{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:50:57Z","timestamp":1772207457706,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100018693","name":"HORIZON EUROPE Framework Programme","doi-asserted-by":"publisher","award":["01058593"],"award-info":[{"award-number":["01058593"]}],"id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Slovak Technical University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In cybersecurity, live production data for predictive analysis pose a significant challenge due to the inherently secure nature of the domain. Although there are publicly available, synthesized, and artificially generated datasets, authentic scenarios are rarely encountered. For anomaly-based detection, the dynamic definition of thresholds has gained importance and attention in detecting abnormalities and preventing malicious activities. Unlike conventional threshold-based methods, deep learning data modeling provides a more nuanced perspective on network monitoring. This enables security systems to continually refine and adapt to the evolving situation in streaming data online, which is also our goal. Furthermore, our work in this paper contributes significantly to AIOps research, particularly through the deployment of our intelligent module that cooperates within a monitoring system in production. Our work addresses a crucial gap in the security research landscape toward more practical and effective secure strategies.<\/jats:p>","DOI":"10.1007\/s00521-024-09863-z","type":"journal-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T18:01:38Z","timestamp":1715450498000},"page":"14925-14949","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Network security AIOps for online stream data monitoring"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6769-0195","authenticated-orcid":false,"given":"Giang","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Dlugolinsky","sequence":"additional","affiliation":[]},{"given":"Viet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro","family":"L\u00f3pez Garc\u00eda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"issue":"3","key":"9863_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MCE.2021.3081874","volume":"11","author":"L Tan","year":"2021","unstructured":"Tan L, Yu K, Ming F, Cheng X, Srivastava G (2021) Secure and resilient artificial intelligence of things: a honeynet approach for threat detection and situational awareness. IEEE Consum Electron Mag 11(3):69\u201378. https:\/\/doi.org\/10.1109\/MCE.2021.3081874","journal-title":"IEEE Consum Electron Mag"},{"issue":"2","key":"9863_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3494832","volume":"55","author":"C Fahy","year":"2022","unstructured":"Fahy C, Yang S, Gongora M (2022) Scarcity of labels in non-stationary data streams: a survey. ACM Comput Surv 55(2):1\u201339. https:\/\/doi.org\/10.1145\/3494832","journal-title":"ACM Comput Surv"},{"key":"9863_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102595","volume":"159","author":"JCC Chica","year":"2020","unstructured":"Chica JCC, Imbachi JC, Vega JFB (2020) Security in SDN: a comprehensive survey. J Netw Comput Appl 159:102595. https:\/\/doi.org\/10.1016\/j.jnca.2020.102595","journal-title":"J Netw Comput Appl"},{"key":"9863_CR4","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365\u201335381. https:\/\/doi.org\/10.1109\/ACCESS.2018.2836950","journal-title":"IEEE Access"},{"key":"9863_CR5","doi-asserted-by":"publisher","first-page":"2397","DOI":"10.1109\/TIFS.2021.3054966","volume":"16","author":"A Nisioti","year":"2021","unstructured":"Nisioti A, Loukas G, Laszka A, Panaousis E (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Trans Inf Forensics Secur 16:2397\u20132412. https:\/\/doi.org\/10.1109\/TIFS.2021.3054966","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9863_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.bdr.2015.11.002","volume":"3","author":"Z Chen","year":"2016","unstructured":"Chen Z, Xu G, Mahalingam V, Ge L, Nguyen J, Yu W, Lu C (2016) A cloud computing based network monitoring and threat detection system for critical infrastructures. Big Data Res 3:10\u201323. https:\/\/doi.org\/10.1016\/j.bdr.2015.11.002","journal-title":"Big Data Res"},{"issue":"4","key":"9863_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3494564","volume":"16","author":"S