{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:14:54Z","timestamp":1762272894533},"reference-count":61,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","funder":[{"name":"European Union's Horizon 2020 research","award":["833115"],"award-info":[{"award-number":["833115"]}]},{"name":"European Union's Horizon 2020 research","award":["957286"],"award-info":[{"award-number":["957286"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Vietnam J. Comp. Sci."],"published-print":{"date-parts":[[2023,2]]},"abstract":"<jats:p> In intelligent information systems data play a critical role. The issue of missing data is one of the commonplace problems occurring in data collected in the real world. The problem stems directly from the very nature of data collection. In this paper, the notion of handling missing values in a real-world application of computational intelligence is considered. Two experimental campaigns were conducted, evaluating different approaches to the missing values imputation on Random Forest-based classifiers, trained using modern cybersecurity benchmarks datasets: CICIDS2017 and IoT-23. In result of the experiments it transpired that the chosen algorithm for data imputation has a severe impact on the results of the classifier used for network intrusion detection. It also comes to light that one of the most popular approaches to handling missing data\u00a0\u2014 complete case analysis\u00a0\u2014 should never be used in cybersecurity. <\/jats:p>","DOI":"10.1142\/s2196888822500257","type":"journal-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T16:16:20Z","timestamp":1651162580000},"page":"1-23","source":"Crossref","is-referenced-by-count":7,"title":["The Application of Deep Learning Imputation and Other Advanced Methods for Handling Missing Values in Network Intrusion Detection"],"prefix":"10.1142","volume":"10","author":[{"given":"Mateusz","family":"Szczepa\u0144ski","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Pozna\u0144, Poland"},{"name":"Bydgoszcz University of Science and Technology, PB\u015a Bydgoszcz, Bydgoszcz, Poland"}]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Pozna\u0144, Poland"},{"name":"Bydgoszcz University of Science and Technology, PB\u015a Bydgoszcz, Bydgoszcz, Poland"}]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Pozna\u0144, Poland"},{"name":"Bydgoszcz University of Science and Technology, PB\u015a Bydgoszcz, Bydgoszcz, Poland"}]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Pozna\u0144, Poland"},{"name":"Bydgoszcz University of Science and Technology, PB\u015a Bydgoszcz, Bydgoszcz, Poland"}]}],"member":"219","published-online":{"date-parts":[[2022,8,27]]},"reference":[{"key":"S2196888822500257BIB001","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.84"},{"key":"S2196888822500257BIB002","series-title":"Proceedings, Part I, Lecture Notes in Computer Science","volume-title":"Advances in Artificial Intelligence: From Theory to Practice \u2014 30th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA\/AIE 2017","volume":"10350","author":"Benferhat S.","year":"2017"},{"key":"S2196888822500257BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26633-6_4"},{"key":"S2196888822500257BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28267-1_6"},{"key":"S2196888822500257BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2007.368854"},{"key":"S2196888822500257BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126025"},{"key":"S2196888822500257BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4018-5"},{"key":"S2196888822500257BIB008","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891360"},{"key":"S2196888822500257BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73280-6_33"},{"key":"S2196888822500257BIB012","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12312"},{"key":"S2196888822500257BIB013","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"S2196888822500257BIB014","series-title":"Conference Track Proceedings","volume-title":"2nd International Conference on Learning Representations, ICLR 2014","author":"Kingma D. P.","year":"2014"},{"issue":"2","key":"S2196888822500257BIB016","first-page":"1","volume":"30","author":"Lall R.","year":"2021","journal-title":"Polit. Anal."},{"key":"S2196888822500257BIB017","doi-asserted-by":"publisher","DOI":"10.1093\/gigascience\/giaa082"},{"key":"S2196888822500257BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.09.406"},{"key":"S2196888822500257BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683011"},{"key":"S2196888822500257BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103372"},{"key":"S2196888822500257BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978530"},{"key":"S2196888822500257BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2628873"},{"key":"S2196888822500257BIB023","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"S2196888822500257BIB024","first-page":"103","volume-title":"Proceedings of SSST@EMNLP 2014","author":"Cho K."