{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T23:07:45Z","timestamp":1777331265597,"version":"3.51.4"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10723-018-9465-z","type":"journal-article","created":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T04:41:03Z","timestamp":1535776863000},"page":"607-626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A Dynamic Spark-based Classification Framework for Imbalanced Big Data"],"prefix":"10.1007","volume":"16","author":[{"given":"Nahla B.","family":"Abdel-Hamid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5430-390X","authenticated-orcid":false,"given":"Sally","family":"ElGhamrawy","sequence":"additional","affiliation":[]},{"given":"Ali El","family":"Desouky","sequence":"additional","affiliation":[]},{"given":"Hesham","family":"Arafat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,1]]},"reference":[{"issue":"3","key":"9465_CR1","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s10723-016-9371-1","volume":"14","author":"F Bajaber","year":"2016","unstructured":"Bajaber, F., Elshawi, R., Batarfi, O., Altalhi, A., Barnawi, A., Sakr, S.: Big data 2.0 processing systems: taxonomy and open challenges. J. Grid Comput. 14(3), 379\u2013405 (2016)","journal-title":"J. Grid Comput."},{"issue":"4","key":"9465_CR2","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/s10723-012-9233-4","volume":"10","author":"S Shahand","year":"2012","unstructured":"Shahand, S., Santcroos, M., van Kampen, A.H., Olabarriaga, S.D.: A grid-enabled gateway for biomedical data analysis. J. Grid Comput. 10(4), 725\u201342 (2012)","journal-title":"J. Grid Comput."},{"key":"9465_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.asoc.2013.10.024","volume":"20","author":"C-H Chen","year":"2014","unstructured":"Chen, C.-H.: A hybrid intelligent model of analyzing clinical breast cancer data using clustering techniques with feature selection. Appl. Soft Comput. 20, 4\u201314 (2014)","journal-title":"Appl. Soft Comput."},{"key":"9465_CR4","first-page":"341","volume":"16","author":"N Chawla","year":"2002","unstructured":"Chawla, N., Bowyer, K., Hall, L., Kegelmeyer, W.: SMOTE: Synthetic minority oversampling technique. J. Artif. Intell. 16, 341\u2013378 (2002)","journal-title":"J. Artif. Intell."},{"key":"9465_CR5","doi-asserted-by":"crossref","unstructured":"Han, H., Wang, W., Mao, B.: Borderline-SMOTE: a new oversampling method in imbalance data set learning. In: Proceedings of International Conference on Intelligent Computing, pp 878\u2013887. Springer, Berlin (2005)","DOI":"10.1007\/11538059_91"},{"issue":"3","key":"9465_CR6","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s10723-017-9404-4","volume":"15","author":"Z Tang","year":"2017","unstructured":"Tang, Z., Fu, Z., Gong, Z., Li, K., Li, K.: A parallel conditional random fields model based on Spark computing environment. J. Grid Comput. 15(3), 323\u201342 (2017)","journal-title":"J. Grid Comput."},{"issue":"3","key":"9465_CR7","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/s10723-014-9303-x","volume":"12","author":"S Kim","year":"2014","unstructured":"Kim, S., Kim, J., Weissman, J.B.: A security-enabled grid system for MINDS distributed data mining. J. Grid Comput. 12(3), 521\u201342 (2014)","journal-title":"J. Grid Comput."},{"key":"9465_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.inffus.2017.03.007","volume":"39","author":"J Li","year":"2018","unstructured":"Li, J., Fong, S., Wong, R.K., Chu, V.W.: Adaptive multi-objective swarm fusion for imbalanced data classification. Inf. Fusion. 39, 1\u201324 (2018). https:\/\/doi.org\/10.1016\/j.inffus.2017.03.007","journal-title":"Inf. Fusion."