{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:58:23Z","timestamp":1753441103130,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,14]]},"DOI":"10.1145\/3590777.3590803","type":"proceedings-article","created":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T10:11:40Z","timestamp":1685182300000},"page":"153-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2480-6901","authenticated-orcid":false,"given":"Martin","family":"Atzmueller","sequence":"first","affiliation":[{"name":"Osnabr\u00fcck University, Germany and German Research Center for Artificial Intelligence (DFKI), Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1268-0107","authenticated-orcid":false,"given":"Sophia","family":"Sylvester","sequence":"additional","affiliation":[{"name":"Osnabr\u00fcck University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0149-6197","authenticated-orcid":false,"given":"Rushed","family":"Kanawati","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Sorbonne Paris Nord, France"}]}],"member":"320","published-online":{"date-parts":[[2023,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. International Conference on Cyber Conflict. 371\u2013390","author":"Apruzzese Giovanni","year":"2018","unstructured":"Giovanni Apruzzese , Michele Colajanni , Luca Ferretti , Alessandro Guido , and Mirco Marchetti . 2018 . On the Effectiveness of Machine and Deep Learning for Cyber Security . In Proc. International Conference on Cyber Conflict. 371\u2013390 . Giovanni Apruzzese, Michele Colajanni, Luca Ferretti, Alessandro Guido, and Mirco Marchetti. 2018. On the Effectiveness of Machine and Deep Learning for Cyber Security. In Proc. International Conference on Cyber Conflict. 371\u2013390."},{"key":"e_1_3_2_1_3_1","first-page":"35","article-title":"Subgroup Discovery","volume":"5","author":"Atzmueller Martin","year":"2015","unstructured":"Martin Atzmueller . 2015 . Subgroup Discovery . WIREs DMKD 5 , 1 (2015), 35 \u2013 49 . Martin Atzmueller. 2015. Subgroup Discovery. WIREs DMKD 5, 1 (2015), 35\u201349.","journal-title":"WIREs DMKD"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. WWW 2019 (Companion).","author":"Atzmueller Martin","year":"2019","unstructured":"Martin Atzmueller . 2019 . Onto Model-based Anomalous Link Pattern Mining on Feature-Rich Social Interaction Networks . In Proc. WWW 2019 (Companion). Martin Atzmueller. 2019. Onto Model-based Anomalous Link Pattern Mining on Feature-Rich Social Interaction Networks. In Proc. WWW 2019 (Companion)."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. European Interdisciplinary Cybersecurity Conference(EICC \u201922)","author":"Atzmueller Martin","year":"2022","unstructured":"Martin Atzmueller and Rushed Kanawati . 2022 . Explainability in Cyber Security Using Complex Network Analysis: A Brief Methodological Overview . In Proc. European Interdisciplinary Cybersecurity Conference(EICC \u201922) . ACM, 49\u201352. Martin Atzmueller and Rushed Kanawati. 2022. Explainability in Cyber Security Using Complex Network Analysis: A Brief Methodological Overview. In Proc. European Interdisciplinary Cybersecurity Conference(EICC \u201922). ACM, 49\u201352."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. ISMIS(LNCS), Vol.\u00a05722","author":"Atzmueller Martin","year":"2009","unstructured":"Martin Atzmueller and Florian Lemmerich . 2009 . Fast Subgroup Discovery for Continuous Target Concepts . In Proc. ISMIS(LNCS), Vol.\u00a05722 . Springer, 1\u201315. Martin Atzmueller and Florian Lemmerich. 2009. Fast Subgroup Discovery for Continuous Target Concepts. In Proc. ISMIS(LNCS), Vol.\u00a05722. Springer, 1\u201315."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. ECML\/PKDD(LNCS), Vol.\u00a07524","author":"Atzmueller Martin","year":"2012","unstructured":"Martin Atzmueller and Florian Lemmerich . 2012 . VIKAMINE - Open-Source Subgroup Discovery, Pattern Mining, and Analytics . In Proc. ECML\/PKDD(LNCS), Vol.\u00a07524 . Springer, 842\u2013845. Martin Atzmueller and Florian Lemmerich. 