{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:57:09Z","timestamp":1771955829397,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,27]]},"DOI":"10.1109\/csr54599.2022.9850295","type":"proceedings-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T19:35:46Z","timestamp":1660678546000},"page":"267-272","source":"Crossref","is-referenced-by-count":6,"title":["Towards Continuous Enrichment of Cyber Threat Intelligence: A Study on a Honeypot Dataset"],"prefix":"10.1109","author":[{"given":"Arnolnt","family":"Spyros","sequence":"first","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]},{"given":"Angelos","family":"Papoutsis","sequence":"additional","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]},{"given":"Ilias","family":"Koritsas","sequence":"additional","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]},{"given":"Notis","family":"Mengidis","sequence":"additional","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]},{"given":"Christos","family":"Iliou","sequence":"additional","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]},{"given":"Dimitris","family":"Kavallieros","sequence":"additional","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]},{"given":"Theodora","family":"Tsikrika","sequence":"additional","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]},{"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[{"name":"CERTH,Information Technologies Institute,Thessaloniki,Greece"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5220\/0007724801250136"},{"key":"ref32","first-page":"1322","article-title":"Adasyn: Adaptive synthetic sampling approach for imbalanced learning","author":"he","year":"2008","journal-title":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)"},{"key":"ref31","first-page":"317","article-title":"Handling imbalanced data: Smote vs. random undersampling","volume":"4","author":"mishra","year":"2017","journal-title":"Int Res J Eng Technol"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/technologies9030052"},{"key":"ref34","article-title":"Reviving threshold-moving: a simple plug-in bagging ensemble for binary and multiclass imbalanced data","author":"collell","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3447815"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.191"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322600"},{"key":"ref14","first-page":"9","article-title":"Sample estimate of the entropy of a random vector","volume":"23","author":"kozachenko","year":"1987","journal-title":"Problemy Peredachi Informatsii"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-8208-z"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031256"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3167918.3167951"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1024691352"},{"key":"ref28","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","volume":"14","author":"kohavi","year":"1995","journal-title":"IJCAI"},{"key":"ref4","first-page":"1","article-title":"Container-based honeypot deployment for the analysis of malicious activity","author":"kyriakou","year":"2018","journal-title":"2018 Global Information Infrastructure and Networking Symposium (GIIS)"},{"key":"ref27","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"The Journal of Machine Learning Research"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INCIT.2019.8912060"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2019.00058"},{"key":"ref29","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","first-page":"60","article-title":"A report on the security of home connections with iot and docker honeypots","author":"bistarelli","year":"2020","journal-title":"ITASEC"},{"key":"ref8","first-page":"279","article-title":"Hacker forum exploit and classification for proactive cyber threat intelligence","author":"gautam","year":"2019","journal-title":"International Conference on Inventive Computation Technologies"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101867"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IACC48062.2019.8971584"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3199478.3199490"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","article-title":"Stacked generalization","volume":"5","author":"wolpert","year":"1992","journal-title":"Neural Networks"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref23","article-title":"Lightgbm: A highly efficient gradient boosting decision tree","volume":"30","author":"ke","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref26","first-page":"1189","article-title":"Greedy function approximation: a gradient boosting machine","author":"friedman","year":"2001","journal-title":"Annals of Statistics"},{"key":"ref25","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"liaw","year":"2002","journal-title":"R News"}],"event":{"name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Rhodes, Greece","start":{"date-parts":[[2022,7,27]]},"end":{"date-parts":[[2022,7,29]]}},"container-title":["2022 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9850275\/9850277\/09850295.pdf?arnumber=9850295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:22:56Z","timestamp":1662409376000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9850295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/csr54599.2022.9850295","relation":{},"subject":[],"published":{"date-parts":[[2022,7,27]]}}}