{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:48Z","timestamp":1773615648475,"version":"3.50.1"},"reference-count":19,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700981","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:51Z","timestamp":1771936491000},"page":"1426-1439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection"],"prefix":"10.3103","volume":"59","author":[{"given":"P. E.","family":"Yugai","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7933_CR1","doi-asserted-by":"publisher","unstructured":"Kamalov, F., Zgheib, R., Leung, H.H., Al-Gindy, A., and Moussa, Sh., Autoencoder-based intrusion detection system, 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, 2021, IEEE, 2021, pp. 1\u20135. https:\/\/doi.org\/10.1109\/iceet53442.2021.9659562","DOI":"10.1109\/iceet53442.2021.9659562"},{"key":"7933_CR2","doi-asserted-by":"publisher","first-page":"100357","DOI":"10.1016\/j.cosrev.2020.100357","volume":"39","author":"B.A. Tama","year":"2020","unstructured":"Tama, B.A. and Lim, S., Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation, Comput. Sci. Rev., 2020, vol. 39, p. 100357. https:\/\/doi.org\/10.1016\/j.cosrev.2020.100357","journal-title":"Comput. Sci. Rev."},{"key":"7933_CR3","doi-asserted-by":"publisher","unstructured":"Ngueajio, M.K., Washington, G., Rawat, D.B., and Ngueabou, Y., Intrusion detection systems using support vector machines on the KDDCUP'99 and NSL-KDD Datasets: A comprehensive survey, Intelligent Systems and Applications. IntelliSys 2022, Arai, K., Ed., Lecture Notes in Networks and Systems, vol. 543, Cham: Springer, 2022, pp. 609\u2013629. https:\/\/doi.org\/10.1007\/978-3-031-16078-3_42","DOI":"10.1007\/978-3-031-16078-3_42"},{"key":"7933_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3390\/info11050243","volume":"11","author":"P.S. Muhuri","year":"2020","unstructured":"Muhuri, P.S., Chatterjee, P., Yuan, X., Roy, K., and Esterline, A., Using a long short-term memory recurrent neural network (LSTM-RNN) to classify network attacks, Information, 2020, vol. 11, no. 5, p. 243. https:\/\/doi.org\/10.3390\/info11050243","journal-title":"Information"},{"key":"7933_CR5","unstructured":"Panchal, J.R., Rajeevan, A., Bagul, Y., Bhosale, R., and Bhowmik, S., Enhancing threat detection with SIEM tool using GNN, International Research Journal of Modernization in Engineering Technology and Science, 2024, vol. 6, no. 11, pp. 1482\u20131485. https:\/\/www.irjmets.com\/uploadedfiles\/paper\/\/issue_11_november_2024\/63660\/final\/fin_irjmets1731322627.pdf."},{"key":"7933_CR6","doi-asserted-by":"publisher","unstructured":"Aktar, M.N., Sakib, M.N., Hossain, A., Ullah, A., Robin, K.H., Rahman, K.M., Reza, M.T., Ameen, A., Hossain, M.R., and Kundu, D., Enhancing False Positive Alert Detection in Security Information and Event Management System Using Recurrent Neural Network, 2024 27th International Conference on Computer and Information Technology (ICCIT), Cox\u2019s Bazar, Bangladesh, 2024, pp. 2794-2799. https:\/\/doi.org\/10.1109\/ICCIT64611.2024.11022066","DOI":"10.1109\/ICCIT64611.2024.11022066"},{"key":"7933_CR7","unstructured":"Poliakov, P., Why UEBA is your best defence against insider threats. https:\/\/riversafe.co.uk\/resources\/tech-blog\/why-ueba-is-your-best-defence-against-insider-threats."},{"key":"7933_CR8","unstructured":"Khan, I., Securing data with user and entity behaviour analysis (UEBA) approach using machine learning models, 2021. https:\/\/norma.ncirl.ie\/6065\/1\/sumeet.pdf."},{"key":"7933_CR9","unstructured":"Nath, S.R., Leveraging user and entity behavioral analysis and machine learning for log-based anomaly detection, 2024. https:\/\/gbis.ch\/index.php\/gbis\/article\/view\/544."},{"key":"7933_CR10","unstructured":"Garcia, F. and Muga, F., Random forest for malware classification, 2016. https:\/\/www.researchgate.net\/publication\/308646416_Random_Forest_for_Malware_Classification."