{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T03:40:09Z","timestamp":1774669209210,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973161"],"award-info":[{"award-number":["61973161"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["G2022182006L"],"award-info":[{"award-number":["G2022182006L"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02383-y","type":"journal-article","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T12:02:02Z","timestamp":1702900922000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards Interpretable Machine-Learning-Based DDoS Detection"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2576-0324","authenticated-orcid":false,"given":"Qianru","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Rongzhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Arumugam","family":"Nallanathan","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,18]]},"reference":[{"key":"2383_CR1","doi-asserted-by":"crossref","unstructured":"Adeniji OD, Adekeye DB, Ajagbe SA, Adesina AO, Oguns YJ, Oladipupo MA. Development of ddos attack detection approach in software defined network using support vector machine classifier. In: Pervasive computing and social networking: Proceedings of ICPCSN 2022, Springer; 2022, p. 319\u2013331.","DOI":"10.1007\/978-981-19-2840-6_25"},{"key":"2383_CR2","doi-asserted-by":"crossref","unstructured":"Ajagbe SA, Awotunde JB, Oladipupo MA, Oye OE. Prediction and forecasting of coronavirus cases using artificial intelligence algorithm. In: machine learning for critical internet of medical things: applications and use cases, Springer; 2022, p. 31\u201354.","DOI":"10.1007\/978-3-030-80928-7_2"},{"key":"2383_CR3","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C. \u201cwhy should i trust you?\u201d explaining the predictions of any classifier. In: 22nd ACM SIGKDD, 2016; p. 1135\u20131144.","DOI":"10.1145\/2939672.2939778"},{"key":"2383_CR4","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C. Anchors: high-precision model-agnostic explanations. In: AAAI. 2018;32.","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"2383_CR5","doi-asserted-by":"crossref","unstructured":"Marino DL, Wickramasinghe CS, Manic M. An adversarial approach for explainable ai in intrusion detection systems. In: IEEE IECON, IEEE, 2018; p. 3237\u20133243.","DOI":"10.1109\/IECON.2018.8591457"},{"issue":"2","key":"2383_CR6","first-page":"44","volume":"40","author":"D Gunning","year":"2019","unstructured":"Gunning D, Aha D. Darpa\u2019s explainable artificial intelligence (Xai) program. AI Mag. 2019;40(2):44\u201358.","journal-title":"AI Mag"},{"key":"2383_CR7","unstructured":"Audemard G, Bellart S, Bounia L, Koriche F, Lagniez J, Marquis P. On the explanatory power of decision trees. arXiv:2108.05266 [CoRR abs]."},{"key":"2383_CR8","unstructured":"Mathur V. Google autonomous car experiences another crash. Government Technology 17."},{"key":"2383_CR9","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.ssci.2017.12.023","volume":"108","author":"VA Banks","year":"2018","unstructured":"Banks VA, Plant KL, Stanton NA. Driver error or designer error: using the perceptual cycle model to explore the circumstances surrounding the fatal tesla crash on 7th May 2016. Saf Sci. 2018;108:278\u201385.","journal-title":"Saf Sci"},{"key":"2383_CR10","volume-title":"The master algorithm: how the quest for the ultimate learning machine will remake our world","author":"P Domingos","year":"2015","unstructured":"Domingos P. The master algorithm: how the quest for the ultimate learning machine will remake our world. Basic Books; 2015."},{"key":"2383_CR11","first-page":"18","volume":"16","author":"L Edwards","year":"2017","unstructured":"Edwards L, Veale M. Slave to the algorithm: why a right to an explanation is probably not the remedy you are looking for. Duke L Tech Rev. 2017;16:18.","journal-title":"Duke L Tech Rev"},{"issue":"7","key":"2383_CR12","first-page":"1829","volume":"119","author":"A Deeks","year":"2019","unstructured":"Deeks A. The judicial demand for explainable artificial intelligence. Columbia Law Rev. 2019;119(7):1829\u201350.","journal-title":"Columbia Law Rev"},{"key":"2383_CR13","volume-title":"Explainable artificial intelligence (xai) in medical decision systems (mdsss): healthcare systems perspective","author":"OB Ayoade","year":"2022","unstructured":"Ayoade OB, Oladele TO, Imoize AL, Awotunde JB, Adeloye AJ, Olorunyomi SO, Idowu AO. Explainable artificial intelligence (xai) in medical decision systems (mdsss): healthcare systems perspective. The Institute of Engineering Technology (IET); 2022."},{"key":"2383_CR14","doi-asserted-by":"crossref","unstructured":"Guo W, Mu D, Xu J, Su P, Wang G, Xing X. Lemna: explaining deep learning based security applications. In: ACM SIGSAC, 2018; p. 364\u2013379.","DOI":"10.1145\/3243734.3243792"},{"key":"2383_CR15","first-page":"29","volume-title":"Proc. 29th advances in neural information processing systems (NeurIPS)","author":"B Kim","year":"2016","unstructured":"Kim B, Khanna R, Koyejo OO. Examples are not enough, learn to criticize! Criticism for Interpretability. In: Proc. 29th advances in neural information processing systems (NeurIPS), vol. 20. Barcelona SPAIN, 2016"},{"key":"2383_CR16","unstructured":"Johansson U, K\u00f6nig R, Niklasson L. The truth is in there-rule extraction from opaque models using genetic programming., In: FLAIRS, Miami Beach, FL, 2004; p. 658\u2013663."