Bhatia","year":"2022","unstructured":"Bhatia S, Liu R, Hooi B, Yoon M, Shin K, Faloutsos C (2022) Real-time anomaly detection in edge streams. ACM Trans Knowl Discov Data 16(4):1\u201322. https:\/\/doi.org\/10.1145\/3494564","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"1","key":"9863_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1):1\u201322. https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecurity"},{"issue":"1","key":"9863_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1177\/1548512920951275","volume":"19","author":"D Dasgupta","year":"2022","unstructured":"Dasgupta D, Akhtar Z, Sen S (2022) Machine learning in cybersecurity: a comprehensive survey. J Def Model Simul 19(1):57\u2013106. https:\/\/doi.org\/10.1177\/1548512920951275","journal-title":"J Def Model Simul"},{"key":"9863_CR10","doi-asserted-by":"publisher","unstructured":"Azeez NA, Bada TM, Misra S, Adewumi A, Vyver C, Ahuja R (2020) Intrusion detection and prevention systems: an updated review. In: Data management, analytics and innovation: proceedings of ICDMAI 2019, vol 1, pp 685\u2013696. https:\/\/doi.org\/10.1007\/978-981-32-9949-8_48","DOI":"10.1007\/978-981-32-9949-8_48"},{"key":"9863_CR11","unstructured":"Cooper S (2023) Intrusion detection systems explained: 14 Best IDS software tools reviewed. Accessed 11 Nov 2023. https:\/\/www.comparitech.com\/net-admin\/network-intrusion-detection-tools\/"},{"key":"9863_CR12","unstructured":"BasuMallick C (2022) Top 10 network behavior analysis software in 2022. Accessed 11 Nov 2023. https:\/\/www.spiceworks.com\/tech\/networking\/articles\/best-nba-software\/"},{"key":"9863_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3389\/fcomp.2020.00036","volume":"2","author":"A Ibrahim","year":"2020","unstructured":"Ibrahim A, Thiruvady D, Schneider J, Abdelrazek M (2020) The challenges of leveraging threat intelligence to stop data breaches. Front Comput Sci 2:36. https:\/\/doi.org\/10.3389\/fcomp.2020.00036","journal-title":"Front Comput Sci"},{"key":"9863_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106326","volume":"123","author":"L Melgar-Garc\u00eda","year":"2023","unstructured":"Melgar-Garc\u00eda L, Guti\u00e9rrez-Avil\u00e9s D, Rubio-Escudero C, Troncoso A (2023) Identifying novelties and anomalies for incremental learning in streaming time series forecasting. Eng Appl Artif Intell 123:106326. https:\/\/doi.org\/10.1016\/j.engappai.2023.106326","journal-title":"Eng Appl Artif Intell"},{"key":"9863_CR15","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.datak.2018.03.002","volume":"115","author":"G Nguyen","year":"2018","unstructured":"Nguyen G, Nguyen BM, Tran D, Hluchy L (2018) A heuristics approach to mine behavioural data logs in mobile malware detection system. Data Knowl Eng 115:129\u2013151. https:\/\/doi.org\/10.1016\/j.datak.2018.03.002","journal-title":"Data Knowl Eng"},{"key":"9863_CR16","doi-asserted-by":"publisher","first-page":"100964","DOI":"10.1109\/ACCESS.2019.2930832","volume":"7","author":"M Monshizadeh","year":"2019","unstructured":"Monshizadeh M, Khatri V, Atli BG, Kantola R, Yan Z (2019) Performance evaluation of a combined anomaly detection platform. IEEE Access 7:100964\u2013100978. https:\/\/doi.org\/10.1109\/ACCESS.2019.2930832","journal-title":"IEEE Access"},{"key":"9863_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840","volume":"188","author":"IF Kilincer","year":"2021","unstructured":"Kilincer IF, Ertam F, Sengur A (2021) Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput Netw 188:107840. https:\/\/doi.org\/10.1016\/j.comnet.2021.107840","journal-title":"Comput Netw"},{"key":"9863_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2109","author":"DC Le","year":"2020","unstructured":"Le DC, Zincir-Heywood N (2020) Exploring anomalous behaviour detection and classification for insider threat identification. Int J Netw Manag. https:\/\/doi.org\/10.1002\/nem.2109","journal-title":"Int J Netw Manag"},{"key":"9863_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.psep.2021.12.050","volume":"159","author":"AZ Djeddi","year":"2022","unstructured":"Djeddi AZ, Hafaifa A, Hadroug N, Iratni A (2022) Gas turbine availability improvement based on long short-term memory networks using deep learning of their failures data analysis. Process Saf Environ Prot 