{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:44Z","timestamp":1761402044947,"version":"3.37.3"},"reference-count":129,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T00:00:00Z","timestamp":1580342400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T00:00:00Z","timestamp":1580342400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s10922-020-09512-5","type":"journal-article","created":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T07:03:07Z","timestamp":1580367787000},"page":"827-849","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A Frontier: Dependable, Reliable and Secure Machine Learning for Network\/System Management"],"prefix":"10.1007","volume":"28","author":[{"given":"Duc C.","family":"Le","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2796-7265","authenticated-orcid":false,"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,30]]},"reference":[{"key":"9512_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b10867","volume-title":"Data Mining and Machine Learning in Cybersecurity","author":"S Dua","year":"2016","unstructured":"Dua, S., Du, X.: Data Mining and Machine Learning in Cybersecurity. Auerbach Publications, Boca Raton (2016)"},{"key":"9512_CR2","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016)"},{"doi-asserted-by":"crossref","unstructured":"Kalmbach, P., Zerwas, J., Babarczi, P., Blenk, A., Kellerer, W., Schmid, S.: Empowering self-driving networks. In: Proceedings of the afternoon workshop on self-driving networks, pp. 8\u201314. ACM, New York (2018)","key":"9512_CR3","DOI":"10.1145\/3229584.3229587"},{"issue":"4","key":"9512_CR4","first-page":"13","volume":"5","author":"C Shearer","year":"2000","unstructured":"Shearer, C.: The CRISP-DM model: the new blueprint for data mining. J. Data Warehous. 5(4), 13\u201322 (2000)","journal-title":"J. Data Warehous."},{"issue":"2","key":"9512_CR5","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MNET.2017.1700200","volume":"32","author":"M Wang","year":"2017","unstructured":"Wang, M., Cui, Y., Wang, X., Xiao, S., Jiang, J.: Machine learning for networking: workflow, advances and opportunities. IEEE Netw. 32(2), 92\u201399 (2017)","journal-title":"IEEE Netw."},{"issue":"2","key":"9512_CR6","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2494502","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9512_CR7","volume-title":"Introduction to Machine Learning","author":"E Alpaydin","year":"2014","unstructured":"Alpaydin, E.: Introduction to Machine Learning. The MIT Press, Cambridge (2014)"},{"issue":"2","key":"9512_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10922-013-9284-2","volume":"22","author":"MI Tiwana","year":"2014","unstructured":"Tiwana, M.I., Tiwana, M.I.: A novel framework of automated RRM for LTE son using data mining: application to LTE mobility. J. Netw. Syst. Manag. 22(2), 235\u2013258 (2014)","journal-title":"J. Netw. Syst. Manag."},{"key":"9512_CR9","volume-title":"Outlier Analysis","author":"CC Aggarwal","year":"2016","unstructured":"Aggarwal, C.C.: Outlier Analysis, 2nd edn. Springer Publishing Company, Incorporated, New York (2016)","edition":"2"},{"issue":"2","key":"9512_CR10","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s10922-013-9286-0","volume":"22","author":"P Calyam","year":"2014","unstructured":"Calyam, P., Dhanapalan, M., Sridharan, M., Krishnamurthy, A., Ramnath, R.: Topology-aware correlated network anomaly event detection and diagnosis. J. Netw. Syst. Manag. 22(2), 208\u2013234 (2014)","journal-title":"J. Netw. Syst. Manag."},{"issue":"1","key":"9512_CR11","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/s10922-018-9464-1","volume":"27","author":"S Vaton","year":"2019","unstructured":"Vaton, S., Brun, O., Mouchet, M., Belzarena, P., Amigo, I., Prabhu, B.J., Chonavel, T.: Joint minimization of monitoring cost and delay in overlay networks: optimal policies with a Markovian approach. J. Netw. Syst. Manag. 27(1), 188\u2013232 (2019)","journal-title":"J. Netw. Syst. Manag."},{"key":"9512_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237\u2013285 (1996)","journal-title":"J. Artif. Intell. Res."},{"issue":"1","key":"9512_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-017-9405-4","volume":"26","author":"P Nawrocki","year":"2018","unstructured":"Nawrocki, P., Sniezynski, B.: Adaptive service management in mobile cloud computing by means of supervised and reinforcement learning. J. Netw. Syst. Manag. 26(1), 1\u201322 (2018)","journal-title":"J. Netw. Syst. Manag."},{"issue":"3","key":"9512_CR14","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10710-014-9236-y","volume":"16","author":"MI Heywood","year":"2015","unstructured":"Heywood, M.I.: Evolutionary model building under streaming data for classification tasks: opportunities and challenges. Genet. Program. Evol. Mach. 16(3), 283\u2013326 (2015)","journal-title":"Genet. Program. Evol. Mach."},{"issue":"10","key":"9512_CR15","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2009","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"9512_CR16","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s12065-011-0065-0","volume":"4","author":"HG Kayac\u0131k","year":"2011","unstructured":"Kayac\u0131k, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing. Evolut. Intell. 4(4), 243\u2013266 (2011)","journal-title":"Evolut. Intell."