{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:46:37Z","timestamp":1776444397135,"version":"3.51.2"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030963071","type":"print"},{"value":"9783030963088","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96308-8_96","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:15:41Z","timestamp":1648300541000},"page":"1035-1045","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1693-7872","authenticated-orcid":false,"given":"Tiago","family":"Dias","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5030-7751","authenticated-orcid":false,"given":"Nuno","family":"Oliveira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2919-4817","authenticated-orcid":false,"given":"Norberto","family":"Sousa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0779-3480","authenticated-orcid":false,"given":"Orlando","family":"Sousa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"key":"96_CR1","unstructured":"Institute Director, M., Cilluffo, F.J.: Cyber and Physical Security: Perspectives from the C-Suite Survey Research Project Conducted by the Center for Cyber and Homeland Security (CCHS) in Partnership with the International Security Management Association (ISMA) Project Leadership, May 2019. http:\/\/cchs.auburn.edu\/_files\/isma-survey-paper.pdf. Accessed 19 Apr 2021"},{"key":"96_CR2","volume-title":"Network Security Bible","author":"E Cole","year":"2002","unstructured":"Cole, E.: Network Security Bible, 2nd edn. Wiley, New York (2002)","edition":"2"},{"issue":"16","key":"96_CR3","doi-asserted-by":"publisher","first-page":"30","DOI":"10.5120\/13608-1412","volume":"78","author":"S KishorWagh","year":"2013","unstructured":"KishorWagh, S., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30\u201337 (2013). https:\/\/doi.org\/10.5120\/13608-1412","journal-title":"Int. J. Comput. Appl."},{"key":"96_CR4","unstructured":"Snort - Network Intrusion Detection and Prevention System. https:\/\/www.snort.org\/. Accessed 05 May 2021"},{"key":"96_CR5","unstructured":"Suricata | Open Source IDS\/IPS\/NSM Engine. https:\/\/suricata-ids.org\/. Accessed 05 May 2021"},{"key":"96_CR6","unstructured":"The Zeek Network Security Monitor. https:\/\/zeek.org\/. Accessed 04 July 2021"},{"key":"96_CR7","unstructured":"National Institute of Standards and Technology | NIST. https:\/\/www.nist.gov\/. Accessed 17 Sept 2021"},{"key":"96_CR8","doi-asserted-by":"publisher","unstructured":"National Institute of Standards. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1 (2014). https:\/\/doi.org\/10.6028\/NIST.CSWP.04162018","DOI":"10.6028\/NIST.CSWP.04162018"},{"issue":"4","key":"96_CR9","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.3390\/app11041674","volume":"11","author":"N Oliveira","year":"2021","unstructured":"Oliveira, N., Pra\u00e7a, I., Maia, E., Sousa, O.: Intelligent cyber attack detection and classification for network-based intrusion detection systems. Appl. Sci. 11(4), 1674 (2021). https:\/\/doi.org\/10.3390\/app11041674","journal-title":"Appl. Sci."},{"key":"96_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6634811","volume":"2021","author":"B Mahbooba","year":"2021","unstructured":"Mahbooba, B., Timilsina, M., Sahal, R., Serrano, M.: Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity 2021, 1\u201311 (2021). https:\/\/doi.org\/10.1155\/2021\/6634811","journal-title":"Complexity"},{"issue":"6","key":"96_CR11","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/s10458-019-09408-y","volume":"33","author":"A Rosenfeld","year":"2019","unstructured":"Rosenfeld, A., Richardson, A.: Explainability in human\u2013agent systems. Autonom. Agents Multi-Agent Syst. 33(6), 673\u2013705 (2019). https:\/\/doi.org\/10.1007\/s10458-019-09408-y","journal-title":"Autonom. Agents Multi-Agent Syst."