159:1\u201325. https:\/\/doi.org\/10.1016\/j.psep.2021.12.050","journal-title":"Process Saf Environ Prot"},{"key":"9863_CR20","doi-asserted-by":"publisher","DOI":"10.1186\/s43067-023-00081-6","author":"SA Sayed","year":"2023","unstructured":"Sayed SA, Abdel-Hamid Y, Hefny HA (2023) Artificial intelligence-based traffic flow prediction: a comprehensive review. J Electr Syst Inf Technol. https:\/\/doi.org\/10.1186\/s43067-023-00081-6","journal-title":"J Electr Syst Inf Technol"},{"key":"9863_CR21","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"S Ahmad","year":"2017","unstructured":"Ahmad S, Lavin A, Purdy S, Agha Z (2017) Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262:134\u2013147. https:\/\/doi.org\/10.1016\/j.neucom.2017.04.070","journal-title":"Neurocomputing"},{"key":"9863_CR22","doi-asserted-by":"publisher","first-page":"6119","DOI":"10.1007\/s00521-020-05386-5","volume":"33","author":"Y Sun","year":"2021","unstructured":"Sun Y, Dai H (2021) Constructing accuracy and diversity ensemble using pareto-based multi-objective learning for evolving data streams. Neural Comput Appl 33:6119\u20136132. https:\/\/doi.org\/10.1007\/s00521-020-05386-5","journal-title":"Neural Comput Appl"},{"key":"9863_CR23","doi-asserted-by":"publisher","unstructured":"Aguiar GJ, Cano A (2023) Enhancing concept drift detection in drifting and imbalanced data streams through meta-learning. In: 2023 IEEE international conference on big data (BigData). IEEE Computer Society, pp 2648\u20132657. https:\/\/doi.org\/10.1109\/BigData59044.2023.10386364","DOI":"10.1109\/BigData59044.2023.10386364"},{"key":"9863_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3339556","author":"AK Takele","year":"2023","unstructured":"Takele AK, Vill\u00e1ny B (2023) LSTM-autoencoder based incremental learning for industrial Internet of Things. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2023.3339556","journal-title":"IEEE Access"},{"key":"9863_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419. https:\/\/doi.org\/10.1016\/j.jisa.2019.102419","journal-title":"J Inf Secur Appl"},{"key":"9863_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4149","author":"IS Thaseen","year":"2020","unstructured":"Thaseen IS, Chitturi AK, Al-Turjman F, Shankar A, Ghalib MR, Abhishek K (2020) An intelligent ensemble of long-short-term memory with genetic algorithm for network anomaly identification. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.4149","journal-title":"Trans Emerg Telecommun Technol"},{"key":"9863_CR27","unstructured":"Tang B, Matteson DS (2021) Probabilistic transformer for time series analysis. In: Advances in neural information processing systems, vol 34, pp 23592\u201323608. https:\/\/proceedings.neurips.cc\/paper\/2021\/file\/c68bd9055776bf38d8fc43c0ed283678-Paper.pdf"},{"key":"9863_CR28","doi-asserted-by":"publisher","unstructured":"Zerveas G, Jayaraman S, Patel D, Bhamidipaty A, Eickhoff C (2021) A transformer-based framework for multivariate time series representation learning. In: Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining, pp 2114\u20132124. https:\/\/doi.org\/10.1145\/3447548.3467401","DOI":"10.1145\/3447548.3467401"},{"key":"9863_CR29","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. In: Advances in neural information processing systems, vol 30. https:\/\/proceedings.neurips.cc\/paper\/2017\/file\/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf"},{"issue":"1","key":"9863_CR30","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s12530-020-09342-5","volume":"12","author":"D P\u00e9rez","year":"2021","unstructured":"P\u00e9rez D, Alonso S, Mor\u00e1n A, Prada MA, Fuertes JJ, Dom\u00ednguez M (2021) Evaluation of feature learning for anomaly detection in network traffic. Evol Syst 12(1):79\u201390. https:\/\/doi.org\/10.1007\/s12530-020-09342-5","journal-title":"Evol Syst"},{"key":"9863_CR31","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military communications and information systems conference (MilCIS). IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"9863_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111143","volume":"150","author":"SI P\u00e9rez","year":"2021","unstructured":"P\u00e9rez SI, Moral-Rubio S, Criado R (2021) A new approach to combine multiplex networks and time series attributes: building intrusion detection systems (IDS) in