},{"key":"9512_CR17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"9512_CR18","volume-title":"Information Processing Systems\u2014Open Systems Interconnection\u2014Basic Reference Model\u2014Part 4 Management Framework","author":"ISO\/IEC","year":"1989","unstructured":"ISO\/IEC: Information Processing Systems\u2014Open Systems Interconnection\u2014Basic Reference Model\u2014Part 4 Management Framework. Standard International Organization for Standardization, Geneva (1989)"},{"issue":"1","key":"9512_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s13174-018-0087-2","volume":"9","author":"R Boutaba","year":"2018","unstructured":"Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9(1), 16 (2018). https:\/\/doi.org\/10.1186\/s13174-018-0087-2","journal-title":"J. Internet Serv. Appl."},{"issue":"4","key":"9512_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56\u201376 (2008). https:\/\/doi.org\/10.1109\/SURV.2008.080406","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"9512_CR21","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1002\/nem.1901","volume":"25","author":"P Velan","year":"2015","unstructured":"Velan, P., \u010cerm\u00e1k, M., \u010celeda, P., Dra\u0161ar, M.: A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5), 355\u2013374 (2015). https:\/\/doi.org\/10.1002\/nem.1901","journal-title":"Int. J. Netw. Manag."},{"issue":"3","key":"9512_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/SURV.2009.090304","volume":"11","author":"A Callado","year":"2009","unstructured":"Callado, A., Kamienski, C., Szabo, G., Gero, B.P., Kelner, J., Fernandes, S., Sadok, D.: A survey on internet traffic identification. IEEE Commun. Surv. Tutor. 11(3), 37\u201352 (2009). https:\/\/doi.org\/10.1109\/SURV.2009.090304","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"publisher","unstructured":"Kim, H., Claffy, K.C., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.Y.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of 4th ACM international conference on emerging networking experiments and technologies, CoNEXT \u201908, https:\/\/doi.org\/10.1145\/1544012.1544023 (2008)","key":"9512_CR23","DOI":"10.1145\/1544012.1544023"},{"issue":"5","key":"9512_CR24","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1163593.1163596","volume":"36","author":"N Williams","year":"2006","unstructured":"Williams, N., Zander, S., Armitage, G.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. Comput. Commun. Rev. 36(5), 7\u201315 (2006). https:\/\/doi.org\/10.1145\/1163593.1163596","journal-title":"Comput. Commun. Rev."},{"issue":"5","key":"9512_CR25","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/TNET.2010.2044046","volume":"18","author":"A Finamore","year":"2010","unstructured":"Finamore, A., Mellia, M., Meo, M., Rossi, D.: KISS: stochastic packet inspection classifier for udp traffic. IEEE\/ACM Trans. Netw. 18(5), 1505\u20131515 (2010). https:\/\/doi.org\/10.1109\/TNET.2010.2044046","journal-title":"IEEE\/ACM Trans. Netw."},{"doi-asserted-by":"publisher","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Machine learning based encrypted traffic classification: identifying ssh and skype. In: 2009 IEEE symposium on computational intelligence for security and defense applications, pp. 1\u20138 (2009) https:\/\/doi.org\/10.1109\/CISDA.2009.5356534","key":"9512_CR26","DOI":"10.1109\/CISDA.2009.5356534"},{"doi-asserted-by":"publisher","unstructured":"Sun, G., Xue, Y., Dong, Y., Wang, D., Li, C.: An novel hybrid method for effectively classifying encrypted traffic. In: 2010 IEEE global telecommunications conference GLOBECOM 2010, pp. 1\u20135 (2010). https:\/\/doi.org\/10.1109\/GLOCOM.2010.5683649","key":"9512_CR27","DOI":"10.1109\/GLOCOM.2010.5683649"},{"doi-asserted-by":"publisher","unstructured":"Anderson, B., McGrew, D.: Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, vol. Part F1296, pp. 1723\u20131732 (2017). https:\/\/doi.org\/10.1145\/3097983.3098163","key":"9512_CR28","DOI":"10.1145\/3097983.3098163"},{"key":"9512_CR29","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-642-13193-6_32","volume-title":"Experimental Algorithms","author":"R Bar Yanai","year":"2010","unstructured":"Bar Yanai, R., Langberg, M., Peleg, D., Roditty, L.: Realtime classification for encrypted traffic. In: Festa, P. (ed.) Experimental Algorithms, pp. 373\u2013385. Springer, Berlin (2010)"},{"key":"9512_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2","author":"M Lotfollahi","year":"2019","unstructured":"Lotfollahi, M., Jafari Siavoshani, M., Shirali Hossein Zade, R., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. (2019). https:\/\/doi.org\/10.1007\/s00500-019-04030-2","journal-title":"Soft Comput."},{"doi-asserted-by":"publisher","unstructured":"Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J.D., Ochoa, M., Tippenhauer, N.O., Elovici, Y.: Profiliot: a machine learning approach for iot device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp. 506\u2013509. