{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:30:54Z","timestamp":1773246654318,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T00:00:00Z","timestamp":1491955200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10489-017-0907-2","type":"journal-article","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T06:09:34Z","timestamp":1491977374000},"page":"558-569","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Evaluation of random forest classifier in security domain"],"prefix":"10.1007","volume":"47","author":[{"given":"Zeinab","family":"Khorshidpour","sequence":"first","affiliation":[]},{"given":"Sattar","family":"Hashemi","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Hamzeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,12]]},"reference":[{"key":"907_CR1","first-page":"133","volume-title":"Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on","author":"C Warrender","year":"1999","unstructured":"Warrender C, Forrest S, Pearlmutter B (1999) Detecting intrusions using system calls: Alternative data models Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on, pp 133\u2013145"},{"issue":"4","key":"907_CR2","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1007\/s10489-012-0383-7","volume":"38","author":"S Benferhat","year":"2013","unstructured":"Benferhat S, Boudjelida A, Tabia K, Drias H (2013) An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge. Appl Intell 38(4):520\u2013540","journal-title":"Appl Intell"},{"issue":"Sup. 2","key":"907_CR3","doi-asserted-by":"crossref","first-page":"2259","DOI":"10.3906\/elk-1112-55","volume":"21","author":"A Baran","year":"2013","unstructured":"Baran A (2013) Stopping spam with sending session verification. Turk J Electr Eng Comput Sci 21(Sup. 2):2259\u20132268","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"2","key":"907_CR4","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/s10489-010-0263-y","volume":"36","author":"K-C Khor","year":"2012","unstructured":"Khor K-C, Ting C-Y, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320\u2013329","journal-title":"Appl Intell"},{"key":"907_CR5","first-page":"2721","volume":"7","author":"J Zico Kolter","year":"2006","unstructured":"Zico Kolter J, Maloof MA (2006) Learning to detect and classify Malicious executables in the wild. J Mach Learn Res 7:2721\u20132744","journal-title":"J Mach Learn Res"},{"key":"907_CR6","doi-asserted-by":"crossref","unstructured":"Biggio B, Corona I, Maiorca D, Nelson B, \u0160xrndi\u0107 N, Laskov P, Giacinto G, Roli F (2013) Evasion attacks against machine learning at test time Machine Learning and Knowledge Discovery in Databases. Springer, pp 387\u2013402","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"907_CR7","doi-asserted-by":"crossref","unstructured":"Barreno M, Nelson B, Sears R, Joseph AD, Doug Tygar J (2006) Can machine learning be secure? Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp 16\u201325","DOI":"10.1145\/1128817.1128824"},{"issue":"4","key":"907_CR8","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1109\/TKDE.2013.57","volume":"26","author":"B Biggio","year":"2014","unstructured":"Biggio B, Fumera G, Roli F (2014) Security evaluation of pattern classifiers under attack. IEEE Trans Knowl Data Eng 26(4):984\u2013996","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"907_CR9","doi-asserted-by":"crossref","unstructured":"Zhang F, Chan PPK, Biggio B, Yeung DS, Rolim F (2015) Adversarial feature selection against evasion attacks","DOI":"10.1109\/TCYB.2015.2415032"},{"key":"907_CR10","doi-asserted-by":"crossref","unstructured":"Br\u00fcckner M, Scheffer T (2011) Stackelberg games for adversarial prediction problems Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 547\u2013555","DOI":"10.1145\/2020408.2020495"},{"issue":"1","key":"907_CR11","first-page":"2617","volume":"13","author":"M Br\u00fcckner","year":"2012","unstructured":"Br\u00fcckner M, Kanzow C, Scheffer T (2012) Static prediction games for adversarial learning problems. J Mach Learn Res 13(1):2617\u20132654","journal-title":"J Mach Learn Res"},{"issue":"3","key":"907_CR12","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MCAS.2006.1688199","volume":"6","author":"R Polikar","year":"2006","unstructured":"Polikar R (2006) Ensemble based systems in decision making. IEEE Circuits Syst Mag 6(3):21\u201345","journal-title":"IEEE Circuits Syst Mag"},{"issue":"1","key":"907_CR13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"4","key":"907_CR14","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1145\/279232.279236","volume":"23","author":"C Zhu","year":"1997","unstructured":"Zhu C, Byrd RH, Peihuang L, Nocedal J (1997) Algorithm 778: L-bfgs-b: Fortran subroutines for large-scale bound-constrained optimization. ACM Trans Math Softw (TOMS) 23(4):550\u2013560","journal-title":"ACM Trans Math Softw (TOMS)"},{"issue":"5","key":"907_CR15","doi-asserted-by":"crossref","first-page":"1190","DOI":"10.1137\/0916069","volume":"16","author":"RH Byrd","year":"1995","unstructured":"Byrd RH, Peihuang L, Nocedal J, Zhu C (1995) A limited memory algorithm for bound constrained optimization. SIAM J Sci Comput 16(5):1190\u20131208","journal-title":"SIAM J Sci Comput"},{"key":"907_CR16","unstructured":"Macdonald C, Ounis I, Soboroff I (2007) Overview of the trec 2007 blog track TREC, vol 7. Citeseer, pp 31\u201343"},{"key":"907_CR17","doi-asserted-by":"crossref","unstructured":"Maiorca D, Corona I, Giacinto G (2013) Looking at the bag is not enough to find the bomb: an evasion of structural methods for Malicious pdf files detection Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp 119\u2013130","DOI":"10.1145\/2484313.2484327"},{"key":"907_CR18","doi-asserted-by":"crossref","unstructured":"Maiorca D, Giacinto G, Corona I (2012) A pattern recognition system for malicious pdf files detection Machine Learning and Data Mining in Pattern Recognition. Springer, pp 510\u2013524","DOI":"10.1007\/978-3-642-31537-4_40"},{"key":"907_CR19","doi-asserted-by":"crossref","unstructured":"Smutz C, Stavrou A (2012) Malicious pdf detection using metadata and structural features Proceedings of the 28th Annual Computer Security Applications Conference, pp 239\u2013248","DOI":"10.1145\/2420950.2420987"},{"key":"907_CR20","unstructured":"S\u0307rndic N, Laskov P (2013) Detection of Malicious pdf files based on hierarchical document structure Proceedings of the 20th Annual Network & Distributed System Security Symposium"},{"key":"907_CR21","doi-asserted-by":"crossref","unstructured":"Corona I, Maiorca D, Ariu D, Giacinto G (2014) Lux0r: Detection of Malicious pdf-embedded javascript code through discriminant analysis of api references Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, pp 47\u2013 57","DOI":"10.1145\/2666652.2666657"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-017-0907-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-0907-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-0907-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T23:32:27Z","timestamp":1569022347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-017-0907-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,12]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["907"],"URL":"https:\/\/doi.org\/10.1007\/s10489-017-0907-2","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,12]]}}}