},{"key":"9465_CR9","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-39804-2_12","volume-title":"Knowledge Discovery in Databases: PKDD 2003","author":"Nitesh V. Chawla","year":"2003","unstructured":"Chawla, N.V., Lazarevic, A., Hall, L.O., Bowyer, K.W.: SMOTEBoost: Improving prediction of the minority class in boosting. In: European Conference on Principles of Data Mining and Knowledge Discovery, pp 107\u2013119. Springer, Berlin (2003)"},{"issue":"1","key":"9465_CR10","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1186\/1471-2105-14-106","volume":"14","author":"Rok Blagus","year":"2013","unstructured":"Blagus, R., Lusa, L.: SMOTE For high-dimensional class-imbalanced data. BMC Bioinformatics 14, 106\u2013 (2013)","journal-title":"BMC Bioinformatics"},{"key":"9465_CR11","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TNN.2010.2066988","volume":"21","author":"S Chen","year":"2010","unstructured":"Chen, S., He, H., Garcia, E.: Ramoboost: ranked minority oversampling in boosting. IEEE Trans. Neural Netw. 21, 1624\u20131642 (2010)","journal-title":"IEEE Trans. Neural Netw."},{"key":"9465_CR12","first-page":"3255","volume":"41.8","author":"J Kun","year":"2016","unstructured":"Kun, J., Lu, J., Xia, K.: A novel algorithm for imbalance data classification based on genetic algorithm improved SMOTE. Arab. J. Sci. Eng. 41.8, 3255\u20133266 (2016)","journal-title":"Arab. J. Sci. Eng."},{"key":"9465_CR13","unstructured":"Chen, S., Guo, G.D., Chen, L.F.: Clustering ensembles-based classification method for imbalanced data sets. Patt. Recogn. Artif. Intell., 6 (2010)"},{"key":"9465_CR14","first-page":"3","volume":"43","author":"K Savetratanakaree","year":"2016","unstructured":"Savetratanakaree, K.: Borderline over-sampling in feature space for learning algorithms in imbalanced data environments. IAENG Int. J. Comput. Sci. 43, 3\u201312 (2016)","journal-title":"IAENG Int. J. Comput. Sci."},{"issue":"1","key":"9465_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: Techniques, systems and challenges. comput. secur. 28(1), 18\u201328 (2009)","journal-title":"comput. secur."},{"issue":"7","key":"9465_CR16","first-page":"26","volume":"28","author":"VVRPV Jyothsna","year":"2011","unstructured":"Jyothsna, V.V.R.P.V., Rama Prasad, V.V., Munivara Prasad, K.: A review of anomaly-based intrusion detection systems. Int. J. Comput. Appl. 28(7), 26\u201335 (2011)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"9465_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","volume":"36","author":"P Ahmed","year":"2013","unstructured":"Ahmed, P., Taghavi, M., Bakhtiyari, K., Celestino, J.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36(1), 25\u201341 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"9465_CR18","first-page":"67","volume":"1","author":"S Ms","year":"2012","unstructured":"Ms, S., Parag, K., Sneha Sontakke, M., Gawande, A.D.: Intrusion detection system for cloud computing. Int. J. Sci. Technol. Res. 1(4), 67\u201371 (2012)","journal-title":"Int. J. Sci. Technol. Res."},{"issue":"1","key":"9465_CR19","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"M Chirag","year":"2013","unstructured":"Chirag, M., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"9465_CR20","first-page":"166","volume":"2","author":"S Sethuramalingam","year":"2011","unstructured":"Sethuramalingam, S., Naganathan, R.: An efficient network intrusion detection using information gain and hierarchical clustering. Int. J. Advan. Res. Comput. Sci. 2(3), 166\u2013171 (2011)","journal-title":"Int. J. Advan. Res. Comput. Sci."},{"key":"9465_CR21","unstructured":"Pingjie, T., Jiang, R., Zhao, M.: Feature selection and design of intrusion detection system based on k-means and triangle area support vector machine. In: Second International Conference on Future Networks Feature ICFN\u201910, p 2010. IEEE (2010)"},{"issue":"7","key":"9465_CR22","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1016\/j.patrec.2008.01.008","volume":"29","author":"X Cheng","year":"2008","unstructured":"Cheng, X., Chin Yong, P., Swee Meng, L.: Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recogn. Lett. 29(7), 918\u2013924 (2008)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"9465_CR23","first-page":"37","volume":"2","author":"DMW Powers","year":"2011","unstructured":"Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, Informedness, Markedness & Correlation]. Mach. Learn. Technol. 2(1), 37\u201363 (2011)","journal-title":"Mach. Learn. Technol."