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3019612.3019878","key":"9512_CR31","DOI":"10.1145\/3019612.3019878"},{"doi-asserted-by":"crossref","unstructured":"Khatouni, A.S., Zhang, L., Aziz, K., Zincir, I., Zincir-Heywood, N.: Exploring nat detection and host identification using machine learning. In: CNSM (2019)","key":"9512_CR32","DOI":"10.23919\/CNSM46954.2019.9012684"},{"doi-asserted-by":"crossref","unstructured":"Montieri, A., Ciuonzo, D., Aceto, G., Pescap\u00e9, A.: Anonymity services tor, i2p, jondonym: classifying in the dark. In: 2017 29th international teletraffic congress (ITC 29), vol. 1, pp. 81\u201389. IEEE, New York (2017)","key":"9512_CR33","DOI":"10.23919\/ITC.2017.8064342"},{"doi-asserted-by":"publisher","unstructured":"Shahbar, K., Zincir-Heywood, A.N.: How far can we push flow analysis to identify encrypted anonymity network traffic? In: 2018 IEEE\/IFIP network operations and management symposium, pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/NOMS.2018.8406156","key":"9512_CR34","DOI":"10.1109\/NOMS.2018.8406156"},{"doi-asserted-by":"crossref","unstructured":"Wang, P., Lin, S.C., Luo, M.: A framework for QoS-aware traffic classification using semi-supervised machine learning in SDNs. In: 2016 IEEE international conference on services computing (SCC), pp. 760\u2013765. IEEE, New York (2016)","key":"9512_CR35","DOI":"10.1109\/SCC.2016.133"},{"key":"9512_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2019.2933358","author":"A DrAlconzo","year":"2019","unstructured":"DrAlconzo, A., Drago, I., Morichetta, A., Mellia, M., Casas, P.: A survey on big data for network traffic monitoring and analysis. IEEE Trans. Netw. Serv. Manag. (2019). https:\/\/doi.org\/10.1109\/tnsm.2019.2933358","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"2","key":"9512_CR37","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/s10922-016-9392-x","volume":"25","author":"BL Dalmazo","year":"2017","unstructured":"Dalmazo, B.L., Vilela, J.P., Curado, M.: Performance analysis of network traffic predictors in the cloud. J. Netw. Syst. Manag. 25(2), 290\u2013320 (2017). https:\/\/doi.org\/10.1007\/s10922-016-9392-x","journal-title":"J. Netw. Syst. Manag."},{"doi-asserted-by":"crossref","unstructured":"Cortez, P., Rio, M., Rocha, M., Sousa, P.: Internet traffic forecasting using neural networks. In: The 2006 IEEE international joint conference on neural network proceedings, pp. 2635\u20132642. IEEE, New York (2006)","key":"9512_CR38","DOI":"10.1109\/IJCNN.2006.247142"},{"issue":"1","key":"9512_CR39","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1504\/IJBDI.2016.073903","volume":"3","author":"TP Oliveira","year":"2016","unstructured":"Oliveira, T.P., Barbar, J.S., Soares, A.S.: Computer network traffic prediction: a comparison between traditional and deep learning neural networks. Int. J. Big Data Intell. 3(1), 28\u201337 (2016)","journal-title":"Int. J. Big Data Intell."},{"issue":"4","key":"9512_CR40","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1109\/COMST.2017.2707140","volume":"19","author":"ZM Fadlullah","year":"2017","unstructured":"Fadlullah, Z.M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., Mizutani, K.: State-of-the-art deep learning: evolving machine intelligence toward tomorrow\u2019s intelligent network traffic control systems. IEEE Commun. Surv. Tutor. 19(4), 2432\u20132455 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"9512_CR41","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/s10922-013-9285-1","volume":"22","author":"A Bantouna","year":"2014","unstructured":"Bantouna, A., Poulios, G., Tsagkaris, K., Demestichas, P.: Network load predictions based on big data and the utilization of self-organizing maps. J. Netw. Syst. Manag. 22(2), 150\u2013173 (2014). https:\/\/doi.org\/10.1007\/s10922-013-9285-1","journal-title":"J. Netw. Syst. Manag."},{"doi-asserted-by":"crossref","unstructured":"Kim, H.G., Lee, D.Y., Jeong, S.Y., Choi, H., Yoo, J.H., Hong, J.W.K.: Machine learning-based method for prediction of virtual network function resource demands. In: 2019 IEEE conference on network softwarization (NetSoft), pp. 405\u2013413. IEEE, New York (2019)","key":"9512_CR42","DOI":"10.1109\/NETSOFT.2019.8806687"},{"unstructured":"Moradi, F., Stadler, R., Johnsson, A.: Performance prediction in dynamic clouds using transfer learning. In: 2019 IFIP\/IEEE symposium on integrated network and service management (IM), pp. 242\u2013250. IEEE, New York (2019)","key":"9512_CR43"},{"issue":"4","key":"9512_CR44","doi-asserted-by":"publisher","first-page":"1700","DOI":"10.1109\/TITS.2013.2267735","volume":"14","author":"YS Jeong","year":"2013","unstructured":"Jeong, Y.S., Byon, Y.J., Castro-Neto, M.M., Easa, S.M.: Supervised weighting-online learning algorithm for short-term traffic flow prediction. IEEE Trans. Intell. Transp. Syst. 14(4), 1700\u20131707 (2013)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"9512_CR45","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.jnca.2018.07.001","volume":"119","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Zhou, Y.: Distributed coordination control of traffic network flow using adaptive genetic algorithm based on cloud computing. J. Netw. Comput. Appl. 119, 110\u2013120 (2018)","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Yang, T., Hu, Y., Gursoy, M.C., Schmeink, A., Mathar, R.: Deep reinforcement learning based resource allocation in low latency edge computing networks. In: 2018 15th international symposium on wireless communication systems (ISWCS), pp. 1\u20135. IEEE, New York (2018)","key":"9512_CR46","DOI":"10.1109\/ISWCS.2018.8491089"},{"doi-asserted-by":"crossref","unstructured":"Mao, H., Alizadeh, M., Menache, I., Kandula, S.: Resource management with deep reinforcement learning. In: Proceedings of the 15th ACM workshop on hot topics in networks, pp. 50\u201356. ACM, New York (2016)","key":"9512_CR47","DOI":"10.1145\/3005745.3005750"},{"doi-asserted-by":"crossref","unstructured":"Bachl, M., Zseby, T., Fabini, J.: Rax: deep reinforcement