{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:48:09Z","timestamp":1742942889753,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":44,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819902712"},{"type":"electronic","value":"9789819902729"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-0272-9_38","type":"book-chapter","created":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:16:09Z","timestamp":1676470569000},"page":"545-555","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1350-8933","authenticated-orcid":false,"given":"Omar","family":"Alshaikh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1747-9914","authenticated-orcid":false,"given":"Simon","family":"Parkinson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8613-8200","authenticated-orcid":false,"given":"Saad","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,16]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Bikeev, I., Kabanov, P., Begishev, I., Khisamova, Z.: Criminological risks and legal aspects of artificial intelligence implementation. In: Proceedings of the International Conference on Artificial Intelligence, Information Processing and Cloud Computing, pp. 1\u20137 (2019)","DOI":"10.1145\/3371425.3371476"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Botchkarev, A.: A new typology design of performance metrics to measure errors in machine learning regression algorithms.\u00a0Interdisciplinary J. Information, Knowledge Manage.\u00a014, 45-76 (2019)","DOI":"10.28945\/4184"},{"key":"38_CR3","unstructured":"Cabinet Office: A strong Britain in an age of uncertainty: the national security strategy (Vol. 7953). The Stationery Office (2010)"},{"issue":"3-4","key":"38_CR4","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10472-017-9564-8","volume":"81","author":"O Caelen","year":"2017","unstructured":"Caelen, O.: A Bayesian interpretation of the confusion matrix. Ann. Math. Artif. Intell. 81(3\u20134), 429\u2013450 (2017)","journal-title":"Ann. Math. Artif. Intell."},{"issue":"6","key":"38_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01802","volume":"5","author":"EG Dada","year":"2019","unstructured":"Dada, E.G., Bassi, J.S., Chiroma, H., Adetunmbi, A.O., Ajibuwa, O.E.: Machine learning for email spam filtering: review, approaches and open research problems. Heliyon 5(6), e01802 (2019)","journal-title":"Heliyon"},{"key":"38_CR6","unstructured":"Dada, E.G.: A hybridized svm-knn-pdapso approach to intrusion detection system. In: Proc. Fac. Seminar Ser, pp. 14\u201321 (2017)"},{"key":"38_CR7","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.procs.2019.12.187","volume":"164","author":"M Dawson","year":"2019","unstructured":"Dawson, M., et al.: Applying software assurance and cybersecurity NICE job tasks through secure software engineering labs. Procedia Computer Sci. 164, 301\u2013312 (2019)","journal-title":"Procedia Computer Sci."},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"De Myttenaere, A., et al.: Mean absolute percentage error for regression models.\u00a0Neurocomputing 192, 38-48 (2016)","DOI":"10.1016\/j.neucom.2015.12.114"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Fan, C., et al.: A novel methodology to explain and evaluate data-driven building energy performance models based on interpretable machine learning. Applied Energy 235, 15511560 (2019)","DOI":"10.1016\/j.apenergy.2018.11.081"},{"issue":"11","key":"38_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., et al.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"38_CR11","unstructured":"Goodfellow, I., et al.: Generative adversarial nets.\u00a0Advances in Neural Information Processing Syst. 27 (2014)"},{"key":"38_CR12","first-page":"9","volume":"1","author":"N Grira","year":"2004","unstructured":"Grira, N., et al.: Unsupervised and semi-supervised clustering: a brief survey. A review of Machine Learning Techniques for Processing Multimedia Content 1, 9\u201316 (2004)","journal-title":"A review of Machine Learning Techniques for Processing Multimedia Content"},{"key":"38_CR13","unstructured":"HM government: National Cyber Security Strategy 2016\u20132021 (2016)"},{"issue":"2","key":"38_CR14","doi-asserted-by":"publisher","first-page":"161","DOI":"10.29220\/CSAM.2021.28.2.161","volume":"28","author":"CS Hong","year":"2021","unstructured":"Hong, C.S., et al.: TPR-TNR plot for confusion matrix. Communications for Statistical Appl. Methods 28(2), 161\u2013169 (2021)","journal-title":"Communications for Statistical Appl. Methods"},{"issue":"4","key":"38_CR15","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s11235-017-0414-0","volume":"68","author":"AK Jain","year":"2017","unstructured":"Jain, A.K., Gupta, B.B.: Towards detection of phishing websites on client-side using machine learning based approach. Telecommun. Syst. 68(4), 687\u2013700 (2017)","journal-title":"Telecommun. Syst."