{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:19:51Z","timestamp":1766067591387,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["957286"],"award-info":[{"award-number":["957286"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3544428","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection"],"prefix":"10.1145","author":[{"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"}]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"}]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_2_1","unstructured":"2021. DDoS Attack Trends for Q4 2021. Retrieved February 12, 2022 from https:\/\/blog.cloudflare.com\/ddos-attack-trends-for-2021-q4\/"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_3_1","unstructured":"2022. Belgium\u2019s parliament and universities hit by cyber attack | Euronews. Retrieved February 12, 2022 from https:\/\/www.euronews.com\/2021\/05\/05\/belgium-s-parliament-and-universities-hit-by-cyber-attack"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_4_1","unstructured":"2022. Dutch police warn DDoS-for-hire customers to desist or face prosecution | The Daily Swig. Retrieved February 12, 2022 from https:\/\/portswigger.net\/daily-swig\/dutch-police-warn-ddos-for-hire-customers-to-desist-or-face-prosecution"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"N.","year":"2022","unstructured":"2022. N.Korean internet downed by suspected cyber attacks -researchers | Reuters. Retrieved February 12, 2022 from https:\/\/www.reuters.com\/world\/asia-pacific\/nkorean-internet-downed-by-suspected-cyber-attacks-researchers-2022-01-26\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg\u00a0S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dandelion Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/ Software available from tensorflow.org."},{"volume-title":"Smart innovations in communication and computational sciences","author":"Agarwal Nidhi","key":"e_1_3_2_1_7_1","unstructured":"Nidhi Agarwal, Akanksha Sondhi, Khyati Chopra, and Ghanapriya Singh. 2021. Transfer learning: Survey and classification. In Smart innovations in communication and computational sciences. Springer, 145\u2013155."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Charu\u00a0C. Aggarwal. 2018. Neural Networks and Deep Learning A Textbook. https:\/\/doi.org\/10.1007\/978-3-319-94463-0","DOI":"10.1007\/978-3-319-94463-0"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"e_1_3_2_1_11_1","volume-title":"XXI century cybercrime stats and what to expect in the","author":"Balaban David","year":"2020","unstructured":"David Balaban. 2021. XXI century cybercrime stats and what to expect in the 2020s. MacSecurity (2021)."},{"key":"e_1_3_2_1_12_1","volume-title":"Random search for hyper-parameter optimization.Journal of machine learning research 13, 2","author":"Bergstra James","year":"2012","unstructured":"James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter optimization.Journal of machine learning research 13, 2 (2012)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jmedchem.9b02147"},{"key":"e_1_3_2_1_14_1","unstructured":"Jiawen Chen. 2018. Machine Learning and Cybersecurity: Studying network behaviour to detect anomalies."},{"key":"e_1_3_2_1_15_1","unstructured":"Francois Chollet. 2016. Building powerful image classification models using very little data. Keras Blog 5(2016)."},{"key":"e_1_3_2_1_16_1","unstructured":"Francois Chollet 2015. Keras. https:\/\/github.com\/fchollet\/keras"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.138"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Ivan\u00a0Nunes da\u00a0Silva \u00b7 Danilo Hernane Spatti Rogerio Andrade Flauzino Luisa Helena Bartocci Liboni Silas Franco\u00a0dos Reis\u00a0Alves. 2017. Artificial Neural Networks A Practical Course. https:\/\/doi.org\/10.1007\/978-3-319-43162-8","DOI":"10.1007\/978-3-319-43162-8"},{"key":"e_1_3_2_1_20_1","unstructured":"Shuang Dai and Fanlin Meng. 2022. Addressing modern and practical challenges in machine learning: A survey of online federated and transfer learning. arXiv preprint arXiv:2202.03070(2022)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0089-0"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02014-x"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.30"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Jorge Guerra Carlos Catania and Eduardo Veas. 2021. Datasets are not Enough: Challenges in Labeling Network Traffic. arxiv:2110.05977\u00a0[cs.CR]","DOI":"10.1016\/j.cose.2022.102810"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321898"},{"key":"e_1_3_2_1_27_1","volume-title":"How to Effectively Collect and Process Network Data for Intrusion Detection?Entropy 23, 11","author":"Komisarek Miko\u0142aj","year":"2021","unstructured":"Miko\u0142aj Komisarek, Marek Pawlicki, Rafa\u0142 Kozik, Witold Ho\u0142ubowicz, and Micha\u0142 Chora\u015b. 2021. How to Effectively Collect and Process Network Data for Intrusion Detection?Entropy 23, 11 (2021), 1532."