},{"key":"9465_CR24","unstructured":"Lichman, M.: UCI machine learning repository (2013)"},{"key":"9465_CR25","doi-asserted-by":"crossref","unstructured":"El-Ghamrawy, S.M.: A Knowledge Management Framework for imbalanced data using Frequent Pattern Mining based on Bloom Filter. In: 2016 11th International Conference on Computer Engineering & Systems (ICCES), pp 226\u2013231. IEEE (2016)","DOI":"10.1109\/ICCES.2016.7822004"},{"key":"9465_CR26","doi-asserted-by":"crossref","unstructured":"Byron C.W., et al.: Class imbalance, Redux. Data Mining, ICDM). In: IEEE 11th International Conference, Vancouver, Canada, pp 754\u2013763 (2011)","DOI":"10.1109\/ICDM.2011.33"},{"key":"9465_CR27","doi-asserted-by":"crossref","unstructured":"Prachuabsupakij, W.: CLUS: a New hybrid sampling classification for imbalanced data. In: Proceedings of the 2015 12th International Joint Conference on Computer Science and Software Engineering, pp 281\u2013286. JCSSE (2015)","DOI":"10.1109\/JCSSE.2015.7219810"},{"key":"9465_CR28","doi-asserted-by":"crossref","unstructured":"Koto, F.: SMOTE-Out, SMOTE-Cosine, and Selected-SMOTE: an enhancement strategy to handle imbalance in data level. In: Proceedings of the ICACSIS 2014 International Conference on Advanced Computer Science and Information Systems, pp 280\u2013284 (2014)","DOI":"10.1109\/ICACSIS.2014.7065849"},{"key":"9465_CR29","doi-asserted-by":"crossref","unstructured":"Maciejewski T., Stefanowski, J.: Local neighbourhood extension of SMOTE for mining imbalanced data. In: 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp 104\u2013111. IEEE (2011)","DOI":"10.1109\/CIDM.2011.5949434"},{"key":"9465_CR30","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.patcog.2006.01.009","volume":"40","author":"J Xie","year":"2007","unstructured":"Xie, J., Qiu, Z.: The effect of imbalanced data sets on LDA: a theoretical and empirical analysis. Pattern Recogn. 40, 557\u2013562 (2007)","journal-title":"Pattern Recogn."},{"key":"9465_CR31","doi-asserted-by":"crossref","unstructured":"Ingre, B., Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: 2015 International Conference on Signal Processing and Communication Engineering Systems (SPACES), pp 92\u201396. IEEE (2015)","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"9465_CR32","doi-asserted-by":"crossref","unstructured":"Triguero, I., Galar, M., Merino, D., Maillo, J., Bustince, H., Herrera, F.: Evolutionary Undersampling for Extremely Imbalanced Big Data Classification under Apache Spark, 640\u2013647 (2016)","DOI":"10.1109\/CEC.2016.7743853"},{"key":"9465_CR33","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.ins.2014.03.043","volume":"285","author":"S Del R\u00edo","year":"2014","unstructured":"Del R\u00edo, S., L\u00f3pez, V., Ben\u00edtez, J.M., Herrera, F.: On the use of MapReduce for imbalanced big data using random forest. Inform. Sci. 285, 112\u201337 (2014)","journal-title":"Inform. Sci."},{"key":"9465_CR34","unstructured":"Farid, D.M., Harbi, N., Rahman, M.Z.: Combining naive Bayes and decision tree for adaptive intrusion detection. arXiv: 1005.4496 (2010)"},{"issue":"4","key":"9465_CR35","first-page":"89","volume":"6","author":"NA Noureldien","year":"2016","unstructured":"Noureldien, N.A., Yousif, I.M.: Accuracy of machine learning algorithms in detecting DoS attacks types. Sci. Technol. 6(4), 89\u201392 (2016)","journal-title":"Sci. Technol."}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10723-018-9465-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-018-9465-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-018-9465-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T19:14:49Z","timestamp":1751829289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10723-018-9465-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,1]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9465"],"URL":"https:\/\/doi.org\/10.1007\/s10723-018-9465-z","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,1]]},"assertion":[{"value":"31 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}