cybersecurity. Chaos Solitons Fractals 150:111143. https:\/\/doi.org\/10.1016\/j.chaos.2021.111143","journal-title":"Chaos Solitons Fractals"},{"issue":"4","key":"9863_CR33","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10618-019-00619-1","volume":"33","author":"H Ismail Fawaz","year":"2019","unstructured":"Ismail Fawaz H, Forestier G, Weber J, Idoumghar L, Muller P-A (2019) Deep learning for time series classification: a review. Data Min Knowl Disc 33(4):917\u2013963. https:\/\/doi.org\/10.1007\/s10618-019-00619-1","journal-title":"Data Min Knowl Disc"},{"issue":"2194","key":"9863_CR34","doi-asserted-by":"publisher","first-page":"20200209","DOI":"10.1098\/rsta.2020.0209","volume":"379","author":"B Lim","year":"2021","unstructured":"Lim B, Zohren S (2021) Time-series forecasting with deep learning: a survey. Philos Trans R Soc A 379(2194):20200209. https:\/\/doi.org\/10.1098\/rsta.2020.0209","journal-title":"Philos Trans R Soc A"},{"issue":"4","key":"9863_CR35","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1016\/j.ijforecast.2021.03.012","volume":"37","author":"B Lim","year":"2021","unstructured":"Lim B, Ar\u0131k S\u00d6, Loeff N, Pfister T (2021) Temporal fusion transformers for interpretable multi-horizon time series forecasting. Int J Forecast 37(4):1748\u20131764. https:\/\/doi.org\/10.1016\/j.ijforecast.2021.03.012","journal-title":"Int J Forecast"},{"issue":"1","key":"9863_CR36","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/07350015.2019.1620074","volume":"39","author":"R Quaedvlieg","year":"2021","unstructured":"Quaedvlieg R (2021) Multi-horizon forecast comparison. J Bus Econ Stat 39(1):40\u201353. https:\/\/doi.org\/10.1080\/07350015.2019.1620074","journal-title":"J Bus Econ Stat"},{"key":"9863_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10283-5","author":"Y Yang","year":"2022","unstructured":"Yang Y, Lv H, Chen N (2022) A survey on ensemble learning under the era of deep learning. Artif Intell Rev. https:\/\/doi.org\/10.1007\/s10462-022-10283-5","journal-title":"Artif Intell Rev"},{"key":"9863_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105151","volume":"115","author":"MA Ganaie","year":"2022","unstructured":"Ganaie MA, Hu M, Malik A, Tanveer M, Suganthan P (2022) Ensemble deep learning: a review. Eng Appl Artif Intell 115:105151. https:\/\/doi.org\/10.1016\/j.engappai.2022.105151","journal-title":"Eng Appl Artif Intell"},{"issue":"6","key":"9863_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3533378","volume":"55","author":"A Paleyes","year":"2022","unstructured":"Paleyes A, Urma R-G, Lawrence ND (2022) Challenges in deploying machine learning: a survey of case studies. ACM Comput Surv 55(6):1\u201329. https:\/\/doi.org\/10.1145\/3533378","journal-title":"ACM Comput Surv"},{"key":"9863_CR40","volume-title":"Security with AI and machine learning","author":"L Gil","year":"2019","unstructured":"Gil L, Liska A (2019) Security with AI and machine learning, 1st edn. O\u2019Reilly Media, Inc., Sebastopol","edition":"1"},{"issue":"2","key":"9863_CR41","doi-asserted-by":"publisher","first-page":"22","DOI":"10.3390\/data7020022","volume":"7","author":"A Alshaibi","year":"2022","unstructured":"Alshaibi A, Al-Ani M, Al-Azzawi A, Konev A, Shelupanov A (2022) The comparison of cybersecurity datasets. Data 7(2):22. https:\/\/doi.org\/10.3390\/data7020022","journal-title":"Data"},{"issue":"4","key":"9863_CR42","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R Lippmann","year":"2000","unstructured":"Lippmann R, Haines JW, Fried DJ, Korba J, Das K (2000) The 1999 DARPA off-line intrusion detection evaluation. Comput Netw 34(4):579\u2013595. https:\/\/doi.org\/10.1016\/S1389-1286(00)00139-0","journal-title":"Comput Netw"},{"key":"9863_CR43","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"9863_CR44","unstructured":"UNB: Canadian Institute for Cybersecurity ISCX datasets. Accessed 11 Nov 2023 (2016). https:\/\/www.unb.ca\/cic\/datasets\/index.html"},{"key":"9863_CR45","doi-asserted-by":"crossref","unstructured":"Fontugne R, Borgnat P, Abry P, Fukuda K (2010) Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In: ACM CoNEXT 10. http:\/\/www.fukuda-lab.org\/mawilab\/index.html","DOI":"10.1145\/1921168.1921179"},{"issue":"4","key":"9863_CR46","first-page":"41","volume":"16","author":"M Ring","year":"2017","unstructured":"Ring