{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:33:20Z","timestamp":1775579600247,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/P009301\/1"],"award-info":[{"award-number":["EP\/P009301\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3474369.3486864","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T11:13:28Z","timestamp":1635419608000},"page":"111-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["INSOMNIA"],"prefix":"10.1145","author":[{"given":"Giuseppina","family":"Andresini","sequence":"first","affiliation":[{"name":"University of Bari Aldo Moro, Bari, Italy"}]},{"given":"Feargus","family":"Pendlebury","sequence":"additional","affiliation":[{"name":"University College London; Royal Holloway, University of London; &amp; International Computer Science Institute, London, United Kingdom"}]},{"given":"Fabio","family":"Pierazzi","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"Corrado","family":"Loglisci","sequence":"additional","affiliation":[{"name":"University of Bari Aldo Moro, Bari, Italy"}]},{"given":"Annalisa","family":"Appice","sequence":"additional","affiliation":[{"name":"University of Bari Aldo Moro &amp; CINI - Consorzio Interuniversitario Nazionale per l'Informatica, Bari, Italy"}]},{"given":"Lorenzo","family":"Cavallaro","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat ... and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/  Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat ... and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Yu","author":"Aggarwal Charu C.","year":"2014","unstructured":"Charu C. Aggarwal , Xiangnan Kong , Quanquan Gu , Jiawei Han , and Philip S . Yu . 2014 . Active Learning : A Survey. In Data Classification: Algorithms and Applications . Charu C. Aggarwal, Xiangnan Kong, Quanquan Gu, Jiawei Han, and Philip S. Yu. 2014. Active Learning: A Survey. In Data Classification: Algorithms and Applications."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.016"},{"key":"e_1_3_2_1_4_1","volume-title":"Knowledge-Based Systems","volume":"216","author":"Andresini Giuseppina","year":"2021","unstructured":"Giuseppina Andresini , Annalisa Appice , and Donato Malerba . 2021 b. Nearest cluster-based intrusion detection through convolutional neural networks . Knowledge-Based Systems , Vol. 216 (2021). Giuseppina Andresini, Annalisa Appice, and Donato Malerba. 2021 b. Nearest cluster-based intrusion detection through convolutional neural networks. Knowledge-Based Systems, Vol. 216 (2021)."},{"key":"e_1_3_2_1_5_1","volume-title":"Corrado Loglisci, and Donato Malerba.","author":"Andresini Giuseppina","year":"2020","unstructured":"Giuseppina Andresini , Annalisa Appice , Nicola Di Mauro , Corrado Loglisci, and Donato Malerba. 2020 . Multi-Channel Deep Feature Learning for Intrusion Detection. IEEE Access , Vol. 8 (2020). Giuseppina Andresini, Annalisa Appice, Nicola Di Mauro, Corrado Loglisci, and Donato Malerba. 2020. Multi-Channel Deep Feature Learning for Intrusion Detection. IEEE Access, Vol. 8 (2020)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.04.017"},{"key":"e_1_3_2_1_7_1","volume-title":"Active learning via collective inference in network regression problems. Information Sciences","author":"Appice Annalisa","year":"2018","unstructured":"Annalisa Appice , Corrado Loglisci , and Donato Malerba . 2018. Active learning via collective inference in network regression problems. Information Sciences ( 2018 ). Annalisa Appice, Corrado Loglisci, and Donato Malerba. 2018. Active learning via collective inference in network regression problems. Information Sciences (2018)."},{"key":"e_1_3_2_1_8_1","article-title":"Detection and threat prioritization of pivoting attacks in large networks","volume":"8","author":"Apruzzese Giovanni","year":"2017","unstructured":"Giovanni Apruzzese , Fabio Pierazzi , Michele Colajanni , and Mirco Marchetti . 2017 . Detection and threat prioritization of pivoting attacks in large networks . IEEE Transactions on Emerging Topics in Computing , Vol. 8 , 2 (2017). Giovanni Apruzzese, Fabio Pierazzi, Michele Colajanni, and Mirco Marchetti. 