learning for congestion control. In: ICC 2019-2019 IEEE international conference on communications (ICC), pp. 1\u20136. IEEE, New York (2019)","key":"9512_CR48","DOI":"10.1109\/ICC.2019.8761187"},{"issue":"3","key":"9512_CR49","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TNSE.2018.2835758","volume":"6","author":"W Li","year":"2018","unstructured":"Li, W., Zhou, F., Chowdhury, K.R., Meleis, W.M.: Qtcp: adaptive congestion control with reinforcement learning. IEEE Trans. Netw. Sci. Eng. 6(3), 445\u2013458 (2018)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"10","key":"9512_CR50","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994\u201312000 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"9512_CR51","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303\u2013336 (2014). https:\/\/doi.org\/10.1109\/SURV.2013.052213.00046","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"publisher","unstructured":"Sequeira, K., Zaki, M.: ADMIT: anomaly-based data mining for intrusions. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining, pp. 386\u2013395 (2002). https:\/\/doi.org\/10.1145\/775047.775103","key":"9512_CR52","DOI":"10.1145\/775047.775103"},{"issue":"7","key":"9512_CR53","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1016\/j.patrec.2005.11.007","volume":"27","author":"S Jiang","year":"2006","unstructured":"Jiang, S., Song, X., Wang, H., Han, J.J., Li, Q.H.: A clustering-based method for unsupervised intrusion detections. Pattern Recognit. Lett. 27(7), 802\u2013810 (2006). https:\/\/doi.org\/10.1016\/j.patrec.2005.11.007","journal-title":"Pattern Recognit. Lett."},{"issue":"7","key":"9512_CR54","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.comcom.2012.01.016","volume":"35","author":"P Casas","year":"2012","unstructured":"Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35(7), 772\u2013783 (2012). https:\/\/doi.org\/10.1016\/j.comcom.2012.01.016","journal-title":"Comput. Commun."},{"issue":"4","key":"9512_CR55","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.engappai.2006.09.005","volume":"20","author":"HG Kayac\u0131k","year":"2007","unstructured":"Kayac\u0131k, H.G., Zincir-Heywood, A.N., Heywood, M.I.: A hierarchical SOM-based intrusion detection system. Eng. Appl. Artif. Intell. 20(4), 439\u2013451 (2007)","journal-title":"Eng. Appl. Artif. Intell."},{"doi-asserted-by":"publisher","unstructured":"Perdisci, R., Gu, G., Lee, W.: Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems. In: Sixth international conference on data mining (ICDM\u201906), pp. 488\u2013498 (2006). https:\/\/doi.org\/10.1109\/ICDM.2006.165","key":"9512_CR56","DOI":"10.1109\/ICDM.2006.165"},{"doi-asserted-by":"publisher","unstructured":"Veeramachaneni, K., Arnaldo, I., Korrapati, V., Bassias, C., Li, K.: $$\\text{AI}^{\\wedge{}}2$$: training a big data machine to defend. In: 2016 IEEE 2nd international conference on big data security on cloud (BigDataSecurity), pp. 49\u201354. IEEE, New York. (2016). https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS.2016.79","key":"9512_CR57","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"9512_CR58","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.cose.2013.04.007","volume":"39","author":"D Zhao","year":"2013","unstructured":"Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39, 2\u201316 (2013)","journal-title":"Comput. Secur."},{"key":"9512_CR59","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","volume":"38","author":"AA Aburomman","year":"2016","unstructured":"Aburomman, A.A., Reaz, M.B.I.: A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360\u2013372 (2016)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"9512_CR60","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41\u201350 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"9512_CR61","doi-asserted-by":"publisher","first-page":"112963","DOI":"10.1016\/j.eswa.2019.112963","volume":"141","author":"M Lopez-Martin","year":"2020","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A.: Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst. Appl. 141, 112963 (2020)","journal-title":"Expert Syst. Appl."},{"key":"9512_CR62","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.swevo.2017.09.008","volume":"39","author":"S Khanchi","year":"2018","unstructured":"Khanchi, S., Vahdat, A., Heywood, M.I., Zincir-Heywood, A.N.: On botnet detection with genetic programming under streaming data label budgets and class imbalance. Swarm Evolut. Comput. 39, 123\u2013140 (2018)","journal-title":"Swarm Evolut. Comput."},{"doi-asserted-by":"crossref","unstructured":"Haddadi, F., Le, D.C., Porter, L., Zincir-Heywood, A.N.: On the effectiveness of different botnet detection approaches. In: International conference on information security practice and experience, pp. 121\u2013135. Springer, New York (2015)","key":"9512_CR63","DOI":"10.1007\/978-3-319-17533-1_9"},{"unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th USENIX security symposium, pp. 139\u2013154 (2008)","key":"9512_CR64"},{"key":"9512_CR65","doi-asserted-by":"publisher","first-page":"89507","DOI":"10.1109\/ACCESS.2019.2925838","volume":"7","author":"IA Khan","year":"2019","unstructured":"Khan, I.A., Pi, D., Khan, Z.U., Hussain, Y., Nawaz, A.: Hml-ids: a hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems. IEEE Access 7, 89507\u201389521 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Makanju, A., Zincir-Heywood, A.N., Kiyomoto, S.: On evolutionary computation for moving target defense in software defined networks. In: Proceedings of the genetic and evolutionary computation conference companion, pp. 287\u2013288. ACM, New York (2017)","key":"9512_CR66","DOI":"10.1145\/3067695.3075604"},{"doi-asserted-by":"crossref","unstructured":"Sengupta, S,, Chakraborti, T., Kambhampati, S.: Mtdeep: boosting the security of deep neural nets against adversarial attacks with moving target defense. In: Workshops at the thirty-second AAAI conference on artificial intelligence (2018)","key":"9512_CR67","DOI":"10.1007\/978-3-030-32430-8_28"},{"doi-asserted-by":"publisher","unstructured":"Le, D.C., Khanchi, S., Zincir-Heywood, A.N., Heywood, M.I.: Benchmarking evolutionary computation approaches to insider threat detection. In: Genetic and evolutionary computation conference (GECCO \u201918), pp. 1286\u20131293 (2018). https:\/\/doi.org\/10.1145\/3205455.3205612","key":"9512_CR68","DOI":"10.1145\/3205455.3205612"},{"doi-asserted-by":"publisher","unstructured":"Rashid, T., Agrafiotis, I., Nurse, J.R.: A new take on detecting insider threats: exploring the use of hidden markov models. In: Proceedings of the 8th ACM CCS international workshop on managing insider security threats, pp. 47\u201356 (2016). https:\/\/doi.org\/10.1145\/2995959.2995964","key":"9512_CR69","DOI":"10.1145\/2995959.2995964"},{"issue":"2","key":"9512_CR70","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.dss.2007.06.002","volume":"44","author":"M Chau","year":"2008","unstructured":"Chau, M., Chen, H.: A machine learning approach to web page filtering using content and structure analysis. Decis. Support Syst. 44(2), 482\u2013494 (2008)","journal-title":"Decis. Support Syst."},{"issue":"1","key":"9512_CR71","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/COMST.2018.2866942","volume":"21","author":"J Xie","year":"2018","unstructured":"Xie, J., Yu, F.R., Huang, T., Xie, R., Liu, J., Wang, C., Liu, Y.: A survey of machine learning techniques applied to software defined networking (sdn): research issues and challenges. IEEE Commun. Surv. Tutor. 21(1), 393\u2013430 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"9512_CR72","doi-asserted-by":"publisher","first-page":"2224","DOI":"10.1109\/COMST.2019.2904897","volume":"21","author":"C Zhang","year":"2019","unstructured":"Zhang, C., Patras, P., Haddadi, H.: Deep learning in mobile and wireless networking: a survey. IEEE Commun. Surv. Tutor. 21(3), 2224\u201387 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"9512_CR73","doi-asserted-by":"publisher","first-page":"3933","DOI":"10.1109\/TWC.2019.2919611","volume":"18","author":"R Amiri","year":"2019","unstructured":"Amiri, R., Almasi, M.A., Andrews, J.G., Mehrpouyan, H.: Reinforcement learning for self organization and power control of two-tier heterogeneous networks. IEEE Trans. Wirel. Commun. 18(8), 3933\u20133947 (2019)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"9512_CR74","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.comcom.2018.07.015","volume":"129","author":"J Moysen","year":"2018","unstructured":"Moysen, J., Giupponi, L.: From 4G to 5G: self-organized network management meets machine learning. Comput. Commun. 129, 248\u2013268 (2018)","journal-title":"Comput. Commun."},{"key":"9512_CR75","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2632754","author":"A Roy","year":"2018","unstructured":"Roy, A., Saxena, N., Sahu, B.J., Singh, S.: Bison: a bioinspired self-organizing network for dynamic auto-configuration in 5g wireless. Wirel. Commun. Mobile Comput. (2018). https:\/\/doi.org\/10.1155\/2018\/2632754","journal-title":"Wirel. Commun. Mobile Comput."},{"doi-asserted-by":"crossref","unstructured":"Wang, H., Wu, Q., Chen, X., Yu, Q., Zheng, Z., Bouguettaya, A.: Adaptive and dynamic service composition via multi-agent reinforcement learning. In: 2014 IEEE international conference on web services, pp. 447\u2013454. IEEE, New York (2014)","key":"9512_CR76","DOI":"10.1109\/ICWS.2014.70"},{"doi-asserted-by":"crossref","unstructured":"Valadarsky, A., Schapira, M., Shahaf, D., Tamar, A.: Learning to route. In: Proceedings of the 16th ACM workshop on hot topics in networks, pp. 185\u2013191. ACM, New York (2017)","key":"9512_CR77","DOI":"10.1145\/3152434.3152441"},{"issue":"1","key":"9512_CR78","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1007\/s10586-016-0667-5","volume":"20","author":"HY Kim","year":"2017","unstructured":"Kim, H.Y., Kim, J.M.: A load balancing scheme based on deep-learning in iot. Clust. Comput. 20(1), 873\u2013878 (2017)","journal-title":"Clust. Comput."},{"issue":"5","key":"9512_CR79","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TNN.2005.853414","volume":"16","author":"H Hajji","year":"2005","unstructured":"Hajji, H.: Statistical analysis of network traffic for adaptive faults detection. IEEE Trans. Neural Netw. 16(5), 1053\u20131063 (2005)","journal-title":"IEEE Trans. Neural Netw."