{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T13:56:30Z","timestamp":1777038990252,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_16","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:28:47Z","timestamp":1767320927000},"page":"296-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Adaptive Network Defense: A Self-evolving Threat Detection Framework"],"prefix":"10.1007","author":[{"given":"Chaoqun","family":"Guo","sequence":"first","affiliation":[]},{"given":"Dalin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.procs.2022.03.029","volume":"201","author":"EE Abdallah","year":"2022","unstructured":"Abdallah, E.E., Otoom, A.F., et al.: Intrusion detection systems using supervised machine learning techniques: a survey. Procedia Comput. Sci. 201, 205\u2013212 (2022)","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"16_CR2","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutorials 21(2), 1851\u20131877 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Belouadah, E., Popescu, A.: Il2m: class incremental learning with dual memory. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 583\u2013592 (2019)","DOI":"10.1109\/ICCV.2019.00067"},{"key":"16_CR4","unstructured":"Berthelot, D., Carlini, N., Goodfellow, I., Papernot, N., Oliver, A., Raffel, C.A.: Mixmatch: a holistic approach to semi-supervised learning. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Bilge, L., Dumitra\u015f, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 833\u2013844 (2012)","DOI":"10.1145\/2382196.2382284"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., Hartog, F.T.H.D.: Ton_iot: the role of heterogeneity and the need for standardization of features and attack types in iot network intrusion data sets. IEEE Internet Things J. 9(1), 485\u2013496 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3085194","DOI":"10.1109\/JIOT.2021.3085194"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Cermelli, F., Fontanel, D., Tavera, A., Ciccone, M., Caputo, B.: Incremental learning in semantic segmentation from image labels. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4371\u20134381 (2022)","DOI":"10.1109\/CVPR52688.2022.00433"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Chen, C., Gong, Y., Tian, Y.: Semi-supervised learning methods for network intrusion detection. In: 2008 IEEE international Conference on Systems, Man and Cybernetics, pp. 2603\u20132608. IEEE (2008)","DOI":"10.1109\/ICSMC.2008.4811688"},{"key":"16_CR9","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607. PmLR (2020)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Douillard, A., Cord, M., Ollion, C., Robert, T., Valle, E.: Podnet: pooled outputs distillation for small-tasks incremental learning. In: Computer vision\u2013ECCV 2020: 16th European conference, Glasgow, UK, 23\u201328 August 2020, Proceedings, part XX 16, pp. 86\u2013102. Springer (2020)","DOI":"10.1007\/978-3-030-58565-5_6"},{"issue":"2","key":"16_CR11","doi-asserted-by":"publisher","first-page":"2389","DOI":"10.1109\/TNSM.2023.3332284","volume":"21","author":"L Du","year":"2023","unstructured":"Du, L., Gu, Z., Wang, Y., Wang, L., Jia, Y.: A few-shot class-incremental learning method for network intrusion detection. IEEE Trans. Netw. Serv. Manage. 21(2), 2389\u20132401 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"16_CR12","unstructured":"Gepperth, A., Hammer, B.: Incremental learning algorithms and applications. In: European Symposium on Artificial Neural Networks (ESANN) (2016)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Guo, C., Wang, N., Sun, Y., Zhang, D.: Dtc: addressing the long-tailed problem in intrusion detection through the divide-then-conquer paradigm. In: 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS), pp. 1319\u20131326. IEEE (2023)","DOI":"10.1109\/ICPADS60453.2023.00189"},{"issue":"13","key":"16_CR14","doi-asserted-by":"publisher","first-page":"3521","DOI":"10.1073\/pnas.1611835114","volume":"114","author":"J Kirkpatrick","year":"2017","unstructured":"Kirkpatrick, J., et al.: Overcoming catastrophic forgetting in neural networks. Proc. Natl. Acad. Sci. 114(13), 3521\u20133526 (2017)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Lechat, A., Herbin, S., Jurie, F.: Pseudo-labeling for class incremental learning. In: BMVC 2021: The British Machine Vision Conference (2021)","DOI":"10.5244\/C.35.363"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Lechat, A., Herbin, S., Jurie, F.: Semi-supervised class incremental learning. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 10383\u201310389. