{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T18:39:02Z","timestamp":1772476742391,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chaire of Naval Cyberdefense"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,14]]},"DOI":"10.1145\/3590777.3590786","type":"proceedings-article","created":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T10:11:40Z","timestamp":1685182300000},"page":"53-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8364-2989","authenticated-orcid":false,"given":"Robin","family":"Duraz","sequence":"first","affiliation":[{"name":"Chaire of Naval Cyberdefense, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3445-947X","authenticated-orcid":false,"given":"David","family":"Espes","sequence":"additional","affiliation":[{"name":"Lab-STICC, Universit\u00e9 Bretagne Occidentale, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4604-4522","authenticated-orcid":false,"given":"Julien","family":"Francq","sequence":"additional","affiliation":[{"name":"Naval Cyber Laboratory (NCL), Naval Group, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8940-6004","authenticated-orcid":false,"given":"Sandrine","family":"Vaton","sequence":"additional","affiliation":[{"name":"Lab-STICC, IMT Atlantique, France"}]}],"member":"320","published-online":{"date-parts":[[2023,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1999. KDD Cup 99 Data. [Online]. Available:http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html.  1999. KDD Cup 99 Data. [Online]. Available:http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_3_2_1_2_1","volume-title":"Cyber Physical Systems Security: Analysis, Challenges and Solutions. Computers and Security 68 (jul","author":"Ashibani Yosef","year":"2017","unstructured":"Yosef Ashibani and Qusay\u00a0 H. Mahmoud . 2017. Cyber Physical Systems Security: Analysis, Challenges and Solutions. Computers and Security 68 (jul 2017 ), 81\u201397. https:\/\/doi.org\/10.1016\/j.cose.2017.04.005 10.1016\/j.cose.2017.04.005 Yosef Ashibani and Qusay\u00a0H. Mahmoud. 2017. Cyber Physical Systems Security: Analysis, Challenges and Solutions. Computers and Security 68 (jul 2017), 81\u201397. https:\/\/doi.org\/10.1016\/j.cose.2017.04.005"},{"key":"e_1_3_2_1_3_1","first-page":"683","article-title":"Towards Generating Real-Life Datasets for Network Intrusion Detection","volume":"17","author":"Bhuyan H.","year":"2015","unstructured":"Monowar\u00a0 H. Bhuyan , Dhruba\u00a0Kumar Bhattacharyya , and Jugal\u00a0Kumar Kalita . 2015 . Towards Generating Real-Life Datasets for Network Intrusion Detection . International Journal of Network Security 17 (2015), 683 \u2013 701 . Monowar\u00a0H. Bhuyan, Dhruba\u00a0Kumar Bhattacharyya, and Jugal\u00a0Kumar Kalita. 2015. Towards Generating Real-Life Datasets for Network Intrusion Detection. International Journal of Network Security 17 (2015), 683\u2013701.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13040-017-0155-3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"e_1_3_2_1_7_1","volume-title":"An Evaluation Framework for Intrusion Detection Dataset. In 2016 International Conference on Information Science and Security (ICISS). IEEE, 1\u20136. https:\/\/doi.org\/10","author":"Gharib Amirhossein","year":"2016","unstructured":"Amirhossein Gharib , Iman Sharafaldin , Arash\u00a0Habibi Lashkari , and Ali\u00a0 A. Ghorbani . 2016 . An Evaluation Framework for Intrusion Detection Dataset. In 2016 International Conference on Information Science and Security (ICISS). IEEE, 1\u20136. https:\/\/doi.org\/10 .1109\/icissec.2016.7885840 10.1109\/icissec.2016.7885840 Amirhossein Gharib, Iman Sharafaldin, Arash\u00a0Habibi Lashkari, and Ali\u00a0A. Ghorbani. 2016. An Evaluation Framework for Intrusion Detection Dataset. In 2016 International Conference on Information Science and Security (ICISS). IEEE, 1\u20136. https:\/\/doi.org\/10.1109\/icissec.2016.7885840"},{"key":"e_1_3_2_1_8_1","volume-title":"Evaluation Measures of the Classification Performance of Imbalanced Data Sets","author":"Gu Qiong","unstructured":"Qiong Gu , Li Zhu , and Zhihua Cai . 2009. Evaluation Measures of the Classification Performance of Imbalanced Data Sets . Springer Berlin Heidelberg , 461\u2013471. https:\/\/doi.org\/10.1007\/978-3-642-04962-0_53 10.1007\/978-3-642-04962-0_53 Qiong Gu, Li Zhu, and Zhihua Cai. 2009. Evaluation Measures of the Classification Performance of Imbalanced Data Sets. Springer Berlin Heidelberg, 461\u2013471. https:\/\/doi.org\/10.1007\/978-3-642-04962-0_53"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000179"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2013.47"},{"key":"e_1_3_2_1_11_1","first-page":"20","article-title":"Survey of Intrusion Detection Systems","volume":"2","author":"Khraisat Ansam","year":"2019","unstructured":"Ansam Khraisat , Iqbal Gondal , Peter Vamplew , and Joarder Kamruzzaman . 2019 . Survey of Intrusion Detection Systems : Techniques, Datasets and Challenges. Cybersecurity 2 , 1 (2019), 20 . https:\/\/doi.org\/10.1186\/s42400-019-0038-7 10.1186\/s42400-019-0038-7 Ansam Khraisat, Iqbal Gondal, Peter Vamplew, and Joarder Kamruzzaman. 2019. Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges. Cybersecurity 2, 1 (2019), 20. https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Techniques, Datasets and Challenges. Cybersecurity"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00187"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59621-7_8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00318-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.009"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2888764"},{"key":"e_1_3_2_1_19_1","volume-title":"F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation","author":"Sokolova Marina","year":"1941","unstructured":"Marina Sokolova , Nathalie Japkowicz , and Stan Szpakowicz . 2006. Beyond Accuracy , F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation . Springer Berlin Heidelberg , 1015\u20131021. https:\/\/doi.org\/10.1007\/1 1941 439_114 10.1007\/11941439_114 Marina Sokolova, Nathalie Japkowicz, and Stan Szpakowicz. 2006. Beyond Accuracy, F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation. Springer Berlin Heidelberg, 1015\u20131021. https:\/\/doi.org\/10.1007\/11941439_114"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2018.1518061"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.03.030"}],"event":{"name":"EICC 2023: European Interdisciplinary Cybersecurity Conference","location":"Stavanger Norway","acronym":"EICC 2023"},"container-title":["European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590777.3590786","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:26Z","timestamp":1750178186000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590777.3590786"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,14]]},"references-count":23,"alternative-id":["10.1145\/3590777.3590786","10.1145\/3590777"],"URL":"https:\/\/doi.org\/10.1145\/3590777.3590786","relation":{},"subject":[],"published":{"date-parts":[[2023,6,14]]},"assertion":[{"value":"2023-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}