{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T18:22:15Z","timestamp":1763576535774,"version":"3.45.0"},"publisher-location":"Gdansk, Poland; Belgrade, Serbia","reference-count":14,"publisher":"University of Gdansk, Department of Business Informatics & University of Belgrade, Faculty of Organizational Sciences","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.62036\/isd.2025.41","type":"proceedings-article","created":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T00:45:28Z","timestamp":1763513128000},"source":"Crossref","is-referenced-by-count":0,"title":["Detection of abnormal network flow by the Distributive Aggregations Ensemble Algorithm"],"prefix":"10.62036","author":[{"given":"Ewa","family":"Rak","sequence":"first","affiliation":[{"name":"University of Rzesz\ufffdw, Poland"}]},{"given":"Jaromir","family":"Sarzynski","sequence":"additional","affiliation":[{"name":"University of Rzesz\ufffdw, Poland"}]},{"given":"Monika","family":"Homa","sequence":"additional","affiliation":[{"name":"University of Rzesz\ufffdw, Poland"}]}],"member":"48375","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"ref0","doi-asserted-by":"publisher","unstructured":"[1] Aburomman, A., Reaz, M.: A survey of intrusion detection systems based on ensemble and hybrid classifiers. Computers Security 65(C), pp. 135-152 (2017)","DOI":"10.1016\/j.cose.2016.11.004"},{"key":"ref1","unstructured":"[2] Acz\u00e9l, J.: Lectures on functional equations and their applications. Stud. Fuzziness Soft Comput., vol. 329, Springer, Cham (2016)"},{"key":"ref2","unstructured":"[3] Beliakov, G., Bustince, H., Calvo, T.: A Practical Guide to Averaging Functions. Academic press, New York, London (1966)"},{"key":"ref3","doi-asserted-by":"publisher","unstructured":"[4] Dombi, J.: Basic concepts for the theory of evaluation : The aggregative operator. Engineering Applications of Artificial Intelligence 10(3), pp. 282-293 (1982)","DOI":"10.1016\/0377-2217(82)90227-2"},{"key":"ref4","doi-asserted-by":"publisher","unstructured":"[5] Kaur, G.: A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment. Journal of Information Security and Applications 55, pp. 102601 (2020)","DOI":"10.1016\/j.jisa.2020.102601"},{"key":"ref5","doi-asserted-by":"publisher","unstructured":"[6] Khan, M., Iqbal, N., Imran, J., Kim, D.: An optimized ensemble prediction model using automl based on soft voting classifier for network intrusion detection. Journal of Network and Computer Applications 212, pp. 103560 (2023)","DOI":"10.1016\/j.jnca.2022.103560"},{"key":"ref6","doi-asserted-by":"publisher","unstructured":"[7] Klement, E., Mesiar, R., Pap, E.: Triangular norms. Kluwer Acad. Publ., Dordrecht (2000)","DOI":"10.1007\/978-94-015-9540-7"},{"key":"ref7","doi-asserted-by":"publisher","unstructured":"[8] Mihailescu, M.E., Mihai, D., Carabas, M., Komisarek, M., Pawlicki, M., Ho\u0142ubowicz, W., Kozik, R.: The proposition and evaluation of the roedunet-simargl2021 network intrusion detection dataset. Sensors 21(13), pp. 4319 (2021)","DOI":"10.3390\/s21134319"},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"[9] Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive dataset for network intrusion detection systems (unsw-nb15 network dataset). In: 2015 Military Communications and Information Systems Conference (MilCIS), Canbera. pp. 1-6 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref9","doi-asserted-by":"publisher","unstructured":"[10] Rak, E., Sarzynski, J., Rak, R.: Effectiveness of an ensemble technique based on the' distributivity equation in detecting suspicious network activity. Fuzzy Sets and Systems 488, pp. 109015 (2024)","DOI":"10.1016\/j.fss.2024.109015"},{"key":"ref10","doi-asserted-by":"publisher","unstructured":"[11] Sagi, O., Rokach, L.: Ensemble Learning: A Survey. Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2018)","DOI":"10.1002\/widm.1249"},{"key":"ref11","doi-asserted-by":"publisher","unstructured":"[12] Sharma, A., Singh, M.: Dual replay memory reinforcement learning framework for minority attack detection. Engineering Applications of Artificial Intelligence 144, pp. 110083 (2025)","DOI":"10.1016\/j.engappai.2025.110083"},{"key":"ref12","unstructured":"[13] Ugochukwu, C., Bennett, E.O., Harcourt, P.: An intrusion detection system using machine learning algorithm. LAP LAMBERT Academic Publishing (2019)"},{"key":"ref13","doi-asserted-by":"publisher","unstructured":"[14] Wang, J., Wang, L., Wang, R.: A method of ddos attack detection and mitigation for the comprehensive coordinated protection of sdn controllers. Entropy 25, pp. 1210 (2023)","DOI":"10.3390\/e25081210"}],"event":{"name":"33rd International Conference on Information Systems Development","start":{"date-parts":[[2025,9,3]]},"location":"Belgrade, Serbia","end":{"date-parts":[[2025,9,5]]},"acronym":"ISD 2025"},"container-title":["International Conference on Information Systems Development","Proceedings of the 33rd International Conference on Information Systems Development"],"original-title":[],"link":[{"URL":"https:\/\/aisel.aisnet.org\/cgi\/viewcontent.cgi?article=1713&amp;context=isd2014&amp;unstamped=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T18:12:09Z","timestamp":1763575929000},"score":1,"resource":{"primary":{"URL":"https:\/\/aisel.aisnet.org\/isd2014\/proceedings2025\/datascience\/11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,17]]},"references-count":14,"URL":"https:\/\/doi.org\/10.62036\/isd.2025.41","relation":{},"ISSN":["2938-5202"],"issn-type":[{"type":"print","value":"2938-5202"}],"subject":[],"published":{"date-parts":[[2025,11,17]]}}}