{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:42:49Z","timestamp":1759092169239,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:00:00Z","timestamp":1676332800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:00:00Z","timestamp":1676332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072217","62072217"],"award-info":[{"award-number":["62072217","62072217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10922-023-09727-2","type":"journal-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T02:05:09Z","timestamp":1676340309000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning"],"prefix":"10.1007","volume":"31","author":[{"given":"Yufan","family":"Feng","sequence":"first","affiliation":[]},{"given":"Changda","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,14]]},"reference":[{"key":"9727_CR1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7653091","author":"J Wang","year":"2021","unstructured":"Wang, J., Wang, J.: A new hybrid forecasting model based on SW-LSTM and wavelet packet decomposition: A case study of oil futures prices. Comput. Intell. Neurosci. (2021). https:\/\/doi.org\/10.1155\/2021\/7653091","journal-title":"Comput. Intell. Neurosci."},{"key":"9727_CR2","doi-asserted-by":"publisher","unstructured":"Schneider, S., Peuster, M., Behnke, D., M\u00fcller, M., B\u00f6k, P.-B., Karl, H.: Putting 5G into production: Realizing a smart manufacturing vertical scenario. In: Proceedings of IEEE European Conference on Networks and Communications (EuCNC), pp. 305\u2013309 (June 2019). https:\/\/doi.org\/10.1109\/EuCNC.2019.8802016","DOI":"10.1109\/EuCNC.2019.8802016"},{"key":"9727_CR3","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3407642","author":"H Hu","year":"2017","unstructured":"Hu, H., Zhang, H., Liu, Y., Wang, Y.: Quantitative method for network security situation based on attack prediction. Secur. Commun. Netw. (2017). https:\/\/doi.org\/10.1155\/2017\/3407642","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"9727_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1049\/iet-ifs.2018.5186","volume":"13","author":"W Han","year":"2019","unstructured":"Han, W., Xue, J., Yan, H.: Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine. IET Inf. Secur. 13(2), 109\u2013116 (2019)","journal-title":"IET Inf. Secur."},{"issue":"1","key":"9727_CR5","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/COMST.2018.2871866","volume":"21","author":"M Hus\u00e1k","year":"2018","unstructured":"Hus\u00e1k, M., Kom\u00e1rkov\u00e1, J., Bou-Harb, E., \u010celeda, P.: Survey of attack projection, prediction, and forecasting in cyber security. IEEE Commun. Surv. Tutor. 21(1), 640\u2013660 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2871866","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9727_CR6","doi-asserted-by":"publisher","DOI":"10.1145\/3511093","author":"C Wang","year":"2022","unstructured":"Wang, C., Li, X., Bertino, E.: Network temperature: A novel statistical index for networks measurement and management. ACM Trans. Internet Technol. (2022). https:\/\/doi.org\/10.1145\/3511093","journal-title":"ACM Trans. Internet Technol."},{"key":"9727_CR7","doi-asserted-by":"publisher","unstructured":"Li, Z.-T., Lei, J., Wang, L., Li, D.: A data mining approach to generating network attack graph for intrusion prediction. In: Fourth international conference on fuzzy systems and knowledge discovery (FSKD 2007), vol. 4, pp. 307\u2013311. IEEE (2007). https:\/\/doi.org\/10.1109\/FSKD.2007.15","DOI":"10.1109\/FSKD.2007.15"},{"key":"9727_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2015.11.005","volume":"58","author":"M GhasemiGol","year":"2016","unstructured":"GhasemiGol, M., Ghaemi-Bafghi, A., Takabi, H.: A comprehensive approach for network attack forecasting. Comput. Secur. 58, 83\u2013105 (2016). https:\/\/doi.org\/10.1016\/j.cose.2015.11.005","journal-title":"Comput. Secur."},{"key":"9727_CR9","doi-asserted-by":"publisher","unstructured":"Ramaki, A.A., Khosravi-Farmad, M., Bafghi, A.G.: Real time alert correlation and prediction using Bayesian networks. In: 2015 12th international Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), pp. 98\u2013103. IEEE (2015). https:\/\/doi.org\/10.1109\/ISCISC.2015.7387905","DOI":"10.1109\/ISCISC.2015.7387905"},{"issue":"1","key":"9727_CR10","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/TDSC.2017.2751478","volume":"17","author":"P Holgado","year":"2020","unstructured":"Holgado, P., Villagr\u00e1, V.A., Vazquez, L.: Real-time multistep attack prediction based on hidden Markov models. IEEE Trans. Dependable Secure Comput. 