{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T10:40:08Z","timestamp":1750329608856,"version":"3.41.0"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031874956","type":"print"},{"value":"9783031874963","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87496-3_6","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T10:06:46Z","timestamp":1750327606000},"page":"79-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Green Efficiency for\u00a0Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7641-1566","authenticated-orcid":false,"given":"Pedro","family":"Pereira","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6060-772X","authenticated-orcid":false,"given":"Paulo","family":"Mendes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4968-3653","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Vitorino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"Ahmadi, S., et\u00a0al: Efficient feature selection for intrusion detection systems. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (2019). https:\/\/doi.org\/10.1109\/UEMCON47517.2019.8992960","DOI":"10.1109\/UEMCON47517.2019.8992960"},{"key":"6_CR2","unstructured":"Almeida, L.B.: Multilayer perceptrons. In: Handbook of Neural Computation, pp. C1\u20132. CRC Press (2020)"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Andrade-Hoz, et\u00a0al: Infrastructure-wide and intent-based networking dataset for 5G-and-beyond AI-driven autonomous networks. Sensors 24(3) (2024). https:\/\/doi.org\/10.3390\/s24030783","DOI":"10.3390\/s24030783"},{"key":"6_CR4","unstructured":"Azhagusundari, et\u00a0al: Feature selection based on information gain. Int. J. Innov. Technol. Explor. Eng. (IJITEE) (2013)"},{"key":"6_CR5","unstructured":"Bacchi, U.: This is the carbon footprint of your internet activity. Technical report, Thomson Reuters Foundation (2020)"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Barot, V., Chauhan, S., Patel, B.: Feature selection for modeling intrusion detection. Int. J. Comput. Netw. Inf. Secur. 6, 56\u201362 (2014). https:\/\/doi.org\/10.5815\/IJCNIS.2014.07.08","DOI":"10.5815\/IJCNIS.2014.07.08"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity: Cyber Europe 2022 - After action report - Findings from a PAN-EUROPEAN cyber crisis exercise. Publications Office of the European Union (2022).https:\/\/doi.org\/10.2824\/397622","DOI":"10.2824\/397622"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity, Svetozarov\u00a0Naydenov, R., et al.: ENISA threat landscape 2022 - July 2021 to July 2022. Publications Office of the European Union (2022). https:\/\/doi.org\/10.2824\/764318","DOI":"10.2824\/764318"},{"key":"6_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., et al.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2019.102419","journal-title":"J. Inf. Secur. Appl."},{"key":"6_CR12","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6463389","author":"A Ferriyan","year":"2022","unstructured":"Ferriyan, A., et al.: Hikari-22 dataset. Zenodo (2022). https:\/\/doi.org\/10.5281\/zenodo.6463389","journal-title":"Zenodo"},{"issue":"17","key":"6_CR13","doi-asserted-by":"publisher","first-page":"7868","DOI":"10.3390\/app11177868","volume":"11","author":"A Ferriyan","year":"2021","unstructured":"Ferriyan, A., et al.: Generating network intrusion detection dataset based on real and encrypted synthetic attack traffic. Appl. Sci. 11(17), 7868 (2021). https:\/\/doi.org\/10.3390\/app11177868","journal-title":"Appl. Sci."},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"Giorgi, F., et\u00a0al: The R language: an engine for bioinformatics and data science. Life 12 (2022). https:\/\/doi.org\/10.3390\/life12050648","DOI":"10.3390\/life12050648"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Graves, A., Graves, A.: Long short-term memory. Supervised sequence labelling with recurrent neural networks, pp. 37\u201345 (2012)","DOI":"10.1007\/978-3-642-24797-2_4"},{"key":"6_CR16","unstructured":"Ke, G., et al: Lightgbm: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"issue":"7","key":"6_CR17","doi-asserted-by":"publisher","first-page":"8","DOI":"10.5120\/cae2017652685","volume":"7","author":"AE Kwame","year":"2017","unstructured":"Kwame, A.E., et al.: Qualitative assessment of compiled, interpreted and hybrid programming languages. Commun. Appl. Electron. 7(7), 8\u201313 (2017). https:\/\/doi.org\/10.5120\/cae2017652685","journal-title":"Commun. Appl. Electron."