2017. Detection and threat prioritization of pivoting attacks in large networks. IEEE Transactions on Emerging Topics in Computing, Vol. 8, 2 (2017).","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Arp Daniel","year":"2022","unstructured":"Daniel Arp , Erwin Quiring , Feargus Pendlebury , Alexander Warnecke , Fabio Pierazzi , Christian Wressnegger , Lorenzo Cavallaro , and Konrad Rieck . 2022 . Dos and Don'ts of Machine Learning in Computer Security . In Proc. of the USENIX Security Symposium. Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2022. Dos and Don'ts of Machine Learning in Computer Security. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_10_1","volume-title":"The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security (TISSEC)","author":"Axelsson Stefan","year":"2000","unstructured":"Stefan Axelsson . 2000. The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security (TISSEC) ( 2000 ). Stefan Axelsson. 2000. The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security (TISSEC) (2000)."},{"key":"e_1_3_2_1_11_1","volume-title":"dalex: Responsible Machine Learning with Interactive Explainability and Fairness in Python. arXiv:2012.14406","author":"Baniecki Hubert","year":"2020","unstructured":"Hubert Baniecki , Wojciech Kretowicz , Piotr Piatyszek , Jakub Wisniewski , and Przemyslaw Biecek . 2020. dalex: Responsible Machine Learning with Interactive Explainability and Fairness in Python. arXiv:2012.14406 ( 2020 ). https:\/\/github.com\/ModelOriented\/DALEX\/ Hubert Baniecki, Wojciech Kretowicz, Piotr Piatyszek, Jakub Wisniewski, and Przemyslaw Biecek. 2020. dalex: Responsible Machine Learning with Interactive Explainability and Fairness in Python. arXiv:2012.14406 (2020). https:\/\/github.com\/ModelOriented\/DALEX\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation. CoRR","author":"Barbero Federico","year":"2020","unstructured":"Federico Barbero , Feargus Pendlebury , Fabio Pierazzi , and Lorenzo Cavallaro . 2020 . Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation. CoRR , Vol. abs\/ 2010 .03856 (2020). Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, and Lorenzo Cavallaro. 2020. Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation. CoRR, Vol. abs\/2010.03856 (2020)."},{"key":"e_1_3_2_1_13_1","unstructured":"James Bergstra R\u00e9mi Bardenet Yoshua Bengio and Bal\u00e1zs K\u00e9gl. 2011. Algorithms for Hyper-Parameter Optimization. In Advances in Neural Information Processing Systems (NeurIPS).  James Bergstra R\u00e9mi Bardenet Yoshua Bengio and Bal\u00e1zs K\u00e9gl. 2011. Algorithms for Hyper-Parameter Optimization. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of the International Conference on Machine Learning (ICML).","author":"Bergstra James","unstructured":"James Bergstra , Daniel Yamins , and David D. Cox . 2013. Making a Science of Model Search: Hyperparameter Optimization in Hundreds of Dimensions for Vision Architectures . In Proc. of the International Conference on Machine Learning (ICML). James Bergstra, Daniel Yamins, and David D. Cox. 2013. Making a Science of Model Search: Hyperparameter Optimization in Hundreds of Dimensions for Vision Architectures. In Proc. of the International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_15_1","article-title":"Dalex: Explainers for complex predictive models in R","volume":"19","author":"Biecek Przemyslaw","year":"2018","unstructured":"Przemyslaw Biecek . 2018 . Dalex: Explainers for complex predictive models in R . Journal of Machine Learning Research , Vol. 19 (11 2018). Przemyslaw Biecek. 2018. Dalex: Explainers for complex predictive models in R. Journal of Machine Learning Research, Vol. 19 (11 2018).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of the ACM Conference on Learning Theory (COLT).","author":"Blum Avrim","unstructured":"Avrim Blum and Tom M. Mitchell . 1998. Combining Labeled and Unlabeled Data with Co-Training . In Proc. of the ACM Conference on Learning Theory (COLT). Avrim Blum and Tom M. Mitchell. 1998. Combining Labeled and Unlabeled Data with Co-Training. In Proc. of the ACM Conference on Learning Theory (COLT)."},{"key":"e_1_3_2_1_17_1","volume-title":"Random Forests. Machine Learning","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman . 2001. Random Forests. Machine Learning ( 2001 ). Leo Breiman. 