{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:31:33Z","timestamp":1776184293744,"version":"3.50.1"},"reference-count":221,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006730","name":"German Federal Ministry of Education and Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006730","id-type":"DOI","asserted-by":"publisher"}]},{"name":"WINTERMUTE","award":["16KIS1128"],"award-info":[{"award-number":["16KIS1128"]}]},{"name":"WINTERMUTE","award":["16KIS1129"],"award-info":[{"award-number":["16KIS1129"]}]},{"name":"WINTERMUTE","award":["16KIS1131"],"award-info":[{"award-number":["16KIS1131"]}]},{"name":"WINTERMUTE","award":["16KIS1132"],"award-info":[{"award-number":["16KIS1132"]}]},{"name":"BMBF","award":["16KISA079K"],"award-info":[{"award-number":["16KISA079K"]}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SE 3163\/3-1"],"award-info":[{"award-number":["SE 3163\/3-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["500105691"],"award-info":[{"award-number":["500105691"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Bavarian Ministry of Economics, Regional Development and Energy"},{"name":"VIPNANO","award":["DIK-2307-0005"],"award-info":[{"award-number":["DIK-2307-0005"]}]},{"name":"VIPNANO","award":["DIK-2307-0006"],"award-info":[{"award-number":["DIK-2307-0006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3406939","type":"journal-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T17:31:39Z","timestamp":1717003899000},"page":"79815-79837","source":"Crossref","is-referenced-by-count":22,"title":["The Missing Link in Network Intrusion Detection: Taking AI\/ML Research Efforts to Users"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1658-4539","authenticated-orcid":false,"given":"Katharina","family":"Dietz","sequence":"first","affiliation":[{"name":"Chair of Communication Networks, University of W&#x00FC;rzburg, W&#x00FC;rzburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9125-3017","authenticated-orcid":false,"given":"Michael","family":"M\u00fchlhauser","sequence":"additional","affiliation":[{"name":"Privacy and Security in Information Systems Group, University of Bamberg, Bamberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4700-8264","authenticated-orcid":false,"given":"Jochen","family":"K\u00f6gel","sequence":"additional","affiliation":[{"name":"IsarNet Software Solutions GmbH, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2846-8464","authenticated-orcid":false,"given":"Stephan","family":"Schwinger","sequence":"additional","affiliation":[{"name":"genua GmbH, Kirchheim, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6701-4492","authenticated-orcid":false,"given":"Marleen","family":"Sichermann","sequence":"additional","affiliation":[{"name":"Chair of Communication Networks, University of W&#x00FC;rzburg, W&#x00FC;rzburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5036-5206","authenticated-orcid":false,"given":"Michael","family":"Seufert","sequence":"additional","affiliation":[{"name":"Chair of Networked Embedded Systems and Communication Systems, University of Augsburg, Augsburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7374-3054","authenticated-orcid":false,"given":"Dominik","family":"Herrmann","sequence":"additional","affiliation":[{"name":"Privacy and Security in Information Systems Group, University of Bamberg, Bamberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0173-595X","authenticated-orcid":false,"given":"Tobias","family":"Ho\u00dffeld","sequence":"additional","affiliation":[{"name":"Chair of Communication Networks, University of W&#x00FC;rzburg, W&#x00FC;rzburg, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179321"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045514"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2450538"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90029-5"},{"key":"ref7","article-title":"Intrusion detection systems: A survey and taxonomy","author":"Axelsson","year":"2000"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref10","article-title":"Shallow and deep networks intrusion detection system: A taxonomy and survey","author":"Hodo","year":"2017","journal-title":"arXiv:1701.02145"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3280465"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204171"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3216617"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14329"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s21072514"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.041"},{"key":"ref18","first-page":"26","article-title":"Using proto-personas for executive alignment","volume":"1","author":"Gothelf","year":"2012","journal-title":"UX Mag."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2987036"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312771"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5220\/0010778800003124"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233280"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138869"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321898"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2018.8709231"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00111"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"ref29","first-page":"3583","article-title":"`My privacy for their security: Employees privacy perspectives and expectations when using enterprise security software","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Stegman"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/app12136816"},{"key":"ref31","first-page":"179","article-title":"The work of intrusion detection: Rethinking the role of security analysts","volume-title":"Proc. 10th Amer. Conf. Inf. Syst.","author":"Goodall"},{"key":"ref32","article-title":"Knowledge-injected federated learning","author":"Fan","year":"2022","journal-title":"arXiv:2208.07530"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2889470"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/VizSec53666.2021.00012"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3209412"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2018.2879067"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865028"},{"key":"ref38","first-page":"217","article-title":"End-to-end active learning for computer security experts","volume-title":"Proc. Workshops 32nd AAAI Conf Artif. Intell.","author":"Beaugnon"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16530"},{"key":"ref40","first-page":"277","article-title":"Detecting cyberattack entities from audit data via multi-view anomaly detection with feedback","volume-title":"Proc. Workshops 32nd AAAI Conf. Artif. Intell.","author":"Siddiqui"},{"key":"ref41","first-page":"285","article-title":"Recurrent neural network language models for open vocabulary event-level cyber anomaly detection","volume-title":"Proc. Workshops 32nd AAAI Conf. Artif. Intell.","author":"Tuor"},{"key":"ref42","first-page":"19153","article-title":"FITNESS: (Fine tune on new and similar samples) to detect anomalies in streams with drift and outliers","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"162","author":"Sankararaman"},{"key":"ref43","article-title":"Fixed points in cyber space: Rethinking optimal evasion attacks in the age of AI-NIDS","author":"de Witt","year":"2021","journal-title":"arXiv:2111.12197"},{"key":"ref44","article-title":"Robustness evaluation of deep unsupervised learning algorithms for intrusion detection systems","author":"Nkashama","year":"2022","journal-title":"arXiv:2207.03576"},{"key":"ref45","first-page":"38655","article-title":"Fascinating supervisory signals and where to find them: Deep anomaly detection with scale learning","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"202","author":"Xu"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3229607.3229612"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3229607.3229611"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544268"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012700"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269055"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327864"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327863"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM55787.2022.9964741"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327876"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327818"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615575"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269112"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012675"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149043"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839042"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278886"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761218"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838942"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761580"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279233"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500842"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148945"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839264"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838560"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838282"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279012"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149117"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839056"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149250"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761598"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422328"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278688"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279765"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422622"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500763"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279335"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500458"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149276"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500920"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500831"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148916"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762015"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279563"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761337"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279011"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761487"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761459"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838914"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149384"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279691"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149402"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500574"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838567"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422327"},{"key":"ref100","first-page":"488","article-title":"Traffic