},{"doi-asserted-by":"crossref","unstructured":"Yamanishi, K., Maruyama, Y.: Dynamic syslog mining for network failure monitoring. In: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, pp. 499\u2013508. ACM, New York (2005)","key":"9512_CR80","DOI":"10.1145\/1081870.1081927"},{"unstructured":"Chen, M., Zheng, A.X., Lloyd, J., Jordan, M.I., Brewer, E.: Failure diagnosis using decision trees. In: International conference on autonomic computing, 2004. Proceedings, pp. 36\u201343. IEEE, New York (2004)","key":"9512_CR81"},{"doi-asserted-by":"crossref","unstructured":"Hashmi, U.S., Darbandi, A., Imran, A.: Enabling proactive self-healing by data mining network failure logs. In: 2017 international conference on computing, networking and communications (ICNC), pp. 511\u2013517. IEEE, New York (2017)","key":"9512_CR82","DOI":"10.1109\/ICCNC.2017.7876181"},{"issue":"1","key":"9512_CR83","doi-asserted-by":"publisher","first-page":"2:1","DOI":"10.1145\/3179405","volume":"2","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Liu, Y., Meng, W., Luo, Z., Bu, J., Yang, S., Liang, P., Pei, D., Xu, J., Zhang, Y., Chen, Y., Dong, H., Qu, X., Song, L.: Prefix: switch failure prediction in datacenter networks. Proc. ACM Meas. Anal. Comput. Syst. 2(1), 2:1\u20132:29 (2018)","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Mismar, F.B., Evans, B.L.: Deep Q-learning for self-organizing networks fault management and radio performance improvement. In: 2018 52nd asilomar conference on signals, systems, and computers, pp. 1457\u20131461. IEEE, New York (2018)","key":"9512_CR84","DOI":"10.1109\/ACSSC.2018.8645083"},{"issue":"6","key":"9512_CR85","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1016\/j.comnet.2010.12.002","volume":"55","author":"R Alshammari","year":"2011","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Comput. Netw. 55(6), 1326\u20131350 (2011). https:\/\/doi.org\/10.1016\/j.comnet.2010.12.002","journal-title":"Comput. Netw."},{"doi-asserted-by":"publisher","unstructured":"Alshammari, R., Nur Zincir-Heywood, A.: A flow based approach for ssh traffic detection. In: 2007 IEEE international conference on systems, man and cybernetics, pp. 296\u2013301 (2007). https:\/\/doi.org\/10.1109\/ICSMC.2007.4414006","key":"9512_CR86","DOI":"10.1109\/ICSMC.2007.4414006"},{"doi-asserted-by":"publisher","unstructured":"Zander, S., Nguyen, T., Armitage, G.: Automated traffic classification and application identification using machine learning. In: Proceedings of the ieee conference on local computer networks 30th anniversary, LCN \u201905, pp. 250\u2013257. IEEE Computer Society, Washington, DC (2005). https:\/\/doi.org\/10.1109\/LCN.2005.35","key":"9512_CR87","DOI":"10.1109\/LCN.2005.35"},{"doi-asserted-by":"publisher","unstructured":"Le, D.C., Zincir-Heywood, A.N., Heywood, M.I.: Data analytics on network traffic flows for botnet behaviour detection. In: IEEE symposium series on computational intelligence (SSCI \u201916), pp. 1\u20137 (2016). https:\/\/doi.org\/10.1109\/SSCI.2016.7850078","key":"9512_CR88","DOI":"10.1109\/SSCI.2016.7850078"},{"doi-asserted-by":"publisher","unstructured":"Bernaille, L., Teixeira, R.: Early recognition of encrypted applications. In: Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4427 LNCS, pp. 165\u2013175 (2007). https:\/\/doi.org\/10.1007\/978-3-540-71617-4_17","key":"9512_CR89","DOI":"10.1007\/978-3-540-71617-4_17"},{"doi-asserted-by":"publisher","unstructured":"Bacquet, C., Zincir-Heywood, A.N., Heywood, M.I.: Genetic optimization and hierarchical clustering applied to encrypted traffic identification. In: 2011 IEEE symposium on computational intelligence in cyber security (CICS), pp. 194\u2013201 (2011). https:\/\/doi.org\/10.1109\/CICYBS.2011.5949391","key":"9512_CR90","DOI":"10.1109\/CICYBS.2011.5949391"},{"issue":"3","key":"9512_CR91","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s10922-017-9404-5","volume":"25","author":"JMC Silva","year":"2017","unstructured":"Silva, J.M.C., Carvalho, P., Lima, S.R.: A modular traffic sampling architecture: bringing versatility and efficiency to massive traffic analysis. J. Netw. Syst. Manag. 25(3), 643\u2013668 (2017)","journal-title":"J. Netw. Syst. Manag."},{"doi-asserted-by":"crossref","unstructured":"Hardegen, C., Pf\u00fclb, B., Rieger, S., Gepperth, A., Reissmann, S.: Flow-based throughput prediction using deep learning and real-world network traffic. In: International conference on network and service management. IEEE, New York (2019)","key":"9512_CR92","DOI":"10.23919\/CNSM46954.2019.9012716"},{"key":"9512_CR93","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1269899.1254894","volume":"35","author":"M Mirza","year":"2007","unstructured":"Mirza, M., Sommers, J., Barford, P., Zhu, X.: A machine learning approach to TCP throughput prediction. ACM SIGMETRICS Perform. Eval. Rev. 35, 97\u2013108 (2007)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"unstructured":"Chen, Z., Wen, J., Geng, Y.: Predicting future traffic using hidden markov models. In: 2016 IEEE 24th international conference on network protocols (ICNP), pp. 1\u20136. IEEE, New York (2016)","key":"9512_CR94"},{"key":"9512_CR95","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.comcom.2017.09.001","volume":"118","author":"S Kim","year":"2018","unstructured":"Kim, S., Kim, D.Y., Park, J.H.: Traffic management in the mobile edge cloud to improve the quality of experience of mobile video. Comput. Commun. 118, 40\u201349 (2018)","journal-title":"Comput. Commun."