2001. Random Forests. Machine Learning (2001)."},{"key":"e_1_3_2_1_18_1","volume-title":"Buczak and Erhan Guven","author":"Anna","year":"2016","unstructured":"Anna L. Buczak and Erhan Guven . 2016 . A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials ( 2016). Anna L. Buczak and Erhan Guven. 2016. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials (2016)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_15"},{"key":"e_1_3_2_1_20_1","volume-title":"A new definition of neighborhood of a point in multi-dimensional space. Pattern Recognition Letters","author":"Chaudhuri B. B.","year":"1996","unstructured":"B. B. Chaudhuri . 1996. A new definition of neighborhood of a point in multi-dimensional space. Pattern Recognition Letters ( 1996 ). B. B. Chaudhuri. 1996. A new definition of neighborhood of a point in multi-dimensional space. Pattern Recognition Letters (1996)."},{"key":"e_1_3_2_1_21_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io.  Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io."},{"key":"e_1_3_2_1_22_1","volume-title":"Jo ao P. Vilela, and Marilia Curado","author":"Dalmazo Bruno L.","year":"2017","unstructured":"Bruno L. Dalmazo , Jo ao P. Vilela, and Marilia Curado . 2017 . Performance Analysis of Network Traffic Predictors in the Cloud. Journal of Network and Systems Management ( 2017). Bruno L. Dalmazo, Jo ao P. Vilela, and Marilia Curado. 2017. Performance Analysis of Network Traffic Predictors in the Cloud. Journal of Network and Systems Management (2017)."},{"key":"e_1_3_2_1_23_1","volume-title":"Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems","author":"Diro Abebe Abeshu","year":"2018","unstructured":"Abebe Abeshu Diro and Naveen Chilamkurti . 2018. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems ( 2018 ). Abebe Abeshu Diro and Naveen Chilamkurti. 2018. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems (2018)."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of the International Conference on Information Systems Security and Privacy (ICISSP). SciTePress.","author":"Draper-Gil Gerard","unstructured":"Gerard Draper-Gil , Arash Habibi Lashkari , Mohammad Saiful Islam Mamun , and Ali A. Ghorbani . 2016. Characterization of Encrypted and VPN Traffic using Time-related Features . In Proc. of the International Conference on Information Systems Security and Privacy (ICISSP). SciTePress. Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, and Ali A. Ghorbani. 2016. Characterization of Encrypted and VPN Traffic using Time-related Features. In Proc. of the International Conference on Information Systems Security and Privacy (ICISSP). SciTePress."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"e_1_3_2_1_27_1","volume-title":"All Models are Wrong, but Many are Useful: Learning a Variable's Importance by Studying an Entire Class of Prediction Models Simultaneously. Journal of Machine Learning Research (JMLR)","author":"Fisher Aaron","year":"2019","unstructured":"Aaron Fisher , Cynthia Rudin , and Francesca Dominici . 2019. All Models are Wrong, but Many are Useful: Learning a Variable's Importance by Studying an Entire Class of Prediction Models Simultaneously. Journal of Machine Learning Research (JMLR) ( 2019 ). Aaron Fisher, Cynthia Rudin, and Francesca Dominici. 2019. All Models are Wrong, but Many are Useful: Learning a Variable's Importance by Studying an Entire Class of Prediction Models Simultaneously. Journal of Machine Learning Research (JMLR) (2019)."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Fogla Prahlad","year":"2006","unstructured":"Prahlad Fogla , Monirul I. Sharif , Roberto Perdisci , Oleg M. Kolesnikov , and Wenke Lee . 2006 . Polymorphic Blending Attacks . In Proc. of the USENIX Security Symposium. Prahlad Fogla, Monirul I. Sharif, Roberto Perdisci, Oleg M. Kolesnikov, and Wenke Lee. 2006. Polymorphic Blending Attacks. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Artificial Intelligence and Statistics (AISTATS). JMLR.","author":"Glorot Xavier","year":"2010","unstructured":"Xavier Glorot and Yoshua Bengio . 2010 . Understanding the difficulty of training deep feedforward neural networks . In International Conference on Artificial Intelligence and Statistics (AISTATS). JMLR. Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In International Conference on Artificial Intelligence and Statistics (AISTATS). JMLR."},{"key":"e_1_3_2_1_30_1","volume-title":"International Conference on Artificial Intelligence and Statistics (AISTATS). JMLR.","author":"Glorot Xavier","year":"2011","unstructured":"Xavier Glorot , Antoine Bordes , and Yoshua Bengio . 2011 . Deep Sparse Rectifier Neural Networks .. In International Conference on Artificial Intelligence and Statistics (AISTATS). JMLR. Xavier Glorot, Antoine Bordes, and Yoshua Bengio. 2011. Deep Sparse Rectifier Neural Networks.. In International Conference on Artificial Intelligence and Statistics (AISTATS). JMLR."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of the International Conference on Learning Representations (ICLR).","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow , Mehdi Mirza , Da Xiao , Aaron Courville , and Yoshua Bengio . 2014 . An empirical investigation of catastrophic forgeting in gradient based neural networks . In Proc. of the International Conference on Learning Representations (ICLR). Ian J. Goodfellow, Mehdi Mirza, Da Xiao, Aaron Courville, and Yoshua Bengio. 2014. An empirical investigation of catastrophic forgeting in gradient based neural networks. In Proc. of the International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_32_1","unstructured":"Yves Grandvalet and Yoshua Bengio. 2004. Semi-supervised Learning by Entropy Minimization. In Advances in Neural Information Processing Systems (NeurIPS).  Yves Grandvalet and Yoshua Bengio. 2004. Semi-supervised Learning by Entropy Minimization. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_33_1","volume-title":"Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection.","author":"Gu Guofei","year":"2008","unstructured":"Guofei Gu , Roberto Perdisci , Junjie Zhang , and Wenke Lee . 2008 . Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. (2008). Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee. 2008. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. (2008)."},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security Symposium","volume":"7","author":"Gu Guofei","year":"2007","unstructured":"Guofei Gu , Phillip A Porras , Vinod Yegneswaran , Martin W Fong , and Wenke Lee . 2007 . Bothunter: Detecting malware infection through ids-driven dialog correlation .. In USENIX Security Symposium , Vol. 7 . Guofei Gu, Phillip A Porras, Vinod Yegneswaran, Martin W Fong, and Wenke Lee. 2007. Bothunter: Detecting malware infection through ids-driven dialog correlation.. In USENIX Security Symposium, Vol. 7."},{"key":"e_1_3_2_1_35_1","volume-title":"A survey of methods for explaining black box models. Comput. Surveys","author":"Guidotti Riccardo","year":"2018","unstructured":"Riccardo Guidotti , Anna Monreale , Salvatore Ruggieri , Franco Turini , Fosca Giannotti , and Dino Pedreschi . 2018. A survey of methods for explaining black box models. Comput. Surveys ( 2018 ). Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, and Dino Pedreschi. 2018. A survey of methods for explaining black box models. Comput. Surveys (2018)."},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Jordaney Roberto","year":"2017","unstructured":"Roberto Jordaney , Kumar Sharad , Santanu Kumar Dash , Zhi Wang , Davide Papini , Ilia Nouretdinov , and Lorenzo Cavallaro . 2017 . Transcend: Detecting Concept Drift in Malware Classification Models . In Proc. of the USENIX Security Symposium. Roberto Jordaney, Kumar Sharad, Santanu Kumar Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting Concept Drift in Malware Classification Models. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486873"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. of the International Conference on Learning Representations (ICLR).","author":"Diederik","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization . In Proc. of the International Conference on Learning Representations (ICLR). Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. In Proc. of the International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. of the International Conference on Information Systems Security and Privacy (ICISSP). SciTePress.","author":"Lashkari Arash Habibi","unstructured":"Arash Habibi Lashkari , Gerard Draper-Gil , Mohammad Saiful Islam Mamun , and Ali A. Ghorbani . 2017. Characterization of Tor Traffic using Time based Features . In Proc. of the International Conference on Information Systems Security and Privacy (ICISSP). SciTePress. Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, and Ali A. Ghorbani. 2017. Characterization of Tor Traffic using Time based Features. In Proc. of the International Conference on Information Systems Security and Privacy (ICISSP). SciTePress."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of the International ACM Conference of the Special Interest Group on Information Retrieval (SIGIR).","author":"David","unstructured":"David D. Lewis and William A. Gale. 1994. A Sequential Algorithm for Training Text Classifiers . In Proc. of the International ACM Conference of the Special Interest Group on Information Retrieval (SIGIR). David D. Lewis and William A. Gale. 1994. A Sequential Algorithm for Training Text Classifiers. In Proc. of the International ACM Conference of the Special Interest Group on Information Retrieval (SIGIR)."},{"key":"e_1_3_2_1_41_1","volume-title":"An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems With Applications","author":"Li Yinhui","year":"2012","unstructured":"Yinhui Li , Jingbo Xia , Silan Zhang , Jiakai Yan , Xiaochuan Ai , and Kuobin Dai . 2012. An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems With Applications ( 2012 ). Yinhui Li, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, and Kuobin Dai. 2012. An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems With Applications (2012)."},{"key":"e_1_3_2_1_42_1","volume-title":"Jo a o Gama, and Guangquan Zhang","author":"Lu Jie","year":"2019","unstructured":"Jie Lu , Anjin Liu , Fan Dong , Feng Gu , Jo a o Gama, and Guangquan Zhang . 2019 . Learning under Concept Drift : A Review. IEEE Transactions on Knowledge and Data Engineering (TKDE) ( 2019). Jie Lu, Anjin Liu, Fan Dong, Feng Gu, Jo a o Gama, and Guangquan Zhang. 2019. Learning under Concept Drift: A Review. IEEE Transactions on Knowledge and Data Engineering (TKDE) (2019)."},{"key":"e_1_3_2_1_43_1","volume-title":"Analysis of high volumes of network traffic for advanced persistent threat detection. Computer Networks","author":"Marchetti Mirco","year":"2016","unstructured":"Mirco Marchetti , Fabio Pierazzi , Michele Colajanni , and Alessandro Guido . 2016. Analysis of high volumes of network traffic for advanced persistent threat detection. Computer Networks ( 2016 ). Mirco Marchetti, Fabio Pierazzi, Michele Colajanni, and Alessandro Guido. 2016. Analysis of high volumes of network traffic for advanced persistent threat detection. Computer Networks (2016)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8257930"},{"key":"e_1_3_2_1_45_1","volume-title":"December","author":"Labs McAfee","year":"2016","unstructured":"McAfee Labs . 2016. McAfee Labs Threats Report , December 2016 . https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-dec-2016.pdf. McAfee Labs. 2016. McAfee Labs Threats Report, December 2016. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-dec-2016.pdf."},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).","author":"Miller Brad","unstructured":"Brad Miller , Alex Kantchelian , Michael Carl Tschantz , Sadia Afroz , Rekha Bachwani , Riyaz Faizullabhoy , Ling Huang , Vaishaal Shankar , Tony Wu , George Yiu , Anthony D. Joseph , and J. D. Tygar . 2016. Reviewer Integration and Performance Measurement for Malware Detection . In Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, and J. D. Tygar. 2016. Reviewer Integration and Performance Measurement for Malware Detection. In Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"e_1_3_2_1_48_1","volume-title":"Abdulmageed","author":"Mohamed Marwa R.","year":"2019","unstructured":"Marwa R. Mohamed , Abdurrahman A. Nasr , Ibrahim F. Tarrad , and Mohamed Z . Abdulmageed . 2019 . Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model. Int. Journal of Network Security ( 2019). Marwa R. Mohamed, Abdurrahman A. Nasr, Ibrahim F. Tarrad, and Mohamed Z. Abdulmageed. 