{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T06:59:04Z","timestamp":1768546744721,"version":"3.49.0"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council Linkage Project","doi-asserted-by":"publisher","award":["LP170100924"],"award-info":[{"award-number":["LP170100924"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council Discovery Project","doi-asserted-by":"publisher","award":["DP160103567"],"award-info":[{"award-number":["DP160103567"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/tcyb.2019.2940940","type":"journal-article","created":{"date-parts":[[2019,10,15]],"date-time":"2019-10-15T22:10:20Z","timestamp":1571177420000},"page":"3081-3093","source":"Crossref","is-referenced-by-count":100,"title":["Data-Driven Cyber Security in Perspective\u2014Intelligent Traffic Analysis"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1886-0768","authenticated-orcid":false,"given":"Rory","family":"Coulter","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7207-0716","authenticated-orcid":false,"given":"Qing-Long","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-8330","authenticated-orcid":false,"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-7801","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_21"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.003"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138840"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.443"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.036"},{"key":"ref36","article-title":"An in-depth analysis of abuse on Twitter","author":"oliver","year":"2014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2516039"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059997"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2614220"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491507"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00014"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1603"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2011.2160543"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.185"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2720168"},{"key":"ref24","author":"keppel","year":"1991","journal-title":"Design and Analysis A Researcher s Handbook"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2304633"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.07.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2610963"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3014812.3014815"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.004"},{"key":"ref90","first-page":"1","article-title":"Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning","author":"yamaguchi","year":"2011","journal-title":"Proc Usenix Conf Offensive Technol (WOOT)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.28"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_17"},{"key":"ref57","first-page":"142","article-title":"Don&#x2019;t follow me: Spam detection in Twitter","author":"wang","year":"2010","journal-title":"Proc Int Conf Security and Cryptography (SECRYPT)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"ref55","first-page":"625","article-title":"Transcend: Detecting concept drift in Malware classification models","author":"jordaney","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref54","first-page":"1","article-title":"Detecting spammers on Twitter","volume":"6","author":"benevenuto","year":"2010","journal-title":"Proc Collaboration Electronic Messaging Anti-Abuse and Spam Conf (CEAS)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.50"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2754998"},{"key":"ref10","first-page":"144","article-title":"Twitter trends manipulation: A first look inside the security of Twitter trending","volume":"12","author":"zhang","year":"2017","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref11","first-page":"1","article-title":"Measuring user influence in Twitter: The million follower fallacy","author":"cha","year":"2010","journal-title":"4th Int AAAI Conf on Weblogs and Social Media"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2621888"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1203354"},{"key":"ref13","article-title":"COMPA: Detecting compromised accounts on social networks","author":"egele","year":"2013","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"ref15","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"ref16","author":"han","year":"2011","journal-title":"Data Mining Concepts and Techniques Amsterdam The Netherlands"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"ref17","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2710540"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322122"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378626"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2503119"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2535119"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108557"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2900478"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179386"},{"key":"ref87","first-page":"50","article-title":"Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets","author":"zhou","year":"2012","journal-title":"Proc 19th Annu Netw Distrib Syst Security Symp (NDSS)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref9","first-page":"1093","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref45","first-page":"1","article-title":"Automated attack discovery in TCP congestion control using a model-guided approach","author":"jero","year":"2018","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249453"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7138-7"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2016.36"},{"key":"ref44","first-page":"1169","article-title":"Identifying and characterizing sybils in the Tor network","author":"winter","year":"2016","journal-title":"Proc 25th USENIX Secur Symp (USENIX Secur )"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2650206"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9119488\/08870212.pdf?arnumber=8870212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:20:47Z","timestamp":1651080047000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8870212\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":90,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2019.2940940","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7]]}}}