},{"doi-asserted-by":"crossref","unstructured":"Mijumbi, R., Gorricho, J.L., Serrat, J., Claeys, M., De\u00a0Turck, F., Latr\u00e9, S.: Design and evaluation of learning algorithms for dynamic resource management in virtual networks. In: 2014 IEEE network operations and management symposium (NOMS), pp. 1\u20139. IEEE, New York (2014)","key":"9512_CR96","DOI":"10.1109\/NOMS.2014.6838258"},{"issue":"1","key":"9512_CR97","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1016\/j.procs.2018.04.331","volume":"13","author":"C Yu","year":"2018","unstructured":"Yu, C., Lan, J., Xie, J., Hu, Y.: Qos-aware traffic classification architecture using machine learning and deep packet inspection in SDNS. Procedia Comput. Sci. 13(1), 1209\u20131216 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"9512_CR98","doi-asserted-by":"publisher","first-page":"43598","DOI":"10.1109\/ACCESS.2019.2907142","volume":"7","author":"G Zhu","year":"2019","unstructured":"Zhu, G., Zan, J., Yang, Y., Qi, X.: A supervised learning based QoS assurance architecture for 5G networks. IEEE Access 7, 43598\u201343606 (2019)","journal-title":"IEEE Access"},{"issue":"6","key":"9512_CR99","doi-asserted-by":"publisher","first-page":"945","DOI":"10.3233\/JCS-2009-0350","volume":"17","author":"A Dainotti","year":"2009","unstructured":"Dainotti, A., Pescap\u00e9, A., Ventre, G.: A cascade architecture for DoS attacks detection based on the wavelet transform. J. Comput. Secur. 17(6), 945\u2013968 (2009)","journal-title":"J. Comput. Secur."},{"issue":"2\u20133","key":"9512_CR100","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10618-005-0014-6","volume":"12","author":"ME Otey","year":"2006","unstructured":"Otey, M.E., Ghoting, A., Parthasarathy, S.: Fast distributed outlier detection in mixed-attribute data sets. Data Min. Knowl. Discov. 12(2\u20133), 203\u2013228 (2006). https:\/\/doi.org\/10.1007\/s10618-005-0014-6","journal-title":"Data Min. Knowl. Discov."},{"doi-asserted-by":"publisher","unstructured":"Le, D.C., Zincir-Heywood, A.N.: Evaluating insider threat detection workflow using supervised and unsupervised learning. In: IEEE security and privacy workshops (SPW \u201918), San Francisco, CA, USA, pp. 270\u2013275 (2018). https:\/\/doi.org\/10.1109\/SPW.2018.00043","key":"9512_CR101","DOI":"10.1109\/SPW.2018.00043"},{"unstructured":"Le, D.C., Zincir-Heywood, A.N.: Machine learning based insider threat modelling and detection. In: IFIP\/IEEE international symposium on integrated network management, Washington DC, USA (2019)","key":"9512_CR102"},{"doi-asserted-by":"crossref","unstructured":"Alrawashdeh, K., Purdy, C.: Toward an online anomaly intrusion detection system based on deep learning. In: 2016 15th IEEE international conference on machine learning and applications (ICMLA), pp. 195\u2013200. IEEE, New York (2016)","key":"9512_CR103","DOI":"10.1109\/ICMLA.2016.0040"},{"issue":"4","key":"9512_CR104","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/s10922-017-9421-4","volume":"25","author":"R Hofstede","year":"2017","unstructured":"Hofstede, R., Jonker, M., Sperotto, A., Pras, A.: Flow-based web application brute-force attack and compromise detection. J. Netw. Syst. Manag. 25(4), 735\u2013758 (2017)","journal-title":"J. Netw. Syst. Manag."},{"issue":"4","key":"9512_CR105","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/JSYST.2014.2364743","volume":"10","author":"F Haddadi","year":"2016","unstructured":"Haddadi, F., Zincir-Heywood, A.N.: Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification. IEEE Syst. J. 10(4), 1390\u20131401 (2016)","journal-title":"IEEE Syst. J."},{"doi-asserted-by":"crossref","unstructured":"Abubakar, A., Pranggono, B.: Machine learning based intrusion detection system for software defined networks. In: 2017 seventh international conference on emerging security technologies (EST), pp. 138\u2013143. IEEE, New York (2017)","key":"9512_CR106","DOI":"10.1109\/EST.2017.8090413"},{"issue":"3","key":"9512_CR107","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s13198-014-0277-7","volume":"9","author":"P Deshpande","year":"2018","unstructured":"Deshpande, P., Sharma, S.C., Peddoju, S.K., Junaid, S.: Hids: a host based intrusion detection system for cloud computing environment. Int. J. Syst. Assur. Eng. Manag. 9(3), 567\u2013576 (2018)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"doi-asserted-by":"crossref","unstructured":"Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home iot using openflow. In: 2016 11th international conference on availability, reliability and security (ARES), pp. 147\u2013156. IEEE, New York (2016)","key":"9512_CR108","DOI":"10.1109\/ARES.2016.64"},{"doi-asserted-by":"crossref","unstructured":"Tegeler, F., Fu, X., Vigna, G., Kruegel, C.: Botfinder: Finding bots in network traffic without deep packet inspection. In: Proceedings of the 8th international conference on emerging networking experiments and technologies, pp. 349\u2013360. ACM, New York (2012)","key":"9512_CR109","DOI":"10.1145\/2413176.2413217"},{"issue":"7","key":"9512_CR110","doi-asserted-by":"publisher","first-page":"10206","DOI":"10.1016\/j.eswa.2009.02.037","volume":"36","author":"TS Guzella","year":"2009","unstructured":"Guzella, T.S., Caminhas, W.M.: A review of machine learning approaches to spam filtering. Expert Syst. Appl. 36(7), 10206\u201310222 (2009)","journal-title":"Expert Syst. Appl."