{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T09:25:37Z","timestamp":1751534737584,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811575297"},{"type":"electronic","value":"9789811575303"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-7530-3_44","type":"book-chapter","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:50:27Z","timestamp":1597333827000},"page":"584-593","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Systematic Review of Artificial Intelligence and Machine Learning Techniques for Cyber Security"],"prefix":"10.1007","author":[{"given":"Rahman","family":"Ali","sequence":"first","affiliation":[]},{"given":"Asmat","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Farkhund","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Asad Masood","family":"Khattak","sequence":"additional","affiliation":[]},{"given":"Saiqa","family":"Aleem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,14]]},"reference":[{"key":"44_CR1","volume-title":"Computer and Information Security Handbook","author":"JR Vacca","year":"2012","unstructured":"Vacca, J.R.: Computer and Information Security Handbook. Newnes, Oxford (2012)"},{"issue":"1","key":"44_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1\u201335 (2010)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"44_CR3","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"unstructured":"Torres, J.M., Comesa\u00f1a, C.I., Garc\u00eda-Nieto, P.J.: Machine learning techniques applied to cybersecurity. Int. J. Mach. Learn. Cybern. 10(10), 2823\u20132836 (2019)","key":"44_CR4"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Wickramasinghe, C.S., et al.: Generalization of deep learning for cyber-physical system security: a survey. In: IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society. IEEE (2018)","key":"44_CR6","DOI":"10.1109\/IECON.2018.8591773"},{"issue":"4","key":"44_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.3390\/info10040122","volume":"10","author":"DS Berman","year":"2019","unstructured":"Berman, D.S., et al.: A survey of deep learning methods for cyber security. Information 10(4), 122 (2019)","journal-title":"Information"},{"doi-asserted-by":"crossref","unstructured":"Thuraisingham, B., et al.: Data mining for security applications. In: 2008 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing. IEEE (2018)","key":"44_CR8","DOI":"10.1109\/EUC.2008.62"},{"key":"44_CR9","doi-asserted-by":"publisher","DOI":"10.1142\/p919","volume-title":"Data Analysis for Network Cyber-Security","author":"N Adams","year":"2014","unstructured":"Adams, N., et al.: Data Analysis for Network Cyber-Security. World Scientific Publishing Co. Inc., River Edge (2014)"},{"issue":"1\u20132","key":"44_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., et al.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"issue":"3","key":"44_CR11","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A Sperotto","year":"2010","unstructured":"Sperotto, A., et al.: An overview of IP flow-based intrusion detection. IEEE Commun. Surv. Tutor. 12(3), 343\u2013356 (2010)","journal-title":"IEEE Commun. Surv. Tutor."},{"unstructured":"Keele, S.: Guidelines for performing systematic literature reviews in software engineering, Technical report, Ver. 2.3 EBSE Technical Report. EBSE (2007)","key":"44_CR12"},{"key":"44_CR13","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cose.2016.07.002","volume":"64","author":"A Patel","year":"2017","unstructured":"Patel, A., et al.: A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. Comput. Secur. 64, 92\u2013109 (2017)","journal-title":"Comput. Secur."},{"key":"44_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.eswa.2018.05.031","volume":"110","author":"A Cohen","year":"2018","unstructured":"Cohen, A., Nissim, N., Elovici, Y.: Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods. Expert Syst. Appl. 110, 143\u2013169 (2018)","journal-title":"Expert Syst. Appl."},{"key":"44_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.robot.2017.10.006","volume":"99","author":"\u00c1M Guerrero-Higueras","year":"2018","unstructured":"Guerrero-Higueras, \u00c1.M., DeCastro-Garc\u00eda, N., Matell\u00e1n, V.: Detection of Cyber-attacks to indoor real time localization systems for autonomous robots. Robot. Auton. Syst. 99, 75\u201383 (2018)","journal-title":"Robot. Auton. Syst."},{"key":"44_CR16","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/j.procs.2017.12.079","volume":"125","author":"AK Jain","year":"2018","unstructured":"Jain, A.K., Gupta, B.B.: Rule-based framework for detection of smishing messages in mobile environment. Procedia Comput. Sci. 125, 617\u2013623 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"44_CR17","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.eswa.2017.09.053","volume":"92","author":"Z Katzir","year":"2018","unstructured":"Katzir, Z., Elovici, Y.: Quantifying the resilience of machine learning classifiers used for cyber security. Expert Syst. Appl. 92, 419\u2013429 (2018)","journal-title":"Expert Syst. Appl."},{"key":"44_CR18","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.datak.2018.03.002","volume":"115","author":"G Nguyen","year":"2018","unstructured":"Nguyen, G., et al.: A heuristics approach to mine behavioural data logs in mobile malware detection system. Data Knowl. Eng. 115, 129\u2013151 (2018)","journal-title":"Data Knowl. Eng."