},{"key":"38_CR16","doi-asserted-by":"publisher","unstructured":"Keipour, H., Hazra, S., Finne, N., Voigt, T.: Generalizing supervised learning for intrusion detection in IoT mesh networks. In: Inernational Conference on Ubiquitous Security, pp. 214\u2013228. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-19-0468-4_16","DOI":"10.1007\/978-981-19-0468-4_16"},{"issue":"4","key":"38_CR17","first-page":"9469","volume":"22","author":"R Kesavamoorthy","year":"2018","unstructured":"Kesavamoorthy, R., Ruba Soundar, K.: Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system. Clust. Comput. 22(4), 9469\u20139476 (2018)","journal-title":"Clust. Comput."},{"key":"38_CR18","doi-asserted-by":"publisher","unstructured":"Khan, S., Parkinson, S.: Review into state of the art of vulnerability assessment using artificial intelligence. In: Guide to Vulnerability Analysis for Computer Networks and Systems, pp. 3\u201332. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92624-7_1","DOI":"10.1007\/978-3-319-92624-7_1"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., et al.: Assessment of various supervised learning algorithms using different performance metrics. In: IOP Conference Series: Materials Science and Engineering, 263(4), p. 042087). IOP Publishing (2017)","DOI":"10.1088\/1757-899X\/263\/4\/042087"},{"issue":"12","key":"38_CR20","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"J-H Li","year":"2018","unstructured":"Li, J.-H.: Cyber security meets artificial intelligence: a survey. Frontiers of Information Technol. Electronic Eng. 19(12), 1462\u20131474 (2018)","journal-title":"Frontiers of Information Technol. Electronic Eng."},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: A novel imbalanced data classification method based on weakly supervised learning for fault diagnosis.\u00a0IEEE Trans. Industrial Informatics 18(3), 15831593 (2021)","DOI":"10.1109\/TII.2021.3084132"},{"key":"38_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101682","volume":"89","author":"X Liu","year":"2020","unstructured":"Liu, X., et al.: A novel method for malware detection on ML-based visualization technique. Comput. Secur. 89, 101682 (2020)","journal-title":"Comput. Secur."},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Mahjabin, T., et al.: A survey of distributed denial-of-service attack, prevention, and mitigation techniques.\u00a0Int. J. Distributed Sensor Networks 13(12), 15501477 (2017)","DOI":"10.1177\/1550147717741463"},{"issue":"3","key":"38_CR24","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0194889","volume":"13","author":"S Makridakis","year":"2018","unstructured":"Makridakis, S., Spiliotis, E., Assimakopoulos, V.: Statistical and Machine Learning forecasting methods: concerns and ways forward. PLoS ONE 13(3), e0194889 (2018)","journal-title":"PLoS ONE"},{"key":"38_CR25","doi-asserted-by":"crossref","unstructured":"Olalere, M., et al.: Identification and evaluation of discriminative lexical features of malware URL for real-time classification. In: 2016 International Conference on Computer and Communication Engineering (ICCCE), pp. 90\u201395 (2016). IEEE","DOI":"10.1109\/ICCCE.2016.31"},{"issue":"2","key":"38_CR26","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1049\/bme2.12017","volume":"10","author":"S Parkinson","year":"2021","unstructured":"Parkinson, S., et al.: Password policy characteristics and keystroke biometric authentication. IET Biometrics 10(2), 163\u2013178 (2021)","journal-title":"IET Biometrics"},{"key":"38_CR27","doi-asserted-by":"crossref","unstructured":"Poudyal, S., Subedi, K.P., Dasgupta, D.: A framework for analyzing ransomware using machine learning. In: 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1692\u20131699 (2018). IEEE","DOI":"10.1109\/SSCI.2018.8628743"},{"key":"38_CR28","unstructured":"Ransbotham, S., et al.: Reshaping business with artificial intelligence: closing the gap between ambition and action. MIT Sloan Management Rev. 59(1) (2017)"},{"key":"38_CR29","doi-asserted-by":"crossref","unstructured":"Rashid, J., et al.: Phishing detection using machine learning technique. In: 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), pp. 43\u201346 (2020). IEEE","DOI":"10.1109\/SMART-TECH49988.2020.00026"},{"key":"38_CR30","doi-asserted-by":"crossref","unstructured":"Rashidi, H.H., et al.: Artificial intelligence and machine learning in pathology: the present landscape of supervised methods.