},{"issue":"18","key":"2383_CR17","doi-asserted-by":"publisher","first-page":"14753","DOI":"10.1007\/s00521-020-04830-w","volume":"32","author":"S Mahdavifar","year":"2020","unstructured":"Mahdavifar S, Ghorbani AA. Dennes: deep embedded neural network expert system for detecting cyber attacks. Neural Comput Appl. 2020;32(18):14753\u201380.","journal-title":"Neural Comput Appl"},{"key":"2383_CR18","doi-asserted-by":"crossref","unstructured":"Rago A, Cocarascu O, Toni F. Argumentation-based recommendations: Fantastic explanations and how to find them. In: Proceedings of the Twenty-Seventh International Joint Conference on artificial intelligence, 2018; p. 1949\u20131955.","DOI":"10.24963\/ijcai.2018\/269"},{"issue":"2","key":"2383_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIS.2020.3042740","volume":"36","author":"MEB Brarda","year":"2020","unstructured":"Brarda MEB, Tamargo LH, Garc\u00eda AJ. Using argumentation to obtain and explain results in a decision support system. IEEE Intell Syst. 2020;36(2):36\u201342.","journal-title":"IEEE Intell Syst"},{"issue":"2","key":"2383_CR20","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/TCSS.2019.2902490","volume":"6","author":"S Grover","year":"2019","unstructured":"Grover S, Pulice C, Simari GI, Subrahmanian V. Beef: balanced English explanations of forecasts. IEEE Trans Comput Soc Syst. 2019;6(2):350\u201364.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2383_CR21","unstructured":"Lundberg SM, Lee SI. A unified approach to interpreting model predictions. In: The 31st NIPS, 2017; p. 4768\u20134777."},{"issue":"1","key":"2383_CR22","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1038\/s42256-019-0138-9","volume":"2","author":"SM Lundberg","year":"2020","unstructured":"Lundberg SM, Erion G, Chen H, DeGrave A, Prutkin JM, Nair B, Katz R, Himmelfarb J, Bansal N, Lee S-I. From local explanations to global understanding with explainable ai for trees. Nat Mach Intell. 2020;2(1):56\u201367.","journal-title":"Nat Mach Intell"},{"issue":"3","key":"2383_CR23","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10472-015-9483-5","volume":"78","author":"P Shakarian","year":"2016","unstructured":"Shakarian P, Simari GI, Moores G, Paulo D, Parsons S, Falappa MA, Aleali A. Belief revision in structured probabilistic argumentation. Ann Math Artif Intell. 2016;78(3):259\u2013301.","journal-title":"Ann Math Artif Intell"},{"key":"2383_CR24","unstructured":"Darwiche A, Hirth A. On the reasons behind decisions. arXiv preprint arXiv:2002.09284."},{"key":"2383_CR25","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1609\/aaai.v33i01.33011511","volume":"33","author":"A Ignatiev","year":"2019","unstructured":"Ignatiev A, Narodytska N, Marques-Silva J. Abduction-based explanations for machine learning models. AAAI. 2019;33:1511\u20139.","journal-title":"AAAI"},{"key":"2383_CR26","doi-asserted-by":"crossref","unstructured":"Ignatiev A. Towards trustable explainable ai. In: IJCAI, 2020; p. 5154\u20135158.","DOI":"10.24963\/ijcai.2020\/726"},{"key":"2383_CR27","doi-asserted-by":"crossref","unstructured":"Vigan\u00f2 L, Magazzeni D. Explainable security. In: IEEE EuroS &PW 2020; p. 293\u2013300.","DOI":"10.1109\/EuroSPW51379.2020.00045"},{"key":"2383_CR28","unstructured":"Vadillo J, Santana R, Lozano JA. When and how to fool explainable models (and humans) with adversarial examples. arXiv:2107.01943."},{"key":"2383_CR29","unstructured":"Muna RK, Maliha HT, Hasan M. Demystifying machine learning models for iot attack detection with explainable ai. Ph.D. thesis, Brac University 2021."},{"key":"2383_CR30","doi-asserted-by":"crossref","unstructured":"Melis M, Maiorca D, Biggio B, Giacinto G, Roli F. Explaining black-box android malware detection. In: 26th EUSIPCO, 2018; p. 524\u2013528.","DOI":"10.23919\/EUSIPCO.2018.8553598"},{"key":"2383_CR31","doi-asserted-by":"crossref","unstructured":"Mahbooba B, Timilsina M, Sahal R, Serrano M. Explainable artificial intelligence (xai) to enhance trust management in intrusion detection systems using decision tree model. Complexity. 2021;6634811.","DOI":"10.1155\/2021\/6634811"},{"key":"2383_CR32","unstructured":"Grosse K, Manoharan P, Papernot N, Backes M, McDaniel P. On the (statistical) detection of adversarial examples. arXiv:1702.06280."},{"key":"2383_CR33","unstructured":"Paredes JN, Teze JCL, Simari GI, Martinez MV. On the importance of domain-specific explanations in ai-based cybersecurity systems (technical report). arXiv preprint arXiv:2108.02006."},{"key":"2383_CR34","unstructured":"Bao T, Burket J, Woo M, Turner R, Brumley D. Byteweight: learning to recognize functions in binary code. In: 23rd USENIX Security Symposium, 2014; p. 845\u2013860."},{"issue":"8","key":"2383_CR35","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1080\/00029890.1952.11988183","volume":"59","author":"WV Quine","year":"1952","unstructured":"Quine WV. The problem of simplifying truth functions. Am Math Mon. 1952;59(8):521\u201331.","journal-title":"Am Math Mon"},{"key":"2383_CR36","unstructured":"Zhou Q, Pezaros D. Evaluation of machine learning classifiers for zero-day intrusion detection\u2013an analysis on cic-aws-2018 dataset. arXiv preprint arXiv:1905.03685."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02383-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02383-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02383-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T12:16:23Z","timestamp":1702901783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02383-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,18]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["2383"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02383-y","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,18]]},"assertion":[{"value":"1 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest with any party or individual.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"115"}}