},{"key":"44_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.comcom.2019.08.003","volume":"147","author":"D Arivudainambi","year":"2019","unstructured":"Arivudainambi, D., et al.: Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance. Comput. Commun. 147, 50\u201357 (2019)","journal-title":"Comput. Commun."},{"key":"44_CR20","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.inffus.2018.12.006","volume":"52","author":"A Mart\u00edn","year":"2019","unstructured":"Mart\u00edn, A., Lara-Cabrera, R., Camacho, D.: Android malware detection through hybrid features fusion and ensemble classifiers: the AndroPyTool framework and the OmniDroid dataset. Inf. Fusion 52, 128\u2013142 (2019)","journal-title":"Inf. Fusion"},{"key":"44_CR21","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.future.2019.02.013","volume":"96","author":"U Noor","year":"2019","unstructured":"Noor, U., et al.: A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. Future Gener. Comput. Syst. 96, 227\u2013242 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"44_CR22","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz, O.K., et al.: Machine learning based phishing detection from URLs. Expert Syst. Appl. 117, 345\u2013357 (2019)","journal-title":"Expert Syst. Appl."},{"issue":"12","key":"44_CR23","doi-asserted-by":"publisher","first-page":"4822","DOI":"10.1109\/JSEN.2017.2782751","volume":"18","author":"H Al-Khateeb","year":"2017","unstructured":"Al-Khateeb, H., et al.: Proactive threat detection for connected cars using recursive Bayesian estimation. IEEE Sens. J. 18(12), 4822\u20134831 (2017)","journal-title":"IEEE Sens. J."},{"issue":"3","key":"44_CR24","first-page":"217","volume":"14","author":"KL Moore","year":"2017","unstructured":"Moore, K.L., et al.: Feature extraction and feature selection for classifying cyber traffic threats. J. Defense Model. Simul. Appl. Methodol. Technol. JDMS 14(3), 217\u2013231 (2017)","journal-title":"J. Defense Model. Simul. Appl. Methodol. Technol. JDMS"},{"issue":"1","key":"44_CR25","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/s10586-016-0716-0","volume":"20","author":"PK Sharma","year":"2016","unstructured":"Sharma, P.K., Moon, S.Y., Moon, D., Park, J.H.: DFA-AD: a distributed framework architecture for the detection of advanced persistent threats. Cluster Comput. 20(1), 597\u2013609 (2016). \nhttps:\/\/doi.org\/10.1007\/s10586-016-0716-0","journal-title":"Cluster Comput."},{"issue":"4","key":"44_CR26","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","volume":"9","author":"A Azmoodeh","year":"2017","unstructured":"Azmoodeh, A., Dehghantanha, A., Conti, M., Choo, K.-K.R.: Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intell. Human. Comput. 9(4), 1141\u20131152 (2017). \nhttps:\/\/doi.org\/10.1007\/s12652-017-0558-5","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"44_CR27","doi-asserted-by":"publisher","first-page":"14510","DOI":"10.1109\/ACCESS.2018.2805301","volume":"6","author":"J Fu","year":"2018","unstructured":"Fu, J., et al.: Malware visualization for fine-grained classification. IEEE Access 6, 14510\u201314523 (2018)","journal-title":"IEEE Access"},{"key":"44_CR28","first-page":"1","volume":"51","author":"WA Ghanem","year":"2019","unstructured":"Ghanem, W.A., Jantan, A.: Training a neural network for cyberattack classification applications using hybridization of an artificial bee colony and monarch butterfly optimization. Neural Process. Lett. 51, 1\u201342 (2019)","journal-title":"Neural Process. Lett."},{"issue":"19","key":"44_CR29","doi-asserted-by":"publisher","first-page":"4086","DOI":"10.3390\/app9194086","volume":"9","author":"Y Lee","year":"2019","unstructured":"Lee, Y., et al.: Instruction2vec: efficient preprocessor of assembly code to detect software weakness with CNN. Appl. Sci. 9(19), 4086 (2019)","journal-title":"Appl. Sci."},{"key":"44_CR30","doi-asserted-by":"publisher","first-page":"110050","DOI":"10.1109\/ACCESS.2019.2933197","volume":"7","author":"N Nissim","year":"2019","unstructured":"Nissim, N., et al.: Sec-Lib: protecting scholarly digital libraries from infected papers using active machine learning framework. IEEE Access 7, 110050\u2013110073 (2019)","journal-title":"IEEE Access"},{"issue":"9","key":"44_CR31","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.3390\/s19091977","volume":"19","author":"G Thamilarasu","year":"2019","unstructured":"Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019)","journal-title":"Sensors"},{"key":"44_CR32","doi-asserted-by":"publisher","first-page":"46717","DOI":"10.1109\/ACCESS.2019.2906934","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., et al.: Robust intelligent malware detection using deep learning. IEEE Access 7, 46717\u201346738 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"44_CR33","doi-asserted-by":"publisher","first-page":"384","DOI":"10.3390\/make1010022","volume":"1","author":"TR De Toledo","year":"2019","unstructured":"De Toledo, T.R., Torrisi, N.M.: Encrypted DNP3 traffic classification using supervised machine learning algorithms. Mach. Learn. Knowl. Extr. 1(1), 384\u2013399 (2019)","journal-title":"Mach. Learn. Knowl. Extr."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-7530-3_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T16:05:05Z","timestamp":1597334705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-7530-3_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811575297","9789811575303"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-7530-3_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OJS\/PKP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}