{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:36:18Z","timestamp":1725568578976},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642162916"},{"type":"electronic","value":"9783642162923"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16292-3_28","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:56:53Z","timestamp":1288691813000},"page":"287-298","source":"Crossref","is-referenced-by-count":2,"title":["A Misleading Attack against Semi-supervised Learning for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Fangzhou","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Long","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"28_CR1","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur.\u00a03(4), 227\u2013261 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1145\/1529282.1529735","volume-title":"SAC 2009: Proceedings of the 2009 ACM Symposium on Applied Computing","author":"C.H. Mao","year":"2009","unstructured":"Mao, C.H., Lee, H.M., Parikh, D., Chen, T., Huang, S.Y.: Semi-supervised co-training and active learning based approach for multi-view intrusion detection. In: SAC 2009: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 2042\u20132048. ACM, New York (2009)"},{"key":"28_CR3","unstructured":"Lane, T.: A decision-theoretic, semi-supervised model for intrusion detection (2004)"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/11856214_5","volume-title":"Recent Advances in Intrusion Detection","author":"J. Newsome","year":"2006","unstructured":"Newsome, J., Karp, B., Song, D.X.: Paragraph: Thwarting signature learning by training maliciously. In: Zamboni, D., Kr\u00fcgel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 81\u2013105. Springer, Heidelberg (2006)"},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-45248-5_10","volume-title":"Recent Advances in Intrusion Detection","author":"C. Kr\u00fcgel","year":"2003","unstructured":"Kr\u00fcgel, C., Toth, T.: Using decision trees to improve signature-based intrusion detection. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 173\u2013191. Springer, Heidelberg (2003)"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/11427995_51","volume-title":"Intelligence and Security Informatics","author":"D.K. Kang","year":"2005","unstructured":"Kang, D.K., Fuller, D., Honavar, V.: Learning classifiers for misuse detection using a bag of system calls representation. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol.\u00a03495, pp. 511\u2013516. Springer, Heidelberg (2005)"},{"key":"28_CR7","unstructured":"Liao, Y.: Machine learning in intrusion detection. PhD thesis, Davis, CA, USA (2005)"},{"key":"28_CR8","unstructured":"Rieck, K.: Machine Learning for Application-Layer Intrusion Detection. PhD thesis, Berlin, Germany (2009)"},{"issue":"5","key":"28_CR9","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y. Liao","year":"2002","unstructured":"Liao, Y., Vemuri, V.R.: Use of k-nearest neighbor classifier for intrusion detection. Computers & Security\u00a021(5), 439\u2013448 (2002)","journal-title":"Computers & Security"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Ert\u00f6z, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: SDM (2003)","DOI":"10.1137\/1.9781611972733.3"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V., Chan, P.K.: Learning nonstationary models of normal network traffic for detecting novel attacks. In: KDD, pp. 376\u2013385 (2002)","DOI":"10.1145\/775047.775102"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Zhu, X., Goldberg, A.B.: Introduction to Semi-Supervised Learning. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan & Claypool Publishers (2009)","DOI":"10.2200\/S00196ED1V01Y200906AIM006"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Yarowsky, D.: Unsupervised word sense disambiguation rivaling supervised methods. In: Proceedings of the 33rd Annual Meeting of the Association for Computational Linguistics, pp. 189\u2013196 (1995)","DOI":"10.3115\/981658.981684"},{"key":"28_CR14","unstructured":"Mccallum, A.K., Mitchell, T.: Text classification from labeled and unlabeled documents using em. In: Machine Learning, pp. 103\u2013134 (2000)"},{"key":"28_CR15","first-page":"200","volume-title":"Transductive inference for text classification using support vector machines","author":"T. Joachims","year":"1999","unstructured":"Joachims, T.: Transductive inference for text classification using support vector machines, pp. 200\u2013209. Morgan Kaufmann, San Francisco (1999)"},{"key":"28_CR16","unstructured":"Zhu, X., Ghahramani, Z.: Learning from labeled and unlabeled data with label propagation (2002)"},{"key":"28_CR17","first-page":"2399","volume":"7","author":"M. Belkin","year":"2006","unstructured":"Belkin, M., Niyogi, P., Sindhwani, V.: Manifold regularization: A geometric framework for learning from labeled and unlabeled examples. Journal of Machine Learning Research\u00a07, 2399\u20132434 (2006)","journal-title":"Journal of Machine Learning Research"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS, pp. 16\u201325 (2006)","DOI":"10.1145\/1128817.1128824"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Chung, S.P., Mok, A.K.: Collaborative intrusion prevention. In: WETICE, pp. 395\u2013400 (2007)","DOI":"10.1109\/WETICE.2007.4407197"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Fogla, P., Lee, W.: Evading network anomaly detection systems: formal reasoning and practical techniques. In: ACM Conference on Computer and Communications Security, pp. 59\u201368 (2006)","DOI":"10.1145\/1180405.1180414"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: KDD, pp. 641\u2013647 (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"28_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36084-0_4","volume-title":"Recent Advances in Intrusion Detection","author":"K.M.C. Tan","year":"2002","unstructured":"Tan, K.M.C., Killourhy, K.S., Maxion, R.A.: Undermining an anomaly-based intrusion detection system using common exploits. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 54\u201373. Springer, Heidelberg (2002)"},{"key":"28_CR23","unstructured":"Archive, T.U.K.: Kdd cup 1999 data (October 1999)"}],"container-title":["Lecture Notes in Computer Science","Modeling Decisions for Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16292-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T21:12:21Z","timestamp":1559769141000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16292-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642162916","9783642162923"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16292-3_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}