, R.P.W., Mao, J.: Statistical pattern recognition: a review. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a022(1), 4\u201337 (2000)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","first-page":"113","volume-title":"Recent Advances in Intrusion Detection","author":"A. Joshi","year":"2003","unstructured":"Joshi, A., Undercoffer, J., Pinkston, J.: Modeling computer attacks: An ontology for intrusion detection. In: Hartmanis, J., Goos, G., van Leeuwen, J. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 113\u2013135. Springer, Heidelberg (2003)"},{"issue":"5","key":"1_CR18","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.comnet.2005.01.009","volume":"48","author":"C. Kruegel","year":"2005","unstructured":"Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Comput. Netw.\u00a048(5), 717\u2013738 (2005)","journal-title":"Comput. Netw."},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1126004.1126005","volume":"2","author":"M.S. Lew","year":"2006","unstructured":"Lew, M.S., Sebe, N., Djeraba, C., Jain, R.: Content-based multimedia information retrieval: State of the art and challenges. ACM Trans. Multimedia Comput. Commun. Appl.\u00a02(1), 1\u201319 (2006)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"issue":"7","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TMM.2009.2030598","volume":"11","author":"X. Li","year":"2009","unstructured":"Li, X., Snoek, C.G.M., Worring, M.: Learning social tag relevance by neighbor voting. IEEE Transactions on Multimedia\u00a011(7), 1310\u20131322 (2009)","journal-title":"IEEE Transactions on Multimedia"},{"key":"1_CR21","first-page":"21","volume-title":"RAID 2009: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection","author":"F. Maggi","year":"2009","unstructured":"Maggi, F., Robertson, W., Kruegel, C., Vigna, G.: Protecting a moving target: Addressing web application concept drift. In: RAID 2009: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, pp. 21\u201340. Springer, Heidelberg (2009)"},{"issue":"2","key":"1_CR22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.jvlc.2006.09.002","volume":"19","author":"G.P. Nguyen","year":"2008","unstructured":"Nguyen, G.P., Worring, M.: Interactive access to large image collections using similarity-based visualization. J. Vis. Lang. Comput.\u00a019(2), 203\u2013224 (2008)","journal-title":"J. Vis. Lang. Comput."},{"key":"1_CR23","unstructured":"Pavlidis, T.: Limitations of content-based image retrieval (October 2008)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Perdisci, R., Dagon, D., Lee, W., Fogla, P., Sharif, M.: Misleading worm signature generators using deliberate noise injection. In: 2006 IEEE Symposium on Security and Privacy, May, pp. 15\u201331 (2006)","DOI":"10.1109\/SP.2006.26"},{"issue":"6","key":"1_CR25","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1016\/j.comnet.2008.11.011","volume":"53","author":"R. Perdisci","year":"2009","unstructured":"Perdisci, R., Ariu, D., Fogla, P., Giacinto, G., Lee, W.: Mcpad: A multiple classifier system for accurate payload-based anomaly detection. Comput. Netw.\u00a053(6), 864\u2013881 (2009)","journal-title":"Comput. Netw."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Piras, L., Giacinto, G.: Neighborhood-based feature weighting for relevance feedback in content-based retrieval. In: 10th Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2009, May 2009, pp. 238\u2013241 (2009)","DOI":"10.1109\/WIAMIS.2009.5031477"},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1743384.1743402","volume-title":"MIR 2010: Proceedings of the international conference on Multimedia information retrieval","author":"F. Richter","year":"2010","unstructured":"Richter, F., Romberg, S., H\u00f6rster, E., Lienhart, R.: Multimodal ranking for image search on community databases. In: MIR 2010: Proceedings of the international conference on Multimedia information retrieval, pp. 63\u201372. ACM, New York (2010)"},{"issue":"4","key":"1_CR28","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1109\/JPROC.2008.916343","volume":"96","author":"J. Sivic","year":"2008","unstructured":"Sivic, J., Zisserman, A.: Efficient visual search for objects in videos. Proceedings of the IEEE\u00a096(4), 548\u2013566 (2008)","journal-title":"Proceedings of the IEEE"},{"issue":"6","key":"1_CR29","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MIS.2009.108","volume":"24","author":"D.B. Skillicorn","year":"2009","unstructured":"Skillicorn, D.B.: Adversarial knowledge discovery. IEEE Intelligent Systems\u00a024(6), 54\u201361 (2009)","journal-title":"IEEE Intelligent Systems"},{"issue":"12","key":"1_CR30","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1109\/34.895972","volume":"22","author":"A.W.M. Smeulders","year":"2000","unstructured":"Smeulders, A.W.M., Worring, M., Santini, S., Gupta, A., Jain, R.: Content-based image retrieval at the end of the early years. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a022(12), 1349\u20131380 (2000)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1_CR31","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1654988.1655000","volume-title":"AISec 2009: Proceedings of the 2nd ACM workshop on Security and artificial intelligence","author":"A. Stavrou","year":"2009","unstructured":"Stavrou, A., Cretu-Ciocarlie, G.F., Locasto, M.E., Stolfo, S.J.: Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. In: AISec 2009: Proceedings of the 2nd ACM workshop on Security and artificial intelligence, pp. 39\u201346. ACM, New York (2009)"},{"key":"1_CR32","unstructured":"IBM Internet\u00a0Security Systems. X-force\u00ae 2008 trend and risk report. Technical report, IBM (2009)"},{"key":"1_CR33","first-page":"127","volume-title":"CIVR 2007: Proceedings of the 6th ACM international conference on Image and video retrieval","author":"B. Thomee","year":"2007","unstructured":"Thomee, B., Huiskes, M.J., Bakker, E., Lew, M.S.: Visual information retrieval using synthesized imagery. In: CIVR 2007: Proceedings of the 6th ACM international conference on Image and video retrieval, pp. 127\u2013130. ACM, New York (2007)"},{"issue":"1","key":"1_CR34","first-page":"69","volume":"23","author":"G. Widmer","year":"1996","unstructured":"Widmer, G., Kubat, M.: Learning in the presence of concept drift and hidden contexts. Mach. Learn.\u00a023(1), 69\u2013101 (1996)","journal-title":"Mach. Learn."}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14400-4_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:52:06Z","timestamp":1606186326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14400-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642143991","9783642144004"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14400-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}