\u00a0Academic Pathology\u00a06, 2374289519873088 (2019)","DOI":"10.1177\/2374289519873088"},{"key":"38_CR31","doi-asserted-by":"publisher","unstructured":"Sammut, C., Webb, G.I.: Encyclopedia of Machine Learning. Springer Science & Business Media (2011). https:\/\/doi.org\/10.1007\/978-0-387-30164-8","DOI":"10.1007\/978-0-387-30164-8"},{"issue":"9","key":"38_CR32","first-page":"332","volume":"10","author":"A Saputra","year":"2019","unstructured":"Saputra, A., Suharjito, S.: Fraud detection using machine learning in e-Commerce. Int. J. Adv. Comput. Sci. Appl 10(9), 332\u2013339 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"key":"38_CR33","unstructured":"Segars, S.: AI today, AI tomorrow. Awareness, Acceptance and Anticipation of AI: A Global Consumer Perspective (2018)"},{"key":"38_CR34","doi-asserted-by":"crossref","unstructured":"Selvakumari, M., et al.: Phishing website detection using machine learning and deep learning techniques. In: Journal of Physics: Conference Series 1916(1), p. 012169 (2021). IOP Publishing","DOI":"10.1088\/1742-6596\/1916\/1\/012169"},{"key":"38_CR35","unstructured":"Shahrivari, V., et al.: Phishing Detection Using Machine Learning Techniques. arXiv preprint arXiv:2009.11116 (2020)"},{"key":"38_CR36","doi-asserted-by":"crossref","unstructured":"Sharma, S., et al.: A survey on analysis and detection of android ransomware.\u00a0Concurrency and Computation: Practice and Experience 33(16), e6272 (2021)","DOI":"10.1002\/cpe.6272"},{"key":"38_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101861","volume":"112","author":"J Singh","year":"2021","unstructured":"Singh, J., Singh, J.: A survey on machine learning-based malware detection in executable files. J. Syst. Architect. 112, 101861 (2021)","journal-title":"J. Syst. Architect."},{"key":"38_CR38","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.dss.2018.01.001","volume":"107","author":"S Smadi","year":"2018","unstructured":"Smadi, S., Aslam, N., Zhang, L.: Detection of online phishing email using dynamic evolving neural network based on reinforcement learning. Decis. Support Syst. 107, 88\u2013102 (2018)","journal-title":"Decis. Support Syst."},{"issue":"4","key":"38_CR39","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manage. 45(4), 427\u2013437 (2009)","journal-title":"Inf. Process. Manage."},{"key":"38_CR40","doi-asserted-by":"crossref","unstructured":"Verizon 2021 Data Breach Investigations Report (2021)","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"38_CR41","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.swevo.2017.07.002","volume":"38","author":"JM Vidal","year":"2018","unstructured":"Vidal, J.M., et al.: Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evol. Comput. 38, 94\u2013108 (2018)","journal-title":"Swarm Evol. Comput."},{"key":"38_CR42","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., et al.: Ransomware triage using deep learning: twitter as a case study. In: 2019 Cybersecurity and Cyberforensics Conference (CCC), pp. 67\u201373 (2019)","DOI":"10.1109\/CCC.2019.000-7"},{"issue":"6","key":"38_CR43","first-page":"599","volume":"12","author":"\u017d Vujovi\u0107","year":"2021","unstructured":"Vujovi\u0107, \u017d: Classification model evaluation metrics. Int. J. Advance Computer Science and Appl. 12(6), 599\u2013606 (2021)","journal-title":"Int. J. Advance Computer Science and Appl."},{"key":"38_CR44","doi-asserted-by":"crossref","unstructured":"Wood, P., et al.: Internet Security Threat Report 2011, 17 (2016)","DOI":"10.1016\/S1353-4858(16)30097-6"}],"container-title":["Communications in Computer and Information Science","Ubiquitous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-0272-9_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T09:24:29Z","timestamp":1728897869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-0272-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819902712","9789819902729"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-0272-9_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"16 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UbiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ubisec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ubisecurity.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}