{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:40:27Z","timestamp":1765039227251},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662444146"},{"type":"electronic","value":"9783662444153"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44415-3_5","type":"book-chapter","created":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T04:40:31Z","timestamp":1407904831000},"page":"42-52","source":"Crossref","is-referenced-by-count":23,"title":["Poisoning Complete-Linkage Hierarchical Clustering"],"prefix":"10.1007","author":[{"given":"Battista","family":"Biggio","sequence":"first","affiliation":[]},{"given":"Samuel Rota","family":"Bul\u00f2","sequence":"additional","affiliation":[]},{"given":"Ignazio","family":"Pillai","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Mura","sequence":"additional","affiliation":[]},{"given":"Eyasu Zemene","family":"Mequanint","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"Pelillo","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Roli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"5_CR1","first-page":"714","volume":"9","author":"R. Perdisci","year":"2012","unstructured":"Perdisci, R., Corona, I., Giacinto, G.: Early detection of malicious flux networks via large-scale passive DNS traffic analysis. IEEE Trans. Dependable and Secure Comp.\u00a09(5), 714\u2013726 (2012)","journal-title":"IEEE Trans. Dependable and Secure Comp."},{"key":"5_CR2","unstructured":"Pouget, F., Dacier, M., Zimmerman, J., Clark, A., Mohay, G.: Internet attack knowledge discovery via clusters and cliques of attack traces. J. of Information Assurance and Security 1(1) (2006)"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1016\/j.comnet.2012.06.022","volume":"57","author":"R. Perdisci","year":"2013","unstructured":"Perdisci, R., Ariu, D., Giacinto, G.: Scalable fine-grained behavioral clustering of http-based malware. Computer Networks\u00a057(2), 487\u2013500 (2013)","journal-title":"Computer Networks"},{"issue":"4","key":"5_CR4","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K. Rieck","year":"2011","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur.\u00a019(4), 639\u2013668 (2011)","journal-title":"J. Comput. Secur."},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-37300-8_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"S. Hanna","year":"2013","unstructured":"Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: A scalable system for detecting code reuse among Android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol.\u00a07591, pp. 62\u201381. Springer, Heidelberg (2013)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: SPSM 2011, pp. 15\u201326 (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"5_CR7","unstructured":"Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Professional (2002)"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TKDE.2013.57","volume":"26","author":"B. Biggio","year":"2014","unstructured":"Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Trans. Knowledge and Data Eng.\u00a026(4), 984\u2013996 (2014)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"key":"5_CR9","first-page":"2617","volume":"13","author":"M. Br\u00fcckner","year":"2012","unstructured":"Br\u00fcckner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. J. Mach. Learn. Res.\u00a013, 2617\u20132654 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B., Tygar, J.D.: Adversarial machine learning. In: ACM Workshop AISec 2011, pp. 43\u201357 (2011)","DOI":"10.1145\/2046684.2046692"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS 2006, pp. 16\u201325 (2006)","DOI":"10.1145\/1128817.1128824"},{"key":"5_CR12","unstructured":"Gro\u00dfhans, M., Sawade, C., Br\u00fcckner, M., Scheffer, T.: Bayesian games for adversarial regression problems. In: ICML, vol.\u00a028 (2013)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Dutrisac, J.G., Skillicorn, D.: Hiding clusters in adversarial settings. In: ISI 2008, pp. 185\u2013187 (2008)","DOI":"10.1109\/ISI.2008.4565051"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MIS.2009.108","volume":"24","author":"D.B. Skillicorn","year":"2009","unstructured":"Skillicorn, D.B.: Adversarial knowledge discovery. IEEE Intelligent Systems\u00a024, 54\u201361 (2009)","journal-title":"IEEE Intelligent Systems"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Biggio, B., Pillai, I., Rota Bul\u00f2, S., Ariu, D., Pelillo, M., Roli, F.: Is data clustering in adversarial settings secure? In: ACM Workshop AISec 2013, pp. 87\u201398 (2013)","DOI":"10.1145\/2517312.2517321"},{"key":"5_CR16","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. In: ICML (2012)"},{"key":"5_CR17","unstructured":"Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: CEAS (2009)"},{"key":"5_CR18","volume-title":"Algorithms for clustering data","author":"A.K. Jain","year":"1988","unstructured":"Jain, A.K., Dubes, R.C.: Algorithms for clustering data. Prentice-Hall, Inc., Upper Saddle River (1988)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Meil\u01ce, M.: Comparing clusterings: An axiomatic view. In: ICML, pp. 577\u2013584 (2005)","DOI":"10.1145\/1102351.1102424"},{"issue":"2-3","key":"5_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1023\/A:1012801612483","volume":"17","author":"M. Halkidi","year":"2001","unstructured":"Halkidi, M., Batistakis, Y., Vazirgiannis, M.: On clustering validation techniques. Journal of Intelligent Information Systems\u00a017(2-3), 107\u2013145 (2001)","journal-title":"Journal of Intelligent Information Systems"},{"key":"5_CR21","unstructured":"LeCun, Y., Jackel, L., Bottou, L., Brunot, A., Cortes, C., Denker, J., Drucker, H., Guyon, I., M\u00fcller, U., S\u00e4ckinger, E., Simard, P., Vapnik, V.: Comparison of learning algorithms for handwritten digit recognition. In: Int\u2019l Conf. on Artificial Neural Networks, pp. 53\u201360 (1995)"}],"container-title":["Lecture Notes in Computer Science","Structural, Syntactic, and Statistical Pattern Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44415-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:26:51Z","timestamp":1558970811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44415-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662444146","9783662444153"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44415-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}