},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/J.KNOSYS.2019.04.013","volume":"178","author":"S Lang","year":"2019","unstructured":"Lang, S., et al.: Wekadeeplearning4j: a deep learning package for weka based on deeplearning4j. Knowl. Based Syst. 178, 48\u201350 (2019). https:\/\/doi.org\/10.1016\/J.KNOSYS.2019.04.013","journal-title":"Knowl. Based Syst."},{"key":"6_CR19","doi-asserted-by":"publisher","unstructured":"Li, J., et\u00a0al: Feature selection: a data perspective. ACM Comput. Surv. 50(6) (2017). https:\/\/doi.org\/10.1145\/3136625","DOI":"10.1145\/3136625"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Lin, Y., et\u00a0al.: Rust as a language for high performance GC implementation. In: Proceedings of the 2016 ACM SIGPLAN International Symposium on Memory Management (2016). https:\/\/doi.org\/10.1145\/2926697.2926707","DOI":"10.1145\/2926697.2926707"},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Lyu, et\u00a0al.: A survey on feature selection techniques based on filtering methods for cyber attack detection. Information 14(3), 191 (2023). https:\/\/doi.org\/10.3390\/info14030191","DOI":"10.3390\/info14030191"},{"issue":"5","key":"6_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2017.3680959","volume":"19","author":"JR Nurse","year":"2017","unstructured":"Nurse, J.R., et al.: Security risk assessment in internet of things systems. IT Prof. 19(5), 20\u201326 (2017). https:\/\/doi.org\/10.1109\/MITP.2017.3680959","journal-title":"IT Prof."},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-030-46216-1_17","volume-title":"A Practical Handbook of Corpus Linguistics","author":"M Paquot","year":"2020","unstructured":"Paquot, M., Larsson, T.: Descriptive statistics and visualization with R. In: Paquot, M., Gries, S.T. (eds.) A Practical Handbook of Corpus Linguistics, pp. 375\u2013399. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-46216-1_17"},{"issue":"7","key":"6_CR24","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MC.2022.3148714","volume":"55","author":"D Patterson","year":"2022","unstructured":"Patterson, D., et al.: The carbon footprint of machine learning training will plateau, then shrink. Computer 55(7), 18\u201328 (2022). https:\/\/doi.org\/10.1109\/MC.2022.3148714","journal-title":"Computer"},{"key":"6_CR25","doi-asserted-by":"publisher","unstructured":"Pereira, R., et\u00a0al: Energy efficiency across programming languages: how do energy, time, and memory relate? In: Proceedings of the 10th ACM SIGPLAN International Conference on Software Language Engineering, SLE 2017, pp. 256\u2013267. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3136014.3136031","DOI":"10.1145\/3136014.3136031"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Peterson, J.M., et\u00a0al: A review and analysis of the bot-IoT dataset. In: 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE), pp. 20\u201327. IEEE (2021)","DOI":"10.1109\/SOSE52839.2021.00007"},{"key":"6_CR27","unstructured":"Pinto, L.: The impact of AI programming languages on AI talent (2024). https:\/\/lumenalta.com\/insights\/ai-programming-languages-talent"},{"issue":"20","key":"6_CR28","doi-asserted-by":"publisher","first-page":"31381","DOI":"10.1007\/s11042-021-10567-y","volume":"80","author":"MA Rahman","year":"2021","unstructured":"Rahman, M.A., Asyhari, A.T., Wen, O.W., Ajra, H., Ahmed, Y., Anwar, F.: Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection. Multimedia Tools Appl. 80(20), 31381\u201331399 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10567-y","journal-title":"Multimedia Tools Appl."},{"issue":"4","key":"6_CR29","doi-asserted-by":"publisher","first-page":"193","DOI":"10.3390\/info11040193","volume":"11","author":"S Raschka","year":"2020","unstructured":"Raschka, S., et al.: Machine learning in python: main developments and technology trends in data science, machine learning, and artificial intelligence. Information 11(4), 193 (2020). https:\/\/doi.org\/10.3390\/info11040193","journal-title":"Information"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Rihan, S.D.A., et\u00a0al: Approach for detecting attacks on IoT networks based on ensemble feature selection and deep learning models. Sensors 23 (2023). https:\/\/doi.org\/10.3390\/s23177342","DOI":"10.3390\/s23177342"},{"key":"6_CR31","unstructured":"Schwartz, R., et\u00a0al: Green AI (2019). https:\/\/arxiv.org\/abs\/1907.10597"},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Sheen, S., Rajesh, R.: Network intrusion detection using feature selection and decision tree classifier. In: TENCON 2008 - 2008 IEEE Region 10 Conference, pp.