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9413225"},{"key":"16_CR17","unstructured":"Lee, D.H., et\u00a0al.: Pseudo-label: the simple and efficient semi-supervised learning method for deep neural networks. In: Workshop on Challenges in Representation Learning, ICML. vol.\u00a03, p.\u00a0896. Atlanta (2013)"},{"issue":"12","key":"16_CR18","doi-asserted-by":"publisher","first-page":"2935","DOI":"10.1109\/TPAMI.2017.2773081","volume":"40","author":"Z Li","year":"2017","unstructured":"Li, Z., Hoiem, D.: Learning without forgetting. IEEE Trans. Pattern Anal. Mach. Intell. 40(12), 2935\u20132947 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military Communications and Information Systems Conference (MilCIS), pp.\u00a01\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"51\u201362","key":"16_CR20","first-page":"56","volume":"4","author":"V Nasteski","year":"2017","unstructured":"Nasteski, V.: An overview of the supervised machine learning methods. Horizons. b 4(51\u201362), 56 (2017)","journal-title":"Horizons. b"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Prabhu, A., Torr, P.H., Dokania, P.K.: Gdumb: a simple approach that questions our progress in continual learning. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, 23\u201328 August 2020, Proceedings, Part II 16, pp. 524\u2013540. Springer (2020)","DOI":"10.1007\/978-3-030-58536-5_31"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Rebuffi, S.A., Kolesnikov, A., Sperl, G., Lampert, C.H.: icarl: incremental classifier and representation learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2001\u20132010 (2017)","DOI":"10.1109\/CVPR.2017.587"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Sabeel, U., Heydari, S.S., El-Khatib, K., Elgazzar, K.: Incremental adversarial learning for polymorphic attack detection. IEEE Trans. Mach. Learn. Commun. Networking (2024)","DOI":"10.1109\/TMLCN.2024.3418756"},{"issue":"2018","key":"16_CR24","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A., et al.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1(2018), 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"Smith, J., Balloch, J., Hsu, Y.C., Kira, Z.: Memory-efficient semi-supervised continual learning: The world is its own replay buffer. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138 (2021). https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534361","DOI":"10.1109\/IJCNN52387.2021.9534361"},{"key":"16_CR26","first-page":"596","volume":"33","author":"K Sohn","year":"2020","unstructured":"Sohn, K., et al.: Fixmatch: simplifying semi-supervised learning with consistency and confidence. Adv. Neural. Inf. Process. Syst. 33, 596\u2013608 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"16_CR27","unstructured":"Tarvainen, A., Valpola, H.: Mean teachers are better role models: weight-averaged consistency targets improve semi-supervised deep learning results. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"issue":"12","key":"16_CR28","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1038\/s42256-022-00568-3","volume":"4","author":"GM Van de Ven","year":"2022","unstructured":"Van de Ven, G.M., Tuytelaars, T., Tolias, A.S.: Three types of incremental learning. Nat. Mach. Intell. 4(12), 1185\u20131197 (2022)","journal-title":"Nat. Mach. Intell."},{"key":"16_CR29","first-page":"6256","volume":"33","author":"Q Xie","year":"2020","unstructured":"Xie, Q., Dai, Z., Hovy, E., Luong, T., Le, Q.: Unsupervised data augmentation for consistency training. Adv. Neural. Inf. Process. Syst. 33, 6256\u20136268 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Xu, H., Wang, Y.: A continual few-shot learning method via meta-learning for intrusion detection. In: 2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT), pp. 1188\u20131194. IEEE (2022)","DOI":"10.1109\/ICCASIT55263.2022.9986665"},{"key":"16_CR31","unstructured":"Zbontar, J., Jing, L., Misra, I., LeCun, Y., Deny, S.: Barlow twins: self-supervised learning via redundancy reduction. In: International Conference on Machine Learning, pp. 12310\u201312320. PMLR (2021)"},{"key":"16_CR32","unstructured":"Zenke, F., Poole, B., Ganguli, S.: Continual learning through synaptic intelligence. In: International Conference on Machine Learning, pp. 3987\u20133995. PMLR (2017)"},{"key":"16_CR33","unstructured":"Zhu, X.J.: Semi-supervised learning literature survey (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:37:39Z","timestamp":1773214659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}