2012. VIKAMINE - Open-Source Subgroup Discovery, Pattern Mining, and Analytics. In Proc. ECML\/PKDD(LNCS), Vol.\u00a07524. Springer, 842\u2013845."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWS.2013.056577"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. 7th Conference on Computer Methods and Systems","author":"Atzmueller Martin","year":"2009","unstructured":"Martin Atzmueller , Florian Lemmerich , Beate Krause , and Andreas Hotho . 2009 . Who are the Spammers? Understandable Local Patterns for Concept Description . In Proc. 7th Conference on Computer Methods and Systems . Krakow, Poland. Martin Atzmueller, Florian Lemmerich, Beate Krause, and Andreas Hotho. 2009. Who are the Spammers? Understandable Local Patterns for Concept Description. In Proc. 7th Conference on Computer Methods and Systems. Krakow, Poland."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-007-0057-z"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. IDAMAP Workshop. 46\u201351","author":"Atzmueller Martin","year":"2005","unstructured":"Martin Atzmueller , Frank Puppe , and Hans-Peter Buscher . 2005 . Profiling Examiners using Intelligent Subgroup Mining . In Proc. IDAMAP Workshop. 46\u201351 . Martin Atzmueller, Frank Puppe, and Hans-Peter Buscher. 2005. Profiling Examiners using Intelligent Subgroup Mining. In Proc. IDAMAP Workshop. 46\u201351."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009895914772"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. IEEE European Symp. on Security and Privacy. IEEE, 31\u201346","author":"Cotrini Carlos","year":"2018","unstructured":"Carlos Cotrini , Thilo Weghorn , and David Basin . 2018 . Mining ABAC Rules from Sparse Logs . In Proc. IEEE European Symp. on Security and Privacy. IEEE, 31\u201346 . Carlos Cotrini, Thilo Weghorn, and David Basin. 2018. Mining ABAC Rules from Sparse Logs. In Proc. IEEE European Symp. on Security and Privacy. IEEE, 31\u201346."},{"volume-title":"Graph Theory (5 ed.)","author":"Diestel Reinhard","key":"e_1_3_2_1_14_1","unstructured":"Reinhard Diestel . 2017. Graph Theory (5 ed.) . Springer , Berlin\/ Heidelberg . Reinhard Diestel. 2017. Graph Theory (5 ed.). Springer, Berlin\/Heidelberg."},{"volume-title":"Meet Parekh, Vaibhav Savla, Rudra Mishra, and Mahesh Shirole. 2018. Benchmarking Datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 Alternatives. In Proc. IEEE ICCCS. 1\u20138.","author":"Divekar Abhishek","key":"e_1_3_2_1_15_1","unstructured":"Abhishek Divekar , Meet Parekh, Vaibhav Savla, Rudra Mishra, and Mahesh Shirole. 2018. Benchmarking Datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 Alternatives. In Proc. IEEE ICCCS. 1\u20138. Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, and Mahesh Shirole. 2018. Benchmarking Datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 Alternatives. In Proc. IEEE ICCCS. 1\u20138."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0403-4"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. ICCS. 181\u2013194","author":"Gu Mengtian","year":"2021","unstructured":"Mengtian Gu , Biyu Zhou , Fengyang Du , Xuehai Tang , Wang Wang , Liangjun Zang , Jizhong Han , and Songlin Hu . 2021 . Grasp the Key: Towards Fast and Accurate Host-Based Intrusion Detection in Data Centers . In Proc. ICCS. 181\u2013194 . Mengtian Gu, Biyu Zhou, Fengyang Du, Xuehai Tang, Wang Wang, Liangjun Zang, Jizhong Han, and Songlin Hu. 2021. Grasp the Key: Towards Fast and Accurate Host-Based Intrusion Detection in Data Centers. In Proc. ICCS. 181\u2013194."},{"volume-title":"Proc. International Conference on Security and Privacy. 1\u201312","author":"Hariharan Swetha","key":"e_1_3_2_1_18_1","unstructured":"Swetha Hariharan , Anusha Velicheti , A.S. Anagha , Ciza Thomas , and N. Balakrishnan . 2021. Explainable Artificial Intelligence in Cybersecurity: A Brief Review . In Proc. International Conference on Security and Privacy. 1\u201312 . Swetha Hariharan, Anusha Velicheti, A.S. Anagha, Ciza Thomas, and N. Balakrishnan. 