17(1), 134\u2013147 (2020). https:\/\/doi.org\/10.1109\/TDSC.2017.2751478","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"9727_CR11","first-page":"14","volume":"47","author":"H Yang","year":"2020","unstructured":"Yang, H., Zhang, X.: A network security posture adaptive prediction model. J. Xidian Univ. 47(3), 14\u201322 (2020)","journal-title":"J. Xidian Univ."},{"issue":"4","key":"9727_CR12","first-page":"1141","volume":"32","author":"F Li","year":"2015","unstructured":"Li, F., Deng, W., Zhu, J.: A complex network-based network security posture prediction mechanism. Appl. Res. Comput. 32(4), 1141\u20131144 (2015)","journal-title":"Appl. Res. Comput."},{"issue":"5","key":"9727_CR13","first-page":"35","volume":"47","author":"Z Xiong","year":"2021","unstructured":"Xiong, Z., Zhang, W., Yang, G.: Dbn-based network security situation assessment and situation prediction modeling research. Electron. Technol. Appl. 47(5), 35\u201339 (2021)","journal-title":"Electron. Technol. Appl."},{"key":"9727_CR14","doi-asserted-by":"publisher","unstructured":"Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 international conference on information networking (ICOIN), pp. 712\u2013717. IEEE (2017). https:\/\/doi.org\/10.1109\/ICOIN.2017.7899588","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"9727_CR15","doi-asserted-by":"publisher","unstructured":"Li, Y., Lu, Y.: LSTM-BA: DDoS detection approach combining LSTM and Bayes. In: 2019 seventh international conference on advanced cloud and big data (CBD), pp. 180\u2013185. IEEE (2019). https:\/\/doi.org\/10.1109\/CBD.2019.00041","DOI":"10.1109\/CBD.2019.00041"},{"key":"9727_CR16","first-page":"39","volume":"56","author":"L Jiayue","year":"2020","unstructured":"Jiayue, L., Bo, Z., Xiang, L., Hui, L., Jianwen, Z.: Network traffic anomaly prediction method based on deep learning. Comput. Eng. Appl. 56, 39\u201350 (2020)","journal-title":"Comput. Eng. Appl."},{"key":"9727_CR17","unstructured":"Wei, Y.: Research on DDoS attack detection method based on entropy variation rate. Master\u2019s thesis, Jiangsu University (2020)"},{"key":"9727_CR18","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.future.2021.09.040","volume":"128","author":"MS Ansari","year":"2022","unstructured":"Ansari, M.S., Barto\u0161, V., Lee, B.: GRU-based deep learning approach for network intrusion alert prediction. Future Gener. Comput. Syst. 128, 235\u2013247 (2022). https:\/\/doi.org\/10.1016\/j.future.2021.09.040","journal-title":"Future Gener. Comput. Syst."},{"key":"9727_CR19","first-page":"2960","volume":"25","author":"J Snoek","year":"2012","unstructured":"Snoek, J., Larochelle, H., Adams, R.P.: Practical Bayesian optimization of machine learning algorithms. Adv. Neural Inf. Process. Syst. 25, 2960\u20132968 (2012)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"3","key":"9727_CR20","first-page":"147","volume":"40","author":"B Liu","year":"2020","unstructured":"Liu, B., Qin, C., Ju, P., Zhao, J.: Short-term bus load forecasting based on the fusion of XGBoost and stacking models. Power Autom. Equip. 40(3), 147\u2013153 (2020)","journal-title":"Power Autom. Equip."},{"key":"9727_CR21","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of 4th international conference on information systems security and privacy, vol. 1, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"issue":"1","key":"9727_CR22","doi-asserted-by":"publisher","first-page":"95","DOI":"10.3970\/cmc.2018.055.095","volume":"55","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Xu, R., Tang, X., Sheng, V.S., Cai, C., et al.: An abnormal network flow feature sequence prediction approach for ddos attacks detection in big data environment. Comput. Mater. Contin. 55(1), 95\u2013119 (2018). https:\/\/doi.org\/10.3970\/cmc.2018.055.095","journal-title":"Comput. Mater. Contin."