M, Wunderlich S, Gr\u00fcdl D, Landes D, Hotho A (2017) Creation of flow-based data sets for intrusion detection. J Inf Warf 16(4):41\u201354","journal-title":"J Inf Warf"},{"key":"9863_CR47","doi-asserted-by":"publisher","first-page":"108","DOI":"10.5220\/0006639801080116","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108\u2013116. https:\/\/doi.org\/10.5220\/0006639801080116","journal-title":"ICISSp"},{"key":"9863_CR48","doi-asserted-by":"publisher","unstructured":"Division C (2023) Insider threat test dataset. Accessed 11:2016. https:\/\/doi.org\/10.1184\/R1\/12841247.v1","DOI":"10.1184\/R1\/12841247.v1"},{"key":"9863_CR49","doi-asserted-by":"publisher","first-page":"61346","DOI":"10.1109\/ACCESS.2021.3073598","volume":"9","author":"D Perdices","year":"2021","unstructured":"Perdices D, Garc\u00eda-Dorado JL, Ramos J, De Pool R, Aracil J (2021) Towards the automatic and schedule-aware alerting of internetwork time series. IEEE Access 9:61346\u201361358. https:\/\/doi.org\/10.1109\/ACCESS.2021.3073598","journal-title":"IEEE Access"},{"issue":"6","key":"9863_CR50","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1007\/s10994-021-05992-x","volume":"110","author":"R Bakirov","year":"2021","unstructured":"Bakirov R, Fay D, Gabrys B (2021) Automated adaptation strategies for stream learning. Mach Learn 110(6):1429\u20131462. https:\/\/doi.org\/10.1007\/s10994-021-05992-x","journal-title":"Mach Learn"},{"issue":"18","key":"9863_CR51","doi-asserted-by":"publisher","first-page":"15175","DOI":"10.1007\/s00521-021-06826-6","volume":"34","author":"A Basati","year":"2022","unstructured":"Basati A, Faghih MM (2022) DFE: efficient IoT network intrusion detection using deep feature extraction. Neural Comput Appl 34(18):15175\u201315195. https:\/\/doi.org\/10.1007\/s00521-021-06826-6","journal-title":"Neural Comput Appl"},{"issue":"1","key":"9863_CR52","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1109\/TNSM.2021.3053835","volume":"18","author":"D Perdices","year":"2021","unstructured":"Perdices D, Vergara JEL, Ramos J (2021) Deep-FDA: using functional data analysis and neural networks to characterize network services time series. IEEE Trans Netw Serv Manag 18(1):986\u2013999. https:\/\/doi.org\/10.1109\/TNSM.2021.3053835","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"9863_CR53","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.future.2021.07.037","volume":"126","author":"C Mart\u00edn","year":"2022","unstructured":"Mart\u00edn C, Langendoerfer P, Zarrin PS, D\u00edaz M, Rubio B (2022) Kafka-ML: connecting the data stream with ML\/AI frameworks. Futur Gener Comput Syst 126:15\u201333. https:\/\/doi.org\/10.1016\/j.future.2021.07.037","journal-title":"Futur Gener Comput Syst"},{"issue":"7","key":"9863_CR54","doi-asserted-by":"publisher","first-page":"4993","DOI":"10.1007\/s00521-021-06093-5","volume":"35","author":"PK Keserwani","year":"2023","unstructured":"Keserwani PK, Govil MC, Pilli ES (2023) An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques. Neural Comput Appl 35(7):4993\u20135013. https:\/\/doi.org\/10.1007\/s00521-021-06093-5","journal-title":"Neural Comput Appl"},{"key":"9863_CR55","doi-asserted-by":"publisher","first-page":"18681","DOI":"10.1109\/ACCESS.2020.2964386","volume":"8","author":"\u00c1L Garc\u00eda","year":"2020","unstructured":"Garc\u00eda \u00c1L, De Lucas JM, Antonacci M, Zu Castell W, David M, Hardt M, Iglesias LL, Molt\u00f3 G, Plociennik M, Tran V et al (2020) A cloud-based framework for machine learning workloads and applications. IEEE Access 8:18681\u201318692. https:\/\/doi.org\/10.1109\/ACCESS.2020.2964386","journal-title":"IEEE Access"},{"key":"9863_CR56","volume-title":"Time series analysis: forecasting and control","author":"GE Box","year":"2015","unstructured":"Box GE, Jenkins GM, Reinsel GC, Ljung GM (2015) Time series analysis: forecasting and control. Wiley, Hoboken"},{"key":"9863_CR57","volume-title":"Forecasting: principles and practice","author":"RJ Hyndman","year":"2018","unstructured":"Hyndman RJ, Athanasopoulos G (2018) Forecasting: principles and practice. OTexts, Melbourne"},{"key":"9863_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2020.2968718","volume":"8","author":"G Nguyen","year":"2020","unstructured":"Nguyen G, Dlugolinsky S, Tran V, L\u00f3pez Garc\u00eda \u00c1 (2020) Deep learning