2021. Explainable Artificial Intelligence in Cybersecurity: A Brief Review. In Proc. International Conference on Security and Privacy. 1\u201312."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. ICACT. IEEE, 27\u201333","author":"Hsupeng Boryau","year":"2022","unstructured":"Boryau Hsupeng , Kun-Wei Lee , Te-En Wei , and Shih-Hao Wang . 2022 . Explainable Malware Detection Using Predefined Network Flow . In Proc. ICACT. IEEE, 27\u201333 . Boryau Hsupeng, Kun-Wei Lee, Te-En Wei, and Shih-Hao Wang. 2022. Explainable Malware Detection Using Predefined Network Flow. In Proc. ICACT. IEEE, 27\u201333."},{"key":"e_1_3_2_1_20_1","volume-title":"Methods for Explaining Top-N Recommendations Through Subgroup Discovery. Data Mining and Knowledge Discovery","author":"Iferroudjene Mouloud","year":"2022","unstructured":"Mouloud Iferroudjene , Corentin Lonjarret , Celine Robardet , Marc Plantevit , and Martin Atzmueller . 2022. Methods for Explaining Top-N Recommendations Through Subgroup Discovery. Data Mining and Knowledge Discovery ( 2022 ). Mouloud Iferroudjene, Corentin Lonjarret, Celine Robardet, Marc Plantevit, and Martin Atzmueller. 2022. Methods for Explaining Top-N Recommendations Through Subgroup Discovery. Data Mining and Knowledge Discovery (2022)."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. ASONAM. IEEE","author":"Kibanov Mark","year":"2015","unstructured":"Mark Kibanov , Martin Atzmueller , Jens Illig , Christoph Scholz , Alain Barrat , Ciro Cattuto , and Gerd Stumme . 2015 . Is Web Content a Good Proxy for Real-Life Interaction? A Case Study Considering Online and Offline Interactions of Computer Scientists . In Proc. ASONAM. IEEE , Boston, MA, USA. Mark Kibanov, Martin Atzmueller, Jens Illig, Christoph Scholz, Alain Barrat, Ciro Cattuto, and Gerd Stumme. 2015. Is Web Content a Good Proxy for Real-Life Interaction? A Case Study Considering Online and Offline Interactions of Computer Scientists. In Proc. ASONAM. IEEE, Boston, MA, USA."},{"key":"e_1_3_2_1_22_1","first-page":"30","article-title":"Detecting Cyber Threats Through Social Network Analysis: Short Survey","volume":"1","author":"Kirichenko Lyudmyla","year":"2017","unstructured":"Lyudmyla Kirichenko , Tamara Radivilova , and Anders Carlsson . 2017 . Detecting Cyber Threats Through Social Network Analysis: Short Survey . SocioEconomic 1 , 1 (2017), 30 \u2013 34 . arXiv:1805.06680 Lyudmyla Kirichenko, Tamara Radivilova, and Anders Carlsson. 2017. Detecting Cyber Threats Through Social Network Analysis: Short Survey. SocioEconomic 1, 1 (2017), 30\u201334. arXiv:1805.06680","journal-title":"SocioEconomic"},{"volume-title":"Handbook of Data Mining and Knowledge Discovery","author":"Kl\u00f6sgen Willi","key":"e_1_3_2_1_23_1","unstructured":"Willi Kl\u00f6sgen . 2002. Handbook of Data Mining and Knowledge Discovery . Oxford University Press , New York , Chapter 16.3: Subgroup Discovery. Willi Kl\u00f6sgen. 2002. Handbook of Data Mining and Knowledge Discovery. Oxford University Press, New York, Chapter 16.3: Subgroup Discovery."},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"From Local Patterns to Global Models: the LeGo Approach to Data Mining. From Local Patterns to Global Models","volume":"8","author":"Knobbe Arno","year":"2008","unstructured":"Arno Knobbe , Bruno Cr\u00e9milleux , Johannes F\u00fcrnkranz , and Martin Scholz . 2008 . From Local Patterns to Global Models: the LeGo Approach to Data Mining. From Local Patterns to Global Models : Proc ECML\/PKDD LeGo Workshop 8 (2008), 1 \u2013 16 . Arno Knobbe, Bruno Cr\u00e9milleux, Johannes F\u00fcrnkranz, and Martin Scholz. 2008. From Local Patterns to Global Models: the LeGo Approach to Data Mining. From Local Patterns to Global Models: Proc ECML\/PKDD LeGo Workshop 8 (2008), 1\u201316.","journal-title":"Proc ECML\/PKDD LeGo Workshop"},{"volume-title":"Principles, Methods and Applications","author":"Latoria Vito","key":"e_1_3_2_1_25_1","unstructured":"Vito Latoria , Vincenzo Nicosia , and Giovanni Russo . 2017. Complex Networks , Principles, Methods and Applications . Cambridge University press . Vito Latoria, Vincenzo Nicosia, and Giovanni Russo. 