},{"unstructured":"5GPPP (2017) Cognitive network management for 5G. White paper, 5GPPP Working Group on Network Management and QoS","key":"9512_CR111"},{"key":"9512_CR112","first-page":"671","volume-title":"Advances in Neural Information Processing Systems","author":"JA Boyan","year":"1994","unstructured":"Boyan, J.A., Littman, M.L.: Packet routing in dynamically changing networks: a reinforcement learning approach. Advances in Neural Information Processing Systems, pp. 671\u2013678. Morgan Kaufmann Publishers, San Mateo (1994)"},{"issue":"11","key":"9512_CR113","doi-asserted-by":"publisher","first-page":"3779","DOI":"10.3390\/s18113779","volume":"18","author":"C Gomez","year":"2018","unstructured":"Gomez, C., Shami, A., Wang, X.: Machine learning aided scheme for load balancing in dense iot networks. Sensors 18(11), 3779 (2018)","journal-title":"Sensors"},{"unstructured":"Qader, K.: The computer network faults classification using a novel hybrid classifier. Ph.D. thesis, University of Portsmouth (2019)","key":"9512_CR114"},{"unstructured":"Makanju, A., Zincir-Heywood, A.N., Milios, E.E.: Investigating event log analysis with minimum apriori information. In: Proceedings of the IFIP\/IEEE international symposium on integrated network management (IM). IEEE, New York (2013)","key":"9512_CR115"},{"doi-asserted-by":"crossref","unstructured":"Zakeri, H., Antsaklis, P.J.: A data-driven adaptive controller reconfiguration for fault mitigation: a passivity approach. arXiv preprint arXiv:190209671 (2019)","key":"9512_CR116","DOI":"10.1109\/MED.2019.8798490"},{"unstructured":"Konecn\u00fd, J., McMahan, H.B., Yu, F.X., Richt\u00e1rik, P., Suresh, A.T., Bacon, D.: Federated learning: strategies for improving communication efficiency. CoRR abs\/1610.05492, arxiv:1610.05492 (2016)","key":"9512_CR117"},{"unstructured":"Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: 28th USENIX security symposium (USENIX Security 19), USENIX Association, Santa Clara, CA, pp. 1895\u20131912, https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/jayaraman (2019)","key":"9512_CR118"},{"key":"9512_CR119","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1142\/S0219493709002610","volume":"9","author":"C Gentry","year":"2009","unstructured":"Gentry, C., et al.: Fully homomorphic encryption using ideal lattices. Stoc 9, 169\u2013178 (2009)","journal-title":"Stoc"},{"key":"9512_CR120","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-63962-8_161-1","volume-title":"Encyclopedia of Big Data Technologies","author":"DC Le","year":"2018","unstructured":"Le, D.C., Zincir-Heywood, N.: Big data in network anomaly detection. In: Sakr, S., Zomaya, A. (eds.) Encyclopedia of Big Data Technologies, pp. 1\u20139. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-63962-8_161-1"},{"unstructured":"Kim, B.: Interactive and interpretable machine learning models for human machine collaboration. Ph.D. thesis, Massachusetts Institute of Technology (2015)","key":"9512_CR121"},{"doi-asserted-by":"publisher","unstructured":"Warde-Farley, D., Goodfellow, I.: Adversarial perturbations of deep neural networks. In: Hazan, T., Papandreou, G., Tarlow, D. (eds.) Perturbations, Optimization, and Statistics. The MIT Press (2016). https:\/\/doi.org\/10.7551\/mitpress\/10761.003.0012","key":"9512_CR122","DOI":"10.7551\/mitpress\/10761.003.0012"},{"doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European symposium on security and privacy (EuroS&P), pp. 372\u2013387. IEEE, New York (2016)","key":"9512_CR123","DOI":"10.1109\/EuroSP.2016.36"},{"doi-asserted-by":"crossref","unstructured":"Rigaki, M., Garcia, S.: Bringing a gan to a knife-fight: Adapting malware communication to avoid detection. In: 2018 IEEE security and privacy workshops (SPW), pp. 70\u201375. IEEE, New York (2018)","key":"9512_CR124","DOI":"10.1109\/SPW.2018.00019"},{"doi-asserted-by":"publisher","unstructured":"Bronfman-Nadas, R., Zincir-Heywood, N., Jacobs, J.T.: An artificial arms race: could it improve mobile malware detectors? In: 2018 network traffic measurement and analysis conference (TMA), (2018). https:\/\/doi.org\/10.23919\/TMA.2018.8506545","key":"9512_CR125","DOI":"10.23919\/TMA.2018.8506545"},{"unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:170606083 (2017)","key":"9512_CR126"},{"doi-asserted-by":"crossref","unstructured":"Verma, G., Ciftcioglu, E., Sheatsley, R., Chan, K., Scott, L.: Network traffic obfuscation: An adversarial machine learning approach. In: MILCOM 2018-2018 IEEE military communications conference (MILCOM), pp. 1\u20136. IEEE, New York (2018)","key":"9512_CR127","DOI":"10.1109\/MILCOM.2018.8599680"},{"doi-asserted-by":"crossref","unstructured":"Guo, T., Xu, Z., Yao, X., Chen, H., Aberer, K., Funaya, K.: Robust online time series prediction with recurrent neural networks. In: 2016 IEEE international conference on data science and advanced analytics (DSAA), pp. 816\u2013825. IEEE, New York (2016)","key":"9512_CR128","DOI":"10.1109\/DSAA.2016.92"},{"doi-asserted-by":"crossref","unstructured":"Le, D.C, Zincir-Heywood, N.: Learning from evolving network data for dependable botnet detection. In: International conference on network and service management (CNSM 2019), Halifax, Canada (2019)","key":"9512_CR129","DOI":"10.23919\/CNSM46954.2019.9012710"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-020-09512-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-020-09512-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-020-09512-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T00:37:35Z","timestamp":1611880655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-020-09512-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,30]]},"references-count":129,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["9512"],"URL":"https:\/\/doi.org\/10.1007\/s10922-020-09512-5","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2020,1,30]]},"assertion":[{"value":"14 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}