2019. Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model. Int. Journal of Network Security (2019)."},{"key":"e_1_3_2_1_49_1","volume-title":"A unifying view on dataset shift in classification. Pattern Recognition","author":"Moreno-Torres Jose G.","year":"2012","unstructured":"Jose G. Moreno-Torres , Troy Raeder , Roc\u00edo Ala\u00edz-Rodr\u00edguez , Nitesh V. Chawla , and Francisco Herrera . 2012. A unifying view on dataset shift in classification. Pattern Recognition ( 2012 ). Jose G. Moreno-Torres, Troy Raeder, Roc\u00edo Ala\u00edz-Rodr\u00edguez, Nitesh V. Chawla, and Francisco Herrera. 2012. A unifying view on dataset shift in classification. Pattern Recognition (2012)."},{"key":"e_1_3_2_1_50_1","volume-title":"Sayyed Rasoul Mousavi, and Homa Hasannejad","author":"Noorbehbahani Fakhroddin","year":"2017","unstructured":"Fakhroddin Noorbehbahani , Ali Fanian , Sayyed Rasoul Mousavi, and Homa Hasannejad . 2017 . An incremental intrusion detection system using a new semi-supervised stream classification method. International Journal of Communication Systems ( 2017). Fakhroddin Noorbehbahani, Ali Fanian, Sayyed Rasoul Mousavi, and Homa Hasannejad. 2017. An incremental intrusion detection system using a new semi-supervised stream classification method. International Journal of Communication Systems (2017)."},{"key":"e_1_3_2_1_51_1","unstructured":"S. J. Pan and Q. Yang. 2010. A Survey on Transfer Learning. IEEE Transactions on Knowledge and Data Engineering (TKDE) (2010).  S. J. Pan and Q. Yang. 2010. A Survey on Transfer Learning. IEEE Transactions on Knowledge and Data Engineering (TKDE) (2010)."},{"key":"e_1_3_2_1_52_1","volume-title":"Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Edouard Duchesnay.","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa , Ga\u00ebl Varoquaux , Alexandre Gramfort , Vincent Michel , Bertrand Thirion , Olivier Grisel , Mathieu Blondel , Peter Prettenhofer , Ron Weiss , Vincent Dubourg , Jake Vander Plas , Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Edouard Duchesnay. 2011 . Scikit-learn : Machine Learning in Python. Journal of Machine Learning Research (JMLR) ( 2011). Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vander Plas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Edouard Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research (JMLR) (2011)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278505"},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury , Fabio Pierazzi , Roberto Jordaney , Johannes Kinder , and Lorenzo Cavallaro . 2019 . TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time . In Proc. of the USENIX Security Symposium. Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_55_1","volume-title":"Tree-CNN: A hierarchical Deep Convolutional Neural Network for incremental learning. Neural Networks","author":"Roy Deboleena","year":"2020","unstructured":"Deboleena Roy , Priyadarshini Panda , and Kaushik Roy . 2020. Tree-CNN: A hierarchical Deep Convolutional Neural Network for incremental learning. Neural Networks ( 2020 ). Deboleena Roy, Priyadarshini Panda, and Kaushik Roy. 2020. Tree-CNN: A hierarchical Deep Convolutional Neural Network for incremental learning. Neural Networks (2020)."},{"key":"e_1_3_2_1_56_1","volume-title":"Active Learning Literature Survey. Synthesis Lectures on Artificial Intelligence and Machine Learning","author":"Settles Burr","year":"2012","unstructured":"Burr Settles . 2012. Active Learning Literature Survey. Synthesis Lectures on Artificial Intelligence and Machine Learning ( 2012 ). Burr Settles. 2012. Active Learning Literature Survey. Synthesis Lectures on Artificial Intelligence and Machine Learning (2012)."},{"key":"e_1_3_2_1_57_1","unstructured":"Amin Shahraki Mahmoud Abbasi Amir Taherkordi and Anca Delia Jurcut. 2021. Active Learning for Network Traffic Classification: A Technical Survey. arxiv: 2106.06933 [cs.NI]  Amin Shahraki Mahmoud Abbasi Amir Taherkordi and Anca Delia Jurcut. 