for proactive network monitoring and security protection. IEEE Access 8:1\u201321. https:\/\/doi.org\/10.1109\/ACCESS.2020.2968718","journal-title":"IEEE Access"},{"key":"9863_CR59","doi-asserted-by":"publisher","unstructured":"Goubeaud M, Jou\u00dfen P, Gmyrek N, Ghorban F, Kummert A (2021) White noise windows: data augmentation for time series. In: 2021 7th International conference on optimization and applications (ICOA). IEEE, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICOA51614.2021.9442656","DOI":"10.1109\/ICOA51614.2021.9442656"},{"issue":"366a","key":"9863_CR60","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1080\/01621459.1979.10482531","volume":"74","author":"DA Dickey","year":"1979","unstructured":"Dickey DA, Fuller WA (1979) Distribution of the estimators for autoregressive time series with a unit root. J Am Stat Assoc 74(366a):427\u2013431. https:\/\/doi.org\/10.1080\/01621459.1979.10482531","journal-title":"J Am Stat Assoc"},{"key":"9863_CR61","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-023-11239-8","author":"V Cerqueira","year":"2023","unstructured":"Cerqueira V, Torgo L, Soares C (2023) Model selection for time series forecasting an empirical analysis of multiple estimators. Neural Process Lett. https:\/\/doi.org\/10.1007\/s11063-023-11239-8","journal-title":"Neural Process Lett"},{"key":"9863_CR62","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08459-3","author":"E Talavera","year":"2023","unstructured":"Talavera E, Iglesias G, Gonz\u00e1lez-Prieto \u00c1, Mozo A, G\u00f3mez-Canaval S (2023) Data augmentation techniques in time series domain: a survey and taxonomy. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-023-08459-3","journal-title":"Neural Comput Appl"},{"key":"9863_CR63","unstructured":"Lamb AM, Alis Parth\u00a0Goyal AG, Zhang Y, Zhang S, Courville AC, Bengio Y (2016) Professor forcing: a new algorithm for training recurrent networks. In: Advances in neural information processing systems, vol 29. https:\/\/proceedings.neurips.cc\/paper\/2016\/file\/16026d60ff9b54410b3435b403afd226-Paper.pdf"},{"issue":"18","key":"9863_CR64","doi-asserted-by":"publisher","first-page":"15197","DOI":"10.1007\/s00521-022-07065-z","volume":"34","author":"SR Pokhrel","year":"2022","unstructured":"Pokhrel SR (2022) Learning from data streams for automation and orchestration of 6g industrial IoT: toward a semantic communication framework. Neural Comput Appl 34(18):15197\u201315206. https:\/\/doi.org\/10.1007\/s00521-022-07065-z","journal-title":"Neural Comput Appl"},{"key":"9863_CR65","unstructured":"ZEEK (2023) Zeek\u2019s example logs. Accessed 11 Nov 2023. https:\/\/docs.zeek.org\/en\/current\/examples\/logs\/"},{"key":"9863_CR66","unstructured":"Zeek (2024) Zeek documentation\u2014Quick Start Guide\u2014Book of Zeek. Accessed 26 Jan 2024. https:\/\/docs.zeek.org\/en\/master\/quickstart.html"},{"key":"9863_CR67","unstructured":"Snoek J, Larochelle H, Adams RP (2012) Practical Bayesian optimization of machine learning algorithms. In: Advances in neural information processing systems, vol 25"},{"issue":"1","key":"9863_CR68","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10462-018-09679-z","volume":"52","author":"G Nguyen","year":"2019","unstructured":"Nguyen G, Dlugolinsky S, Bob\u00e1k M, Tran V, L\u00f3pez Garc\u00eda \u00c1, Heredia I, Mal\u00edk P, Hluch\u00fd L (2019) Machine learning and deep learning frameworks and libraries for large-scale data mining: a survey. Artif Intell Rev 52(1):77\u2013124. https:\/\/doi.org\/10.1007\/s10462-018-09679-z","journal-title":"Artif Intell Rev"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09863-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-09863-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09863-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T10:09:41Z","timestamp":1724148581000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-09863-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":68,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["9863"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-09863-z","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"13 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known conflict of interest or competing financial interests that could appear to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}