},{"key":"7933_CR11","doi-asserted-by":"publisher","unstructured":"Ben, A., Ouahab, I., Lotfi, E., and Bouhorma, M., Image-based malware classification using multi-layer perceptron, Networking, Intelligent Systems and Security, Ben Ahmed, M., Teodorescu, H.N.L., Mazri, T., Subashini, P., and Boudhir, A.A., Eds., Smart Innovation, Systems and Technologies, vol. 237, Singapore: Springer, 2021, pp. 453\u2013464. https:\/\/doi.org\/10.1007\/978-981-16-3637-0_32","DOI":"10.1007\/978-981-16-3637-0_32"},{"key":"7933_CR12","unstructured":"Nazifa, M., Sarker, I., Anwar, I., Nazrul, M., Watters, P., and Mohammad, H., Automatic malware categorization based on K-means clustering technique, 2021. https:\/\/www.researchgate.net\/publication\/355217172_Automatic_Malware_Categorization_Based_on_K-Means_Clustering_Technique."},{"key":"7933_CR13","doi-asserted-by":"publisher","first-page":"375","DOI":"10.33581\/1561-4085-2019-22-4-375-382","volume":"22","author":"M. Kalinin","year":"2019","unstructured":"Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 4, pp. 375\u2013382. https:\/\/doi.org\/10.33581\/1561-4085-2019-22-4-375-382","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7933_CR14","doi-asserted-by":"publisher","first-page":"900","DOI":"10.3103\/s0146411620080180","volume":"54","author":"V.M. Krundyshev","year":"2020","unstructured":"Krundyshev, V.M., Identification of cyber threats in networks of Industrial Internet of Things based on neural network methods using memory, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 900\u2013906. https:\/\/doi.org\/10.3103\/s0146411620080180","journal-title":"Autom. Control Comput. Sci."},{"key":"7933_CR15","unstructured":"Kirillov, R.B. and Kalinin, M.O., Detection of adversarial data in intrusion detection systems using computational machine learning models, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2025, no. 1, pp.\u00a059\u201368."},{"key":"7933_CR16","doi-asserted-by":"publisher","unstructured":"Cisse, M., Bojanowski, P., Grave, E., Dauphin, Y., and Usunier, N., Parseval networks: Improving robustness to adversarial examples, arXiv Preprint, 2017. https:\/\/doi.org\/10.48550\/arXiv.1704.08847","DOI":"10.48550\/arXiv.1704.08847"},{"key":"7933_CR17","unstructured":"Ivanova, O.D. and Kalinin, M.O., Hybrid method for identifying evasion attacks aimed at intrusion detection systems, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2023, no. 1, pp. 104\u2013110."},{"key":"7933_CR18","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3103\/s0146411621080198","volume":"55","author":"I.I. Marshev","year":"2021","unstructured":"Marshev, I.I., Zhukovskii, E.V., and Aleksandrova, E.B., Protection against adversarial attacks on malware detectors using machine learning algorithms, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1025\u20131028. https:\/\/doi.org\/10.3103\/s0146411621080198","journal-title":"Autom. Control Comput. Sci."},{"key":"7933_CR19","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","volume":"19","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M. and Krundyshev, V., Security intrusion detection using quantum machine learning techniques, J.\u00a0Comput. Virol. Hacking Tech., 2022, vol. 19, no. 1, pp. 125\u2013136. https:\/\/doi.org\/10.1007\/s11416-022-00435-0","journal-title":"J.\u00a0Comput. Virol. Hacking Tech."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700981.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700981","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700981.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:44Z","timestamp":1773612164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":19,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7933"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700981","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"22 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}