},{"key":"S2196888822500257BIB025","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyt.2020.00673"},{"key":"S2196888822500257BIB026","doi-asserted-by":"publisher","DOI":"10.3389\/fgene.2021.624128"},{"key":"S2196888822500257BIB027","volume-title":"Proceedings of the 35th International Conference on Machine Learning","author":"Yoon J.","year":"2018"},{"key":"S2196888822500257BIB029","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-24271-9"},{"key":"S2196888822500257BIB030","first-page":"1603","volume-title":"Advances in Neural Information Processing Systems","volume":"31","author":"Luo Y.","year":"2018"},{"key":"S2196888822500257BIB032","first-page":"6776","volume-title":"Advances in Neural Information Processing Systems","volume":"31","author":"Cao W.","year":"2018"},{"key":"S2196888822500257BIB033","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/429"},{"key":"S2196888822500257BIB034","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01892-3"},{"key":"S2196888822500257BIB035","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2018.8596389"},{"key":"S2196888822500257BIB036","doi-asserted-by":"publisher","DOI":"10.1109\/TMEE.2011.6199284"},{"key":"S2196888822500257BIB037","first-page":"3927","volume-title":"ICASSP 2019 \u2014 2019 IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)","author":"Prince J.","year":"2019"},{"key":"S2196888822500257BIB038","doi-asserted-by":"publisher","DOI":"10.1186\/s12874-017-0442-1"},{"key":"S2196888822500257BIB039","doi-asserted-by":"publisher","DOI":"10.1007\/BF02291569"},{"key":"S2196888822500257BIB040","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984588"},{"key":"S2196888822500257BIB041","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2011.6019647"},{"key":"S2196888822500257BIB042","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIA.2017.8203554"},{"key":"S2196888822500257BIB043","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDSA.2016.7818486"},{"key":"S2196888822500257BIB044","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2719703"},{"key":"S2196888822500257BIB045","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP47207.2019.8985715"},{"key":"S2196888822500257BIB046","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2015.7193063"},{"key":"S2196888822500257BIB047","doi-asserted-by":"publisher","DOI":"10.1109\/KAM.2008.177"},{"key":"S2196888822500257BIB048","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp48618.2020.00-57"},{"key":"S2196888822500257BIB049","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2012.6233805"},{"key":"S2196888822500257BIB050","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/63.3.581"},{"key":"S2196888822500257BIB051","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD.2018.8396165"},{"key":"S2196888822500257BIB052","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSBE.2012.6396621"},{"key":"S2196888822500257BIB053","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2017.8210844"},{"key":"S2196888822500257BIB054","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-5823.2010.00103.x"},{"key":"S2196888822500257BIB055","doi-asserted-by":"publisher","DOI":"10.1002\/mpr.329"},{"issue":"80","key":"S2196888822500257BIB056","first-page":"2287","volume":"11","author":"Mazumder R.","year":"2010","journal-title":"J. Mach. Learn. Res."},{"key":"S2196888822500257BIB057","volume":"27","author":"Raghunathan T. E.","year":"2001","journal-title":"Survey Methodol."},{"key":"S2196888822500257BIB058","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/17.6.520"},{"key":"S2196888822500257BIB059","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btr597"},{"key":"S2196888822500257BIB060","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"S2196888822500257BIB061","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03496-2_33"},{"key":"S2196888822500257BIB062","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8753870"},{"key":"S2196888822500257BIB063","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50423-6_15"},{"key":"S2196888822500257BIB065","first-page":"2825","volume":"12","author":"Pedregosa F.","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"S2196888822500257BIB066","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207199"},{"key":"S2196888822500257BIB067","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5826737"}],"container-title":["Vietnam Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S2196888822500257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T04:51:19Z","timestamp":1677300679000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S2196888822500257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,27]]},"references-count":61,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["10.1142\/S2196888822500257"],"URL":"https:\/\/doi.org\/10.1142\/s2196888822500257","relation":{},"ISSN":["2196-8888","2196-8896"],"issn-type":[{"value":"2196-8888","type":"print"},{"value":"2196-8896","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,27]]}}}