2017. Complex Networks, Principles, Methods and Applications. Cambridge University press."},{"key":"e_1_3_2_1_26_1","volume-title":"Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method. Sensors 22, 3","author":"Le Thu-Huong","year":"2022","unstructured":"Thi- Thu-Huong Le , Haeyoung Kim , Hyoeun Kang , and Howon Kim . 2022. Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method. Sensors 22, 3 ( 2022 ). Thi-Thu-Huong Le, Haeyoung Kim, Hyoeun Kang, and Howon Kim. 2022. Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method. Sensors 22, 3 (2022)."},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. ECML\/PKDD(LNCS), Vol.\u00a07524","author":"Lemmerich Florian","year":"2012","unstructured":"Florian Lemmerich , Martin Becker , and Martin Atzmueller . 2012 . Generic Pattern Trees for Exhaustive Exceptional Model Mining . In Proc. ECML\/PKDD(LNCS), Vol.\u00a07524 . Springer, 277\u2013292. Florian Lemmerich, Martin Becker, and Martin Atzmueller. 2012. Generic Pattern Trees for Exhaustive Exceptional Model Mining. In Proc. ECML\/PKDD(LNCS), Vol.\u00a07524. Springer, 277\u2013292."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. IEEE\/IFIP Network Operations and Management Symposium. IEEE, 1\u20139.","author":"Lo Wai\u00a0Weng","year":"2022","unstructured":"Wai\u00a0Weng Lo , Siamak Layeghy , Mohanad Sarhan , Marcus Gallagher , and Marius Portmann . 2022 . E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT . In Proc. IEEE\/IFIP Network Operations and Management Symposium. IEEE, 1\u20139. Wai\u00a0Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, and Marius Portmann. 2022. E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. In Proc. IEEE\/IFIP Network Operations and Management Symposium. IEEE, 1\u20139."},{"key":"e_1_3_2_1_29_1","volume-title":"Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model. Complexity 2021","author":"Mahbooba Basim","year":"2021","unstructured":"Basim Mahbooba , Mohan Timilsina , Radhya Sahal , and Martin Serrano . 2021. Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model. Complexity 2021 ( 2021 ). Basim Mahbooba, Mohan Timilsina, Radhya Sahal, and Martin Serrano. 2021. Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model. Complexity 2021 (2021)."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. International Workshop on Explainable and Interpretable Machine Learning (XI-ML), Vol.\u00a02796","author":"Mollenhauer Dennis","year":"2020","unstructured":"Dennis Mollenhauer and Martin Atzmueller . 2020 . Sequential Exceptional Pattern Discovery Using Pattern-Growth: An Extensible Framework for Interpretable Machine Learning on Sequential Data . In Proc. International Workshop on Explainable and Interpretable Machine Learning (XI-ML), Vol.\u00a02796 . CEUR-WS.org. Dennis Mollenhauer and Martin Atzmueller. 2020. Sequential Exceptional Pattern Discovery Using Pattern-Growth: An Extensible Framework for Interpretable Machine Learning on Sequential Data. In Proc. International Workshop on Explainable and Interpretable Machine Learning (XI-ML), Vol.\u00a02796. CEUR-WS.org."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. Workshops ECML\/PKDD. Springer, 417\u2013431","author":"Molnar Christoph","year":"2021","unstructured":"Christoph Molnar , Giuseppe Casalicchio , and Bernd Bischl . 2021 . Interpretable Machine Learning\u2013A Brief History, State-of-the-Art and Challenges . In Proc. Workshops ECML\/PKDD. Springer, 417\u2013431 . Christoph Molnar, Giuseppe Casalicchio, and Bernd Bischl. 2021. Interpretable Machine Learning\u2013A Brief History, State-of-the-Art and Challenges. In Proc. Workshops ECML\/PKDD. Springer, 417\u2013431."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 25\u201331","author":"Moustafa Nour","year":"2015","unstructured":"Nour Moustafa and Jill Slay . 2015 . The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems . In Proc. 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 25\u201331 . Nour Moustafa and Jill Slay. 2015. The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems. In Proc. 