},{"issue":"9","key":"9727_CR23","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.3969\/j.issn.0372-2112.2020.09.018","volume":"48","author":"J Liu","year":"2020","unstructured":"Liu, J., Wang, J., Tang, Z.: Adaptive sliding window recursive sparse principal component analysis based industrial process fault monitoring. Acta Electron. Sin. 48(9), 1795 (2020). https:\/\/doi.org\/10.3969\/j.issn.0372-2112.2020.09.018","journal-title":"Acta Electron. Sin."},{"key":"9727_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105837","volume":"86","author":"MHDM Ribeiro","year":"2020","unstructured":"Ribeiro, M.H.D.M., dos Santos Coelho, L.: Ensemble approach based on bagging, boosting and stacking for short-term prediction in agribusiness time series. Appl. Soft Comput. 86, 105837 (2020). https:\/\/doi.org\/10.1016\/j.asoc.2019.105837","journal-title":"Appl. Soft Comput."},{"key":"9727_CR25","unstructured":"GB\/T20984: Information security technology information security risk assessment specification[s]. PhD thesis, China (2007)"},{"key":"9727_CR26","unstructured":"Luo, Y.: Research on network security defense mechanism based on partially observable Markov process. Master\u2019s thesis, Beijing Jiaotong University (2020). https:\/\/cdmd.cnki.com.cn\/Article\/CDMD-10004-1020444035.html"},{"issue":"1","key":"9727_CR27","first-page":"177","volume":"2018","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Gharib, A., Lashkari, A.H., Ghorbani, A.A.: Towards a reliable intrusion detection benchmark dataset. Softw. Netw. 2018(1), 177\u2013200 (2018)","journal-title":"Softw. Netw."},{"issue":"3","key":"9727_CR28","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/electronics8030322","volume":"8","author":"R Abdulhammed","year":"2019","unstructured":"Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., Abuzneid, A.: Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics 8(3), 322 (2019)","journal-title":"Electronics"},{"key":"9727_CR29","doi-asserted-by":"crossref","unstructured":"Gharib, A., Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: An evaluation framework for intrusion detection dataset. In: 2016 international conference on information science and security (ICISS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"9727_CR30","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: A comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1","key":"9727_CR31","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s11227-020-03321-y","volume":"77","author":"KC Bur\u00e7ak","year":"2021","unstructured":"Bur\u00e7ak, K.C., Baykan, \u00d6.K., U\u011fuz, H.: A new deep convolutional neural network model for classifying breast cancer histopathological images and the hyperparameter optimisation of the proposed model. J. Supercomput. 77(1), 973\u2013989 (2021). https:\/\/doi.org\/10.1007\/s11227-020-03321-y","journal-title":"J. Supercomput."},{"key":"9727_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107315","volume":"177","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Huang, L., Wu, C.Q., Li, Z.: An effective convolutional neural network based on smote and gaussian mixture model for intrusion detection in imbalanced dataset. Comput. Netw. 177, 107315 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107315","journal-title":"Comput. Netw."},{"issue":"18","key":"9727_CR33","doi-asserted-by":"publisher","first-page":"10057","DOI":"10.3390\/su131810057","volume":"13","author":"F Jamil","year":"2021","unstructured":"Jamil, F., Kim, D., et al.: An ensemble of a prediction and learning mechanism for improving accuracy of anomaly detection in network intrusion environments. Sustainability 13(18), 10057 (2021). https:\/\/doi.org\/10.3390\/su131810057","journal-title":"Sustainability"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09727-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-023-09727-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09727-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T08:21:02Z","timestamp":1681287662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-023-09727-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,14]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["9727"],"URL":"https:\/\/doi.org\/10.1007\/s10922-023-09727-2","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2023,2,14]]},"assertion":[{"value":"29 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"Applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"38"}}