{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:20:16Z","timestamp":1730276416505,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/issre.2019.00051","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T21:50:16Z","timestamp":1581371416000},"page":"446-455","source":"Crossref","is-referenced-by-count":13,"title":["Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD"],"prefix":"10.1109","author":[{"given":"Tommaso","family":"Zoppi","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Ceccarelli","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Bondavalli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297314"},{"key":"ref38","first-page":"569","article-title":"Sensitivity analysis of k-fold cross validation in prediction error estimation","volume":"32 3","author":"juan d","year":"2010","journal-title":"IEEE Trans on Pattern Analysis and Machine Intelligence"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","article-title":"Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments","volume":"62","author":"kostas","year":"2014","journal-title":"Computer Networks"},{"key":"ref32","article-title":"Continuous anomaly detection based on behavior modeling and heterogeneous information analysis","author":"laurent","year":"0","journal-title":"U S Patent Application"},{"key":"ref31","article-title":"A robust outlier detection scheme for large data sets","author":"tang","year":"2001","journal-title":"Proc of the Pacific and Asia Conf on Knowledge Discovery and Data Mining"},{"key":"ref30","first-page":"413","article-title":"Isolation forest. In Data Mining","author":"liu","year":"0","journal-title":"2008 ICDM'08 Eighth IEEE Int Conference on"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2908366"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref35","first-page":"5","article-title":"Random forests","volume":"45 1","author":"leo","year":"2001","journal-title":"Machine Learning"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.09.014"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2500853.2500857"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401946"},{"key":"ref2","first-page":"42","article-title":"A survey of intrusion detection techniques in cloud","volume":"36 1","author":"chirag","year":"2013","journal-title":"J Network and Comput Appl"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"journal-title":"RELOAD Wiki - Github","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503343"},{"key":"ref21","first-page":"289","article-title":"Sliding window-based fault detection from high-dimensional data streams","volume":"47","author":"zhang","year":"2017","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630116"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47887-6_53"},{"key":"ref25","first-page":"59","article-title":"Histogram-based outlier score (hbos): A fast unsupervised anomaly detection algorithm","author":"goldstein","year":"2012","journal-title":"KI-2012 Poster and Demo Track"},{"key":"ref10","first-page":"367","article-title":"Stochastic gradient boosting","volume":"38 4","author":"jerome","year":"2002","journal-title":"Computational Statistics & Data Analysis"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2334305"},{"journal-title":"dataset uploaded by Jinner","article-title":"Intrusion Detection","year":"0","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846204"},{"key":"ref16","first-page":"4487","article-title":"Generation of a new ids test data set: Time to retire the kdd collection","author":"creech","year":"0","journal-title":"2013 IEEE Wireless Commun Networking Conf (WCNC)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1990.93957"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87481-2_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824115"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"journal-title":"Scikit tutorial","year":"0","key":"ref6"},{"journal-title":"Rapid Miner tutorial","year":"0","key":"ref5"},{"key":"ref8","first-page":"873","article-title":"Likert-based vs. semantic differential-based scorings of positive psychological constructs: A psychometric comparison of two versions of a scale measuring resilience","volume":"40 5","author":"oddgeir","year":"2006","journal-title":"Personality and Individual Differences"},{"journal-title":"WEKA","year":"0","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019765"},{"key":"ref9","first-page":"1015","author":"sokolova","year":"2006","journal-title":"Beyond Accuracy F-Score and ROC A Family of Discriminant Measures for Performance Evaluation"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3182\/20130902-3-CN-3020.00044"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190617"},{"key":"ref48","first-page":"119","article-title":"On learning algorithm selection for classification","volume":"6 2","author":"shawkat","year":"2006","journal-title":"Applied Soft Computing"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0070-x"},{"journal-title":"OpenML portal","year":"0","key":"ref41"},{"key":"ref44","first-page":"289","article-title":"Sliding window-based fault detection from high-dimensional data streams","volume":"47 2","author":"liangwei","year":"2017","journal-title":"IEEE Transactions on Systems Man and Cybernetics Systems"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/AISP.2012.6313711"}],"event":{"name":"2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE)","start":{"date-parts":[[2019,10,28]]},"location":"Berlin, Germany","end":{"date-parts":[[2019,10,31]]}},"container-title":["2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967509\/8987436\/08987465.pdf?arnumber=8987465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:48:08Z","timestamp":1658141288000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8987465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/issre.2019.00051","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}