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 25\u201331."},{"key":"e_1_3_2_1_33_1","volume-title":"2015 Military Communications and Information Systems Conference (MilCIS). 1\u20136.","author":"Moustafa Nour","year":"2015","unstructured":"Nour Moustafa and Jill Slay . 2015 . UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set) . In 2015 Military Communications and Information Systems Conference (MilCIS). 1\u20136. Nour Moustafa and Jill Slay. 2015. UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set). In 2015 Military Communications and Information Systems Conference (MilCIS). 1\u20136."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. IEEE MWSCAS. IEEE, 494\u2013499","author":"Musgrave John","year":"2020","unstructured":"John Musgrave , Carla Purdy , Anca\u00a0 L Ralescu , David Kapp , and Temesgen Kebede . 2020 . Semantic Feature Discovery of Trojan Malware Using Vector Space Kernels . In Proc. IEEE MWSCAS. IEEE, 494\u2013499 . John Musgrave, Carla Purdy, Anca\u00a0L Ralescu, David Kapp, and Temesgen Kebede. 2020. Semantic Feature Discovery of Trojan Malware Using Vector Space Kernels. In Proc. IEEE MWSCAS. IEEE, 494\u2013499."},{"volume-title":"Networks","author":"Newman Mark","key":"e_1_3_2_1_35_1","unstructured":"Mark Newman . 2010. Networks . Oxford university press . Mark Newman. 2010. Networks. Oxford university press."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security Workshop (2018","author":"Palladino Anthony","year":"2018","unstructured":"Anthony Palladino and Christopher\u00a0 J. Thissen . 2018 . Cyber Anomaly Detection Using Graph-node Role-dynamics . Proc. DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security Workshop (2018 ). arxiv:cs.CR\/1812.02848 Anthony Palladino and Christopher\u00a0J. Thissen. 2018. Cyber Anomaly Detection Using Graph-node Role-dynamics. Proc. DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security Workshop (2018). arxiv:cs.CR\/1812.02848"},{"key":"e_1_3_2_1_38_1","first-page":"4","article-title":"Unveiling the Potential of Graph Neural Networks for Robust Intrusion Detection","volume":"49","author":"Pujol-Perich David","year":"2022","unstructured":"David Pujol-Perich , Jose Suarez-Varela , Albert Cabellos-Aparicio , and Pere Barlet-Ros . 2022 . Unveiling the Potential of Graph Neural Networks for Robust Intrusion Detection . SIGMETRICS Perform. Eval. Rev. 49 , 4 (jun 2022), 111\u2013117. David Pujol-Perich, Jose Suarez-Varela, Albert Cabellos-Aparicio, and Pere Barlet-Ros. 2022. Unveiling the Potential of Graph Neural Networks for Robust Intrusion Detection. SIGMETRICS Perform. Eval. Rev. 49, 4 (jun 2022), 111\u2013117.","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"e_1_3_2_1_39_1","volume-title":"A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System. Electronics 9, 10","author":"Reyes A.","year":"2020","unstructured":"Abel\u00a0 A. Reyes , Francisco\u00a0 D. Vaca , Gabriel\u00a0 A. Castro\u00a0Aguayo , Quamar Niyaz , and Vijay Devabhaktuni . 2020. A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System. Electronics 9, 10 ( 2020 ). Abel\u00a0A. Reyes, Francisco\u00a0D. Vaca, Gabriel\u00a0A. Castro\u00a0Aguayo, Quamar Niyaz, and Vijay Devabhaktuni. 2020. A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System. Electronics 9, 10 (2020)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"e_1_3_2_1_41_1","volume-title":"Network Centrality: An Introduction. A Mathematical Modeling Approach from Nonlinear Dynamics to Complex Systems","author":"Rodrigues Francisco\u00a0Aparecido","year":"2019","unstructured":"Francisco\u00a0Aparecido Rodrigues . 2019 . Network Centrality: An Introduction. A Mathematical Modeling Approach from Nonlinear Dynamics to Complex Systems (2019), 177\u2013196. Francisco\u00a0Aparecido Rodrigues. 2019. Network Centrality: An Introduction. A Mathematical Modeling Approach from Nonlinear Dynamics to Complex Systems (2019), 177\u2013196."