2021. Active Learning for Network Traffic Classification: A Technical Survey. arxiv: 2106.06933 [cs.NI]"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243811"},{"key":"e_1_3_2_1_60_1","volume-title":"Vu Dinh Phai, and Qi Shi.","author":"Shone Nathan","year":"2018","unstructured":"Nathan Shone , Nguyen Ngoc Tran , Vu Dinh Phai, and Qi Shi. 2018 . A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence (TETCI) ( 2018). Nathan Shone, Nguyen Ngoc Tran, Vu Dinh Phai, and Qi Shi. 2018. A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence (TETCI) (2018)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813654"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00478-3"},{"key":"e_1_3_2_1_64_1","volume-title":"Rosli Salleh, and Lorenzo Cavallaro.","author":"Tam Kimberly","year":"2017","unstructured":"Kimberly Tam , Ali Feizollah , Nor Badrul Anuar , Rosli Salleh, and Lorenzo Cavallaro. 2017 . The Evolution of Android Malware and Android Analysis Techniques. Comput. Surveys ( 2017). Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, and Lorenzo Cavallaro. 2017. The Evolution of Android Malware and Android Analysis Techniques. Comput. Surveys (2017)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.082099299"},{"key":"e_1_3_2_1_67_1","volume-title":"International Workshop on Recent Advances in Intrusion Detection. Springer.","author":"Wang Ke","year":"2005","unstructured":"Ke Wang , Gabriela Cretu , and Salvatore J Stolfo . 2005 . Anomalous payload-based worm detection and signature generation . In International Workshop on Recent Advances in Intrusion Detection. Springer. Ke Wang, Gabriela Cretu, and Salvatore J Stolfo. 2005. Anomalous payload-based worm detection and signature generation. In International Workshop on Recent Advances in Intrusion Detection. Springer."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00018"},{"key":"e_1_3_2_1_69_1","volume-title":"Explainable deep learning: A field guide for the uninitiated. arXiv preprint arXiv:2004.14545","author":"Xie Ning","year":"2020","unstructured":"Ning Xie , Gabrielle Ras , Marcel van Gerven , and Derek Doran . 2020. Explainable deep learning: A field guide for the uninitiated. arXiv preprint arXiv:2004.14545 ( 2020 ). Ning Xie, Gabrielle Ras, Marcel van Gerven, and Derek Doran. 2020. Explainable deep learning: A field guide for the uninitiated. arXiv preprint arXiv:2004.14545 (2020)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00014"},{"key":"e_1_3_2_1_71_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Yang Limin","year":"2021","unstructured":"Limin Yang , Wenbo Guo , Qingying Hao , Arridhana Ciptadi , Ali Ahmadzadehand , Xinyu Xing , and Gang Wang . 2021 . CADE: Detecting and Explaining Concept Drift Samples for Security Applications . In Proc. of the USENIX Security Symposium. Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadehand, Xinyu Xing, and Gang Wang. 2021. CADE: Detecting and Explaining Concept Drift Samples for Security Applications. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_72_1","volume-title":"Single shot active learning using pseudo annotators. Pattern Recognition","author":"Yang Yazhou","year":"2019","unstructured":"Yazhou Yang and Marco Loog . 2019. Single shot active learning using pseudo annotators. Pattern Recognition ( 2019 ). Yazhou Yang and Marco Loog. 2019. Single shot active learning using pseudo annotators. Pattern Recognition (2019)."},{"key":"e_1_3_2_1_73_1","volume-title":"Kamel","author":"Zhang Chunlin","year":"2005","unstructured":"Chunlin Zhang , Ju Jiang , and Mohamed S . Kamel . 2005 . Intrusion detection using hierarchical neural networks. Pattern Recognition Letters ( 2005). Chunlin Zhang, Ju Jiang, and Mohamed S. Kamel. 2005. Intrusion detection using hierarchical neural networks. Pattern Recognition Letters (2005)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474369.3486864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474369.3486864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:26Z","timestamp":1750188626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474369.3486864"}},"subtitle":["Towards Concept-Drift Robustness in Network Intrusion Detection"],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":73,"alternative-id":["10.1145\/3474369.3486864","10.1145\/3474369"],"URL":"https:\/\/doi.org\/10.1145\/3474369.3486864","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}