{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T05:26:28Z","timestamp":1669008388563},"reference-count":22,"publisher":"Oxford University Press (OUP)","issue":"6","license":[{"start":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T00:00:00Z","timestamp":1646006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,23]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Cybersecurity aggregates are numerical data obtained by aggregation on features along a database of cybersecurity reports. These aggregates are obtained by integration of time-stamped tables using some recent results of non-standard calculus. Time-series of aggregates are shown to contain relevant information about the concrete system dealt with. Trend time series is also forecasted using known data-driven methods. Although absolute forecasting of trend time series is not obtained, a directional forecasting of trend time series is achieved thence validated by means of a rolling cross validation scheme on a public database of Scareware reports.<\/jats:p>","DOI":"10.1093\/jigpal\/jzac005","type":"journal-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T20:12:09Z","timestamp":1643746329000},"page":"954-964","source":"Crossref","is-referenced-by-count":0,"title":["On directional accuracy of some methods to forecast time series of cybersecurity aggregates"],"prefix":"10.1093","volume":"30","author":[{"given":"Miguel V","family":"Carriegos","sequence":"first","affiliation":[{"name":"Matem\u00e1ticas, Universidad de 24071-Le\u00f3n , Spain"}]},{"given":"Ram\u00f3n \u00c1ngel","family":"Fern\u00e1ndez D\u00edaz","sequence":"additional","affiliation":[{"name":"Ing. Mec\u00e1nica, Inform\u00e1tica y Aeroespacial , Universidad de 24071-Le\u00f3n, Spain"}]},{"given":"M T","family":"Trobajo","sequence":"additional","affiliation":[{"name":"Matem\u00e1ticas, Universidad de 24071-Le\u00f3n , Spain"}]},{"given":"Diego Asterio","family":"De Zaballa","sequence":"additional","affiliation":[{"name":"RIASC, Universidad de 24071-Le\u00f3n , Spain"}]}],"member":"286","published-online":{"date-parts":[[2022,2,28]]},"reference":[{"key":"2022112012384832700_ref1","doi-asserted-by":"crossref","first-page":"916","DOI":"10.1093\/jigpal\/jzw055","article-title":"Semantics for incident identification and resolution reports","volume":"24","author":"Borrego-D\u00edaz","year":"2016","journal-title":"Logic Journal of the IGPL"},{"key":"2022112012384832700_ref2","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1093\/jigpal\/jzz050","article-title":"On fingerprinting of public malware analysis services","volume":"28","author":"Botas","year":"2019","journal-title":"Logic Journal of the IGPL"},{"key":"2022112012384832700_ref3","first-page":"273","article-title":"Towards forecasting time series of cyber-security data aggregates","volume-title":"The 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Advances in Intelligent Systems and Computing","author":"Carriegos","year":"2021"},{"key":"2022112012384832700_ref4","article-title":"On aggregation and data-driven prediction of cybersecurity incident reports","volume-title":"IEEE Access","author":"Carriegos","year":"2020"},{"key":"2022112012384832700_ref5","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-642-57758-1_9","article-title":"Integration over finite sets","volume-title":"Nonstandard Analysis in Practice","author":"Cartier","year":"1995"},{"key":"2022112012384832700_ref6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139003896","volume-title":"The Mathematics of Signal Processing","author":"Damelin","year":"2011"},{"key":"2022112012384832700_ref7","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1093\/jigpal\/jzz062","article-title":"On the application of compression-based metrics to identifying anomalous behavior in web traffic","volume":"28","author":"De la Torre","year":"2020","journal-title":"Logic Journal of the IGPL"},{"key":"2022112012384832700_ref8","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1155\/2018\/3702808","article-title":"On detecting and removing superficial redundancy in vector databases","volume":"2018","author":"DeCastro-Garc\u00eda","year":"2018","journal-title":"Mathematical Problems in Engineering,"},{"key":"2022112012384832700_ref9","first-page":"43","article-title":"A mathematical proof of the existence of trends in financial time series","author":"Fliess","year":"2009","journal-title":"Systems Theory: Modelling, Analysis and Control"},{"key":"2022112012384832700_ref10","first-page":"48","article-title":"Easily implementable time series forecasting techniques for resource provisioning in cloud computing","volume-title":"The 6th International Conference on Control, Decision and Information Technologies","author":"Fliess","year":"2019"},{"key":"2022112012384832700_ref11","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1080\/00029890.1982.11995456","article-title":"Calculus is algebra","volume":"89","author":"Hatcher","year":"1982","journal-title":"The American Mathematical Monthly"},{"key":"2022112012384832700_ref12","first-page":"15","article-title":"An improved demand forecasting model using deep learning approach and proposed decision integration strategy for supply chain","volume":"2019","author":"Hilal Kilimci","year":"2019","journal-title":"Complexity"},{"key":"2022112012384832700_ref13","first-page":"11","article-title":"Efficient prediction of network traffic for real-time applications","author":"Iqbal","year":"2019","journal-title":"Journal of Computer Networks and Communications"},{"key":"2022112012384832700_ref14","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1080\/00207170701601728","article-title":"Nonstandard analysis and representation of reality","volume":"81","author":"Lobry","year":"2008","journal-title":"International Journal of Control"},{"key":"2022112012384832700_ref15","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1093\/jigpal\/jzy033","article-title":"Study of the malware SCIRS model with different incidence rates","volume":"27","author":"Mart\u00edn del Rey","year":"2018","journal-title":"Logic Journal of the IGPL"},{"key":"2022112012384832700_ref16","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1515\/math-2017-0094","article-title":"Expert knowledge and data analysis for detecting advanced persistant threats","volume":"15","author":"Moya","year":"2017","journal-title":"Open Mathematics"},{"key":"2022112012384832700_ref17","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0191939","article-title":"Forecasting short-term data center network traffic load with convolutional neural networks","volume":"13","author":"Mozo","year":"2018","journal-title":"PLoS One"},{"key":"2022112012384832700_ref18","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1093\/jigpal\/jzz059","article-title":"Time series forecasting with model selection applied to anomaly detection in network traffic","volume":"28","author":"Saganowsky","year":"2020","journal-title":"Logic Journal of the IGPL"},{"key":"2022112012384832700_ref19","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1093\/jigpal\/jzw051","article-title":"Proposal and comparison of network anomaly detection based long memory statistical models","volume":"24","author":"Saganowsky","year":"2016","journal-title":"Logic Journal of the IGPL"},{"key":"2022112012384832700_ref20","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1093\/jigpal\/jzz060","article-title":"Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: a proof by concept","volume":"28","author":"Sainz","year":"2020","journal-title":"Logic Journal of the IGPL"},{"key":"2022112012384832700_ref21","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1093\/jigpal\/jzy030","article-title":"Gaining deep knowledge of Android malware families through dimensionality reduction techniques","volume":"27","author":"Vega Vega","year":"2019","journal-title":"Logic Journal of the IGPL"},{"key":"2022112012384832700_ref22","article-title":"Android Malware Dataset (CIC-AndMal2017)"}],"container-title":["Logic Journal of the IGPL"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/jigpal\/article-pdf\/30\/6\/954\/47058093\/jzac005.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/jigpal\/article-pdf\/30\/6\/954\/47058093\/jzac005.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T12:39:08Z","timestamp":1668947948000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article\/30\/6\/954\/6537703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,28]]},"references-count":22,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2022,2,28]]},"published-print":{"date-parts":[[2022,11,23]]}},"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzac005","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,12]]},"published":{"date-parts":[[2022,2,28]]}}}