classification with machine learning in a live network","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manage. (IM)","author":"Bakker"},{"key":"ref101","first-page":"144","article-title":"A graph-based machine learning approach for bot detection","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manage. (IM)","author":"Daya"},{"key":"ref102","first-page":"408","article-title":"TMAS: A traffic monitoring analytics system leveraging machine learning","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manage. (IM)","author":"Jalalpour"},{"key":"ref103","first-page":"962","article-title":"ORACLE: An architecture for collaboration of data and control planes to detect DDoS attacks","volume-title":"Proc. IFIP\/IEEE Int. Symp. Integr. Netw. Manage. (IM)","author":"Mac\u00edas"},{"key":"ref104","first-page":"866","article-title":"Detection of DoS\/DDoS attacks: The UBM and GMM approach","volume-title":"Proc. IFIP\/IEEE Int. Symp. Integr. Netw. Manage. (IM)","author":"Osorio"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110426"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789927"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154410"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110420"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789939"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789792"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789763"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154343"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110343"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154360"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789921"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110372"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789798"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406212"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154321"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2929425"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3260039"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3031843"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3211254"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971776"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3138457"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2972405"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3225753"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3097903"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3120804"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2927886"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3220775"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014870"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014929"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075656"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2967721"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3229706"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3050091"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3051195"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3024225"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3091517"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3258901"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3004415"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3158468"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3037019"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3088326"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3109076"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3264278"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2960202"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3270339"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3173933"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3259474"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3200924"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3102388"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3212913"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3100308"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3175710"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3218843"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3193099"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486864"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3338468.3356829"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/3474374.3486915"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616631"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484589"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484758"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560609"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/3411508.3421379"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3338468.3356825"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243811"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486869"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421359"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00079"},{"key":"ref173","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2023.23080","article-title":"Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis","volume-title":"Proc. 30th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Fu"},{"key":"ref174","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2023.24830","article-title":"Anomaly detection in the open world: Normality shift detection, explanation, and adaptation","volume-title":"Proc. 30th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Han"},{"key":"ref175","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23204","article-title":"Kitsune: An ensemble of autoencoders for online network intrusion detection","volume-title":"Proc. 25th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Mirsky"},{"key":"ref176","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2023.24508","article-title":"BARS: Local robustness certification for deep learning based traffic analysis systems","volume-title":"Proc. 30th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Wang"},{"key":"ref177","first-page":"4283","article-title":"Network detection of interactive SSH impostors using deep learning","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Piet"},{"key":"ref178","first-page":"1165","article-title":"FANCI: Feature-based automated NXDomain classification and intelligence","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Sch{u}ppen"},{"key":"ref179","first-page":"4337","article-title":"xNIDS: Explaining deep learning-based network intrusion detection systems for active intrusion responses","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Wei"},{"key":"ref180","first-page":"2327","article-title":"CADE: Detecting and explaining concept drift samples for security applications","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Yang"},{"key":"ref181","first-page":"6203","article-title":"An efficient design of intelligent network data plane","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Zhou"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_35"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54129-2_45"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_17"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00062"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00144"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00051"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00146"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00058"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00068"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00107"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00121"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00170"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00109"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00086"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00145"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00049"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00108"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00025"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00101"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865029"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/PacificVis53943.2022.00031"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/VizSec48167.2019.9161489"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1162\/coli_a_00330"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623130"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354239"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1201\/9780203738535-7"},{"key":"ref217","article-title":"Explainable restricted Boltzmann machines for collaborative filtering","author":"Abdollahi","year":"2016","journal-title":"arXiv:1606.07129"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-20181-5_25"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref220","article-title":"GDPR compliance in the context of continuous integration","author":"Shi Li","year":"2020","journal-title":"arXiv:2002.06830"},{"key":"ref221","volume-title":"SANS 2023 CTI survey: Keeping up with a changing threat landscape","author":"Brown","year":"2023"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10540566.pdf?arnumber=10540566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T19:01:12Z","timestamp":1726599672000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10540566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":221,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3406939","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}