{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:48Z","timestamp":1742913648257,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557873"},{"type":"electronic","value":"9789811557880"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_15","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"159-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["WEKA Result Reader\u2014A Smart Tool for Reading and Summarizing WEKA Simulator Files"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6728-5977","authenticated-orcid":false,"given":"Ranjit","family":"Panigrahi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9304-3525","authenticated-orcid":false,"given":"Samarjeet","family":"Borah","sequence":"additional","affiliation":[]},{"given":"Udit Kumar","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"15_CR1","unstructured":"Witten, I.H, Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann, San Francisco (2011). Retrieved 19 Jan 2011"},{"key":"15_CR2","unstructured":"Wing, S., Johnson, J.R.: Machine Learning Techniques for Space Weather, pp. 113\u2013145. Elsevier. ISBN 9780128117880 (2018)"},{"issue":"2","key":"15_CR3","doi-asserted-by":"crossref","first-page":"217","DOI":"10.4103\/2455-5568.196883","volume":"2","author":"S Mishra","year":"2016","unstructured":"Mishra, S.: Understanding the calculation of the kappa statistic: a measure of inter-observer reliability. Int. J. Acad. Med. 2(2), 217 (2016)","journal-title":"Int. J. Acad. Med."},{"key":"15_CR4","unstructured":"Du, H.: Cohen\u2019s kappa in plain English, https:\/\/stats.stackexchange.com\/questions\/82162\/cohens-kappa-in-plain-english . Last accessed 8 Feb 2019"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Landis, J.R., Koch, G.G.: The measurement of observer agreement for categorical data. Biometrics 33(1), 159\u2013174. JSTOR 2529310. PMID 843571 (1977)","DOI":"10.2307\/2529310"},{"key":"15_CR6","unstructured":"Radford, B.J., Richardson, B.D., Davis, S.E.: Sequence aggregation rules for anomaly detection in computer network traffic. In: American Statistical Association, Symposium on Data Science and Statistics, pp. 1\u201313, May 2018"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Matthews, B.W.: Comparison of the predicted and observed secondary structure of T4 phage lysozyme. Biochim. Biophys. Acta (BBA) Protein Struct. 405(2), 442\u2013451 (1975)","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"15_CR11","unstructured":"SysGauge System Monitor, http:\/\/www.sysgauge.com\/ , Flexense Ltd. Last accessed 7 Feb 2019"},{"key":"15_CR12","unstructured":"SysGauge 5.8.16, https:\/\/www.techspot.com\/downloads\/6957-sysgauge.html , TechSpot Inc. Last accessed 7 Feb 2019"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Weik, M.H.: Page fault. In: Computer Science and Communications Dictionary. Springer, Boston, MA (2000)","DOI":"10.1007\/1-4020-0613-6_13489"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T00:58:55Z","timestamp":1696640335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}