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"e_1_3_2_1_29_1","volume-title":"Cost-sensitive distributed machine learning for netflow-based botnet activity detection. Security and Communication Networks 2018","author":"Kozik Rafa\u0142","year":"2018","unstructured":"Rafa\u0142 Kozik, Marek Pawlicki, and Micha\u0142 Chora\u015b. 2018. Cost-sensitive distributed machine learning for netflow-based botnet activity detection. Security and Communication Networks 2018 (2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIAPP.2017.8167184"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3122009.3242042"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"e_1_3_2_1_33_1","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"Maimon Oded","unstructured":"Oded Maimon and Lior Rokach. 2010. Data Mining and Knowledge Discovery Handbook, 2nd ed.","edition":"2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"Mohammad Masum and Hossain Shahriar. 2020. TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. In 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). 1\u20137. https:\/\/doi.org\/10.23919\/ICITST51030.2020.9351317","DOI":"10.23919\/ICITST51030.2020.9351317"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21134319"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"Simone Bassis Anna Esposito Francesco Carlo Morabito\u00a0Eros Pasero. 2016. Advances in Neural Networks. https:\/\/doi.org\/10.1007\/978-3-319-33747-0","DOI":"10.1007\/978-3-319-33747-0"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Aleksandra Pawlicka Micha\u0142 Chora\u015b and Marek Pawlicki. 2021. The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good. Personal and Ubiquitous Computing(2021).","DOI":"10.1007\/s00779-021-01568-7"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2020.3031848"},{"key":"e_1_3_2_1_41_1","volume-title":"On the Impact of Network Data Balancing in Cybersecurity Applications. In International Conference on Computational Science. Springer, 196\u2013210","author":"Pawlicki Marek","year":"2020","unstructured":"Marek Pawlicki, Micha\u0142 Chora\u015b, Rafa\u0142 Kozik, and Witold Ho\u0142ubowicz. 2020. On the Impact of Network Data Balancing in Cybersecurity Applications. In International Conference on Computational Science. Springer, 196\u2013210."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.002"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCORED.2009.5443289"},{"volume-title":"Big Data Technologies and Applications","author":"Sarhan Mohanad","key":"e_1_3_2_1_45_1","unstructured":"Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, and Marius Portmann. 2020. Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications. Springer, 117\u2013135."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Iman Sharafaldin Arash\u00a0Habibi Lashkari and Ali\u00a0A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1(2018) 108\u2013116.","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2019.00031"},{"key":"e_1_3_2_1_49_1","volume-title":"Practical bayesian optimization of machine learning algorithms. Advances in neural information processing systems 25","author":"Snoek Jasper","year":"2012","unstructured":"Jasper Snoek, Hugo Larochelle, and Ryan\u00a0P Adams. 2012. Practical bayesian optimization of machine learning algorithms. Advances in neural information processing systems 25 (2012)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.009"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2989695"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2019.8713213"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI49571.2020.00012"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","unstructured":"Hongrui Zhao. 2022. Cyberspace & Sovereignty. WORLD SCIENTIFIC. https:\/\/doi.org\/10.1142\/12027","DOI":"10.1142\/12027"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170749"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","acronym":"ARES 2022","location":"Vienna Austria"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544428","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3544428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:57Z","timestamp":1750186797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":57,"alternative-id":["10.1145\/3538969.3544428","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3544428","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}