},{"key":"96_CR12","doi-asserted-by":"publisher","unstructured":"Duval, A.: Explainable Artificial Intelligence (XAI) Explainable Artificial Intelligence (XAI) by Alexandre Duval MA4K9 Scholarly Report Submitted to the University of Warwick Mathematics Institute (2019). https:\/\/doi.org\/10.13140\/RG.2.2.24722.09929","DOI":"10.13140\/RG.2.2.24722.09929"},{"key":"96_CR13","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.future.2017.10.016","volume":"80","author":"SAR Shah","year":"2018","unstructured":"Shah, S.A.R., Issac, B.: Performance comparison of intrusion detection systems and application of machine learning to snort system. Futur. Gener. Comput. Syst. 80, 157\u2013170 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.10.016","journal-title":"Futur. Gener. Comput. Syst."},{"key":"96_CR14","unstructured":"Gustavsson, V.: Machine learning for network based intrusion detection: an application using Zeek and the CICIDS2017 dataset. In: Royal Institute of Technology, KTH School of Electrical Engineering and Computer Science Stockholm, Sweden (2019)"},{"key":"96_CR15","doi-asserted-by":"publisher","unstructured":"Sinclair, C., Pierce, L., Matzner, S.: An application of machine learning to network intrusion detection. In: Proceedings of the Annual Computer Security Applications Conference, ACSAC, vol. Part F1334, no. 0293, pp. 371\u2013377 (1999). https:\/\/doi.org\/10.1109\/CSAC.1999.816048","DOI":"10.1109\/CSAC.1999.816048"},{"key":"96_CR16","unstructured":"Ojugo, A.A., Eboka, A.O., Okonta, O.E., Yoro, R.E., Aghware, F.O.: Genetic algorithm rule-based intrusion detection system (GAIDS). J. Emerg. Trends Comput. Inf. Syst. 3(8), 1182\u20131194 (2012). http:\/\/www.cisjournal.org"},{"key":"96_CR17","unstructured":"Welcome To UML Web Site! https:\/\/www.uml.org\/. Accessed 05 May 2021"},{"key":"96_CR18","doi-asserted-by":"crossref","unstructured":"Kruchten, P.: Architectural Blueprints-The \u20184+1\u2019 View Model of Software Architecture (1995)","DOI":"10.1145\/216591.216611"},{"key":"96_CR19","unstructured":"Brown, S.: The C4 model for visualising software architecture. Infoq.Com, pp. 1\u201313 (2020). https:\/\/c4model.com\/. Accessed 07 May 2021"},{"key":"96_CR20","doi-asserted-by":"publisher","unstructured":"Al-Debagy, O., Martinek, P.: A comparative review of microservices and monolithic architectures. In: Proceedings of the 18th IEEE International Symposium on Computational Intelligence and Informatics, CINTI 2018, pp. 149\u2013154 (2018). https:\/\/doi.org\/10.1109\/CINTI.2018.8928192","DOI":"10.1109\/CINTI.2018.8928192"},{"key":"96_CR21","unstructured":"Larman, C.: Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process, 2nd edn (2001)"},{"key":"96_CR22","unstructured":"Martin, R.C.: Design Principles and Design Patterns (2000)"},{"key":"96_CR23","unstructured":"Proctor, M.: \u201cGizil Oguz,\u201d no. January 2008 (2014)"},{"issue":"1","key":"96_CR24","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/3423956","volume":"21","author":"A Lukkarinen","year":"2021","unstructured":"Lukkarinen, A., Malmi, L., Haaranen, L.: Event-driven programming in programming education: a mapping review. ACM Trans. Comput. Educ. 21(1), 31 (2021). https:\/\/doi.org\/10.1145\/3423956","journal-title":"ACM Trans. Comput. Educ."},{"key":"96_CR25","unstructured":"Apache Kafka. https:\/\/kafka.apache.org\/. Accessed 05 May 2021"},{"key":"96_CR26","unstructured":"What is REST. https:\/\/restfulapi.net\/. Accessed 22 June 2021"},{"key":"96_CR27","unstructured":"Scikit-Learn: Machine Learning in Python \u2014 Scikit-Learn 0.24.2 Documentation. https:\/\/scikit-learn.org\/stable\/. Accessed 04 May 2021"},{"key":"96_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/3691629","volume":"2017","author":"L Zhou","year":"2017","unstructured":"Zhou, L., Liao, M., Yuan, C., Zhang, H.: Low-rate DDoS attack detection using expectation of packet size. Secur. Commun. Netw. 2017, 1\u201314 (2017). https:\/\/doi.org\/10.1155\/2017\/3691629","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96308-8_96","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:26:56Z","timestamp":1648301216000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96308-8_96"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963071","9783030963088"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96308-8_96","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}