},{"key":"e_1_3_2_1_42_1","volume-title":"An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks. CoRR abs\/2104.07183","author":"Sarhan Mohanad","year":"2021","unstructured":"Mohanad Sarhan , Siamak Layeghy , and Marius Portmann . 2021. An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks. CoRR abs\/2104.07183 ( 2021 ). Mohanad Sarhan, Siamak Layeghy, and Marius Portmann. 2021. An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks. CoRR abs\/2104.07183 (2021)."},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. International Conference on Data Intelligence and Security (ICDIS). 71\u201378","author":"Sejr Jonas\u00a0Herskind","year":"2020","unstructured":"Jonas\u00a0Herskind Sejr , Arthur Zimek , and Peter Schneider-Kamp . 2020 . Explainable Detection of Zero Day Web Attacks . In Proc. International Conference on Data Intelligence and Security (ICDIS). 71\u201378 . Jonas\u00a0Herskind Sejr, Arthur Zimek, and Peter Schneider-Kamp. 2020. Explainable Detection of Zero Day Web Attacks. In Proc. International Conference on Data Intelligence and Security (ICDIS). 71\u201378."},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. IEEE Symposium VL\u201996","author":"Shneiderman Ben","year":"1996","unstructured":"Ben Shneiderman . 1996 . The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations . In Proc. IEEE Symposium VL\u201996 . 336\u2013343. Ben Shneiderman. 1996. The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations. In Proc. IEEE Symposium VL\u201996. 336\u2013343."},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. IEEE ETFA. IEEE, 1\u20138.","author":"Vollert Simon","year":"2021","unstructured":"Simon Vollert , Martin Atzmueller , and Andreas Theissler . 2021 . Interpretable Machine Learning: A Brief Survey From the Predictive Maintenance Perspective . In Proc. IEEE ETFA. IEEE, 1\u20138. Simon Vollert, Martin Atzmueller, and Andreas Theissler. 2021. Interpretable Machine Learning: A Brief Survey From the Predictive Maintenance Perspective. In Proc. IEEE ETFA. IEEE, 1\u20138."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359"},{"key":"e_1_3_2_1_47_1","volume-title":"A Systematic Literature Review of Methods and Datasets for Anomaly-based Network Intrusion Detection. Computers & Security 116","author":"Yang Zhen","year":"2022","unstructured":"Zhen Yang , Xiaodong Liu , Tong Li , Di Wu , Jinjiang Wang , Yunwei Zhao , and Han Han . 2022. A Systematic Literature Review of Methods and Datasets for Anomaly-based Network Intrusion Detection. Computers & Security 116 ( 2022 ). Zhen Yang, Xiaodong Liu, Tong Li, Di Wu, Jinjiang Wang, Yunwei Zhao, and Han Han. 2022. A Systematic Literature Review of Methods and Datasets for Anomaly-based Network Intrusion Detection. Computers & Security 116 (2022)."},{"key":"e_1_3_2_1_48_1","volume-title":"Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks","author":"Zhang Yichi","year":"2022","unstructured":"Yichi Zhang , Chunhua Yang , Keke Huang , and Yonggang Li. 2022. Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks . IEEE Transactions on Network Science and Engineering ( 2022 ), 1\u201312. Yichi Zhang, Chunhua Yang, Keke Huang, and Yonggang Li. 2022. Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks. IEEE Transactions on Network Science and Engineering (2022), 1\u201312."}],"event":{"name":"EICC 2023: European Interdisciplinary Cybersecurity Conference","acronym":"EICC 2023","location":"Stavanger Norway"},"container-title":["European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590777.3590803","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:27Z","timestamp":1750178187000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590777.3590803"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,14]]},"references-count":47,"alternative-id":["10.1145\/3590777.3590803","10.1145\/3590777"],"URL":"https:\/\/doi.org\/10.1145\/3590777.3590803","relation":{},"subject":[],"published":{"date-parts":[[2023,6,14]]},"assertion":[{"value":"2023-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}