{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T23:35:59Z","timestamp":1721259359529},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T00:00:00Z","timestamp":1578441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T00:00:00Z","timestamp":1578441600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["437085\/2018-0"],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","award":["00000"],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004586","name":"FAPERJ","doi-asserted-by":"crossref","award":["0000"],"id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s12243-019-00744-4","type":"journal-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T06:02:28Z","timestamp":1578463348000},"page":"121-131","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["MineCap: super incremental learning for detecting and blocking cryptocurrency mining on software-defined networking"],"prefix":"10.1007","volume":"75","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5072-8102","authenticated-orcid":false,"given":"Helio N. Cunha","family":"Neto","sequence":"first","affiliation":[]},{"given":"Martin Andreoni","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Natalia C.","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Diogo M. F.","family":"Mattos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,8]]},"reference":[{"key":"744_CR1","doi-asserted-by":"crossref","unstructured":"Ingols K (2009) Modeling modern network attacks and countermeasures using attack graphs. Computer security applications conference","DOI":"10.1109\/ACSAC.2009.21"},{"key":"744_CR2","unstructured":"Porras PA, Valdes A (2001) Network surveillance. US Patent 6,321,338"},{"key":"744_CR3","doi-asserted-by":"crossref","unstructured":"de Oliveira MT, Carrara GR, Fernandes NC, Albuquerque CVN, Carrano RC, de Medeiros DSV, Mattos DMF (2019) Towards a performance evaluation of private blockchain frameworks using a realistic workload. In: 2019 22nd conference on innovation in clouds, internet and networks and workshops (ICIN) Paris","DOI":"10.1109\/ICIN.2019.8685888"},{"key":"744_CR4","doi-asserted-by":"crossref","unstructured":"Tahir R, Huzaifa M, Das A, Ahmad M, Gunter C, Zaffar F, Caesar M, Borisov N (2017) Mining on someone else\u2019s dime: Mitigating covert mining operations in clouds and enterprises. In: International symposium on research in attacks, intrusions, and defenses. Springer, pp 287\u2013310","DOI":"10.1007\/978-3-319-66332-6_13"},{"key":"744_CR5","unstructured":"Neto HNC, Fernandes NC, Mattos DMF (2019) Minecap: online detection and blocking of cryptocurrency mining on software-defined networking. In: 1st blockchain, robotics and AI for networking security conference. DNAC"},{"issue":"1","key":"744_CR6","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/COMST.2017.2782482","volume":"20","author":"F Bannour","year":"2018","unstructured":"Bannour F, Souihi S, Mellouk A (2018) Distributed SDN control: survey, taxonomy, and challenges. IEEE Communications Surveys Tutorials 20(1):333\u2013354","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"5","key":"744_CR7","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/LCOMM.2016.2546240","volume":"20","author":"DMF Mattos","year":"2016","unstructured":"Mattos DMF, Duarte OCMB, Pujolle G (2016) Reverse update: a consistent policy update scheme for software-defined networking. IEEE Commun Lett 20(5):886\u2013889","journal-title":"IEEE Commun Lett"},{"key":"744_CR8","doi-asserted-by":"crossref","unstructured":"Van der Laan MJ, Polley EC, Hubbard AE (2007) Super learner. Statistical Applications in Genetics and Molecular Biology 6(1)","DOI":"10.2202\/1544-6115.1309"},{"issue":"11","key":"744_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/2934664","volume":"59","author":"M Zaharia","year":"2016","unstructured":"Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ, et al. (2016) Apache spark: a unified engine for big data processing. Commun ACM 59 (11):56\u201365","journal-title":"Commun ACM"},{"key":"744_CR10","doi-asserted-by":"crossref","unstructured":"Konoth RK, Vineti E, Moonsamy V, Lindorfer M, Kruegel C, Bos H, Vigna G (2018) Minesweeper: an in-depth look into drive-by cryptocurrency mining and its defense. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security. ACM, pp 1714\u20131730","DOI":"10.1145\/3243734.3243858"},{"key":"744_CR11","doi-asserted-by":"crossref","unstructured":"Wang W, Ferrell B, Xu X, Hamlen KW, Hao S (2018) Seismic: secure in-lined script monitors for interrupting cryptojacks. In: European symposium on research in computer security. Springer, pp 122\u2013142","DOI":"10.1007\/978-3-319-98989-1_7"},{"key":"744_CR12","doi-asserted-by":"crossref","unstructured":"Sanz IJ, Mattos DMF, Duarte OCMB (2018) SFCPerf: An automatic performance evaluation framework for service function chaining. In: NOMS 2018 - 2018 IEEE\/IFIP network operations and management symposium, pp 1\u20139","DOI":"10.1109\/NOMS.2018.8406237"},{"key":"744_CR13","unstructured":"Carbone P, Ewen S, Haridi S, Katsifodimos A, Markl V, Tzoumas K (2015) Apache flink: unified stream and batch processing in a single engine. Data Engineering: 28\u201338"},{"issue":"20","key":"744_CR14","doi-asserted-by":"publisher","first-page":"e5344","DOI":"10.1002\/cpe.5344","volume":"31","author":"M Andreoni Lopez","year":"2019","unstructured":"Andreoni Lopez M, Mattos DMF, Duarte OCMB, Pujolle G (2019) Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data. Concurrency and Computation: Practice and Experience 31(20):e5344","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"744_CR15","unstructured":"Zaharia M, Das T, Li H, Shenker S, Stoica I (2012) Discretized streams: an efficient and fault-tolerant model for stream processing on large clusters. In: Proceedings of the 4th USENIX conference on Hot Topics in Cloud Ccomputing, pp 10\u201310"},{"issue":"1","key":"744_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.cviu.2005.09.012","volume":"106","author":"L Fei-Fei","year":"2007","unstructured":"Fei-Fei L, Fergus R, Perona P (2007) Learning generative visual models from few training examples: an incremental bayesian approach tested on 101 object categories. Computer Vision and Image Understanding 106 (1):59\u201370. special issue on Generative Model Based Vision","journal-title":"Computer Vision and Image Understanding"},{"issue":"4","key":"744_CR17","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama J, \u017eliobait\u0117 I, Bifet A, Pechenizkiy M, Bouchachia A (2014) A survey on concept drift adaptation. ACM computing surveys (CSUR) 46(4):44","journal-title":"ACM computing surveys (CSUR)"},{"key":"744_CR18","doi-asserted-by":"crossref","unstructured":"Wang S, Minku LL, Ghezzi D, Caltabiano D, Tino P, Yao X (2013) Concept drift detection for online class imbalance learning. In: The 2013 Int joint conference on neural networks (IJCNN), pp 1\u201310","DOI":"10.1109\/IJCNN.2013.6706768"},{"issue":"4","key":"744_CR19","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/5326.983933","volume":"31","author":"R Polikar","year":"2001","unstructured":"Polikar R, Upda L, Upda SS, Honavar V (2001) Learn++: an incremental learning algorithm for supervised neural networks. IEEE transactions on systems, man, and cybernetics, Part C (Applications and Reviews) 31(4):497\u2013508","journal-title":"IEEE transactions on systems, man, and cybernetics, Part C (Applications and Reviews)"},{"key":"744_CR20","doi-asserted-by":"crossref","unstructured":"Lopez MA, Lobato AGP, Duarte OCMB (2016) A performance comparison of open-source stream processing platforms. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOCOM.2016.7841533"},{"key":"744_CR21","unstructured":"OpenFlow Switch Specification Version 1.3.0 (Wire Protocol 0x04). The OpenFlow Consortium, Jun. 2012. [Online]. Available: https:\/\/www.opennetworking.org"},{"issue":"10","key":"744_CR22","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1007\/s00500-010-0625-8","volume":"15","author":"J Luengo","year":"2011","unstructured":"Luengo J, Fern\u00e1ndez A, Garc\u00eda S, Herrera F (2011) Addressing data complexity for imbalanced data sets: analysis of smote-based oversampling and evolutionary undersampling. Soft Comput 15(10):1909\u20131936","journal-title":"Soft Comput"},{"issue":"3","key":"744_CR23","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.istr.2005.07.001","volume":"10","author":"T Pietraszek","year":"2005","unstructured":"Pietraszek T, Tanner A (2005) Data mining and machine learning\u2014towards reducing false positives in intrusion detection. Inf Sec Tech Rep 10(3):169\u2013183","journal-title":"Inf Sec Tech Rep"}],"updated-by":[{"updated":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:00:00Z","timestamp":1580256000000},"DOI":"10.1007\/s12243-020-00752-9","type":"correction","label":"Correction"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-019-00744-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-019-00744-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-019-00744-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T01:32:07Z","timestamp":1609983127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-019-00744-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,8]]},"references-count":23,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["744"],"URL":"https:\/\/doi.org\/10.1007\/s12243-019-00744-4","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,8]]},"assertion":[{"value":"27 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2020","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The funding information in the original manuscript is incorrect, the correct information should be the below:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}