{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:40:38Z","timestamp":1760740838385,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819534555"},{"type":"electronic","value":"9789819534562"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3456-2_21","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:23:25Z","timestamp":1760599405000},"page":"303-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Continual Drift Detection and\u00a0Adaptation for\u00a0Cybersecurity Applications"],"prefix":"10.1007","author":[{"given":"Mingrui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lei","family":"Du","sequence":"additional","affiliation":[]},{"given":"Mengjiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhaoquan","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. arxiv, arXiv preprint arXiv:1802.09089 (2018)","DOI":"10.14722\/ndss.2018.23204"},{"key":"21_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102198","volume":"105","author":"G Iadarola","year":"2021","unstructured":"Iadarola, G., Martinelli, F., Mercaldo, F., Santone, A.: Towards an interpretable deep learning model for mobile malware detection and family identification. Comput. Sec. 105, 102198 (2021)","journal-title":"Comput. Sec."},{"key":"21_CR3","first-page":"33","volume":"22","author":"T Lu","year":"2023","unstructured":"Lu, T., Wang, J.: Domr: towards deep open-world malware recognition. IEEE Trans. Inform. Forensics Sec. 22, 33 (2023)","journal-title":"IEEE Trans. Inform. Forensics Sec."},{"key":"21_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109320","volume":"217","author":"T Lu","year":"2022","unstructured":"Lu, T., Wang, J.: F2dc: android malware classification based on raw traffic and neural networks. Comput. Netw. 217, 109320 (2022)","journal-title":"Comput. Netw."},{"issue":"12","key":"21_CR5","first-page":"2346","volume":"31","author":"J Lu","year":"2018","unstructured":"Lu, J., Liu, A., Dong, F., Gu, F., Gama, J., Zhang, G.: Learning under concept drift: a review. IEEE Trans. Knowl. Data Eng. 31(12), 2346\u20132363 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"21_CR6","unstructured":"Yang., et al.: $$\\{$$CADE$$\\}$$: Detecting and explaining concept drift samples for security applications. In: 30th USENIX Security Symposium (USENIX Security 2021), pp.\u00a02327\u20132344 (2021)"},{"key":"21_CR7","unstructured":"Chen, Y., Ding, Z., Wagner, D.: Continuous learning for android malware detection. In: 32nd USENIX Security Symposium (USENIX Security 2023), pp.\u00a01127\u20131144 (2023)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Awasthi, A., Sarawagi, S.: Continual learning with neural networks: a review. In: Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, pp.\u00a0362\u2013365 (2019)","DOI":"10.1145\/3297001.3297062"},{"key":"21_CR9","unstructured":"Serra, J., Suris, D., Miron, M., Karatzoglou, A.: Overcoming catastrophic forgetting with hard attention to the task. In: International Conference on Machine Learning, pp.\u00a04548\u20134557. PMLR (2018)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K.: Statistical analysis of honeypot data and building of kyoto 2006+ dataset for nids evaluation. In: Proceedings of the first workshop on Building Analysis Datasets and Gathering Experience Returns For Security, pp.\u00a029\u201336 (2011)","DOI":"10.1145\/1978672.1978676"},{"key":"21_CR11","unstructured":"Kent, A.D.: Comprehensive, multi-source cyber-security events data set, tech. rep., Los Alamos National Lab.(LANL), Los Alamos, NM (United States) (2015)"},{"key":"21_CR12","unstructured":"Anderson, H.S., Roth, P: Ember: an open dataset for training static pe malware machine learning models, arXiv preprint arXiv:1804.04637 (2018)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Wang, S., Machida, F.: A robustness evaluation of concept drift detectors against unreliable data streams. In: 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), pp.\u00a0569\u2013574. IEEE (2021)","DOI":"10.1109\/WF-IoT51360.2021.9595202"},{"issue":"1","key":"21_CR14","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10994-019-05840-z","volume":"109","author":"A Cano","year":"2020","unstructured":"Cano, A., Krawczyk, B.: Kappa updated ensemble for drifting data stream mining. Mach. Learn. 109(1), 175\u2013218 (2020)","journal-title":"Mach. Learn."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Han, D., et al.:Anomaly detection in the open world: normality shift detection, explanation, and adaptation. In: NDSS (2023)","DOI":"10.14722\/ndss.2023.24830"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Yang, L., Ciptadi, A., Laziuk, I., Ahmadzadeh, A., Wang, G.: Bodmas: an open dataset for learning based temporal analysis of pe malware. In: 2021 IEEE Security and Privacy Workshops (SPW), pp.\u00a078\u201384. IEEE (2021)","DOI":"10.1109\/SPW53761.2021.00020"},{"key":"21_CR17","unstructured":"Rahman, M.S., Coull, S., Wright, M.: On the limitations of continual learning for malware classification. In: Conference on Lifelong Learning Agents, pp.\u00a0564\u2013582. PMLR (2022)"},{"issue":"1","key":"21_CR18","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.patcog.2007.05.018","volume":"41","author":"M Filippone","year":"2008","unstructured":"Filippone, M., Camastra, F., Masulli, F., Rovetta, S.: A survey of kernel and spectral methods for clustering. Pattern Recogn. 41(1), 176\u2013190 (2008)","journal-title":"Pattern Recogn."},{"key":"21_CR19","unstructured":"MacQueen, J., et\u00a0al.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Oakland, CA, USA, vol.\u00a01, pp.\u00a0281\u2013297 (1967)"},{"key":"21_CR20","first-page":"226","volume":"96","author":"M Ester","year":"1996","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. KDD 96, 226\u2013231 (1996)","journal-title":"KDD"},{"issue":"5786","key":"21_CR21","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504\u2013507 (2006)","journal-title":"Science"},{"key":"21_CR22","unstructured":"Xie, J., Girshick, R., Farhadi, A:. Unsupervised Deep Embedding For Clustering Analysis. In: International Conference on Machine Learning, pp.\u00a0478\u2013487. PMLR (2016)"},{"key":"21_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.knosys.2018.05.034","volume":"158","author":"X Xu","year":"2018","unstructured":"Xu, X., Ding, S., Shi, Z.: An improved density peaks clustering algorithm with fast finding cluster centers. Knowl.-Based Syst. 158, 65\u201374 (2018)","journal-title":"Knowl.-Based Syst."},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Barbero, F., Pendlebury, F., Pierazzi, F., Cavallaro, L.: Transcending transcend: revisiting malware classification in the presence of concept drift. In: 2022 IEEE Symposium on Security and Privacy (SP), pp.\u00a0805\u2013823. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833659"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp.\u00a0757\u2013770 (2020)","DOI":"10.1145\/3372297.3417291"},{"key":"21_CR26","first-page":"32854","volume":"35","author":"M Dragoi","year":"2022","unstructured":"Dragoi, M., Burceanu, E., Haller, E., Manolache, A., Brad, F.: Anoshift: a distribution shift benchmark for unsupervised anomaly detection. Adv. Neural. Inf. Process. Syst. 35, 32854\u201332867 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3456-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:03:46Z","timestamp":1760738626000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3456-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9789819534555","9789819534562"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3456-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2025.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}