\u00a01\u20134 (2008). https:\/\/doi.org\/10.1109\/TENCON.2008.4766847","DOI":"10.1109\/TENCON.2008.4766847"},{"key":"6_CR33","unstructured":"Silva, M., et\u00a0al: Efficient network traffic feature sets for IoT intrusion detection (2024). https:\/\/arxiv.org\/abs\/2406.08042"},{"key":"6_CR34","unstructured":"Taylor, L.: How much does the internet contribute to global emissions? (2021)"},{"issue":"1","key":"6_CR35","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/s12652-020-02167-9","volume":"12","author":"A Thakkar","year":"2020","unstructured":"Thakkar, A., Lohiya, R.: Attack classification using feature selection techniques: a comparative study. J. Ambient. Intell. Humaniz. Comput. 12(1), 1249\u20131266 (2020). https:\/\/doi.org\/10.1007\/s12652-020-02167-9","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"6_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/J.MATPR.2021.01.470","author":"MK Vanam","year":"2021","unstructured":"Vanam, M.K., et al.: High performance machine learning and data science based implementation using weka. Mater. Today Proc. (2021). https:\/\/doi.org\/10.1016\/J.MATPR.2021.01.470","journal-title":"Mater. Today Proc."},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"Verdecchia, R., et\u00a0al: Data-centric green AI an exploratory empirical study. In: 2022 International Conference on ICT for Sustainability (ICT4S). IEEE (2022). https:\/\/doi.org\/10.1109\/ict4s55073.2022.00015","DOI":"10.1109\/ict4s55073.2022.00015"},{"key":"6_CR38","doi-asserted-by":"publisher","unstructured":"Vitorino, J., et al.: A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13","DOI":"10.1007\/978-3-031-08147-7_13"},{"key":"6_CR39","doi-asserted-by":"publisher","unstructured":"Vitorino, J., et al.: An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-57537-2_1","DOI":"10.1007\/978-3-031-57537-2_1"},{"key":"6_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-024-01047-z","author":"J Vitorino","year":"2024","unstructured":"Vitorino, J., et al.: Reliable feature selection for adversarially robust cyber-attack detection. Ann. Telecommun. (2024). https:\/\/doi.org\/10.1007\/s12243-024-01047-z","journal-title":"Ann. Telecommun."},{"key":"6_CR41","unstructured":"Wu, C.J., et\u00a0al: Sustainable AI: environmental implications, challenges and opportunities. In: Marculescu, D., et\u00a0al (eds.) Proceedings of Machine Learning and Systems, vol.\u00a04, pp. 795\u2013813 (2022)"},{"key":"6_CR42","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.snb.2015.02.025","volume":"212","author":"K Yan","year":"2015","unstructured":"Yan, K., Zhang, D.: Feature selection and analysis on correlated gas sensor data with recursive feature elimination. Sens. Actuators B Chem. 212, 353\u2013363 (2015). https:\/\/doi.org\/10.1016\/j.snb.2015.02.025","journal-title":"Sens. Actuators B Chem."},{"key":"6_CR43","doi-asserted-by":"publisher","unstructured":"Yigitcanlar, T., et\u00a0al: Green artificial intelligence: towards an efficient, sustainable and equitable technology for smart cities and futures. Sustainability 13(16) (2021). https:\/\/doi.org\/10.3390\/su13168952","DOI":"10.3390\/su13168952"},{"key":"6_CR44","doi-asserted-by":"publisher","unstructured":"Yin, Y., et\u00a0al: IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J. Big Data 10, 1\u201326 (2022). https:\/\/doi.org\/10.1186\/s40537-023-00694-8","DOI":"10.1186\/s40537-023-00694-8"},{"key":"6_CR45","doi-asserted-by":"publisher","unstructured":"Zhai, et\u00a0al: A chi-square statistics based feature selection method in text classification. In: 2018 IEEE 9th International Conference on Software Engineering and Service Science (2018). https:\/\/doi.org\/10.1109\/ICSESS.2018.8663882","DOI":"10.1109\/ICSESS.2018.8663882"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87496-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T10:06:52Z","timestamp":1750327612000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87496-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031874956","9783031874963"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87496-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montr\u00e9al, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fps-2024.hec.ca\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}