{"id":"https://openalex.org/W4292158215","doi":"https://doi.org/10.1145/3538969.3544428","title":"Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection","display_name":"Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection","publication_year":2022,"publication_date":"2022-08-17","ids":{"openalex":"https://openalex.org/W4292158215","doi":"https://doi.org/10.1145/3538969.3544428"},"language":"en","primary_location":{"id":"doi:10.1145/3538969.3544428","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3544428","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088536972","display_name":"Marek Pawlicki","orcid":"https://orcid.org/0000-0001-5881-6406"},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]},{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Marek Pawlicki","raw_affiliation_strings":["ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042632349","display_name":"Rafa\u0142 Kozik","orcid":"https://orcid.org/0000-0001-7122-3306"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Kozik","raw_affiliation_strings":["ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009283476","display_name":"Micha\u0142 Chora\u015b","orcid":"https://orcid.org/0000-0003-1405-9911"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Micha\u0142 Chora\u015b","raw_affiliation_strings":["ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088536972"],"corresponding_institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"],"apc_list":null,"apc_paid":null,"fwci":0.8648,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67144049,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.9602569341659546},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8233023881912231},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7062885761260986},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5836940407752991},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.5635390877723694},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5593673586845398},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5092414617538452},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.41416096687316895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37620678544044495},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1993708610534668},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11576765775680542}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.9602569341659546},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8233023881912231},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7062885761260986},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5836940407752991},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.5635390877723694},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5593673586845398},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5092414617538452},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41416096687316895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37620678544044495},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1993708610534668},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11576765775680542},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3538969.3544428","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3544428","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G2236787230","display_name":null,"funder_award_id":"957286","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2035055162","https://openalex.org/W2053550965","https://openalex.org/W2097470841","https://openalex.org/W2165698076","https://openalex.org/W2532424365","https://openalex.org/W2620580412","https://openalex.org/W2622810779","https://openalex.org/W2758375579","https://openalex.org/W2765609047","https://openalex.org/W2771838132","https://openalex.org/W2772996140","https://openalex.org/W2783741806","https://openalex.org/W2789828921","https://openalex.org/W2887280559","https://openalex.org/W2896556344","https://openalex.org/W2924689635","https://openalex.org/W2963748489","https://openalex.org/W2965561013","https://openalex.org/W2971489520","https://openalex.org/W2980576170","https://openalex.org/W2981025625","https://openalex.org/W2997591727","https://openalex.org/W3017943350","https://openalex.org/W3025093231","https://openalex.org/W3041133507","https://openalex.org/W3042826782","https://openalex.org/W3047132966","https://openalex.org/W3086737406","https://openalex.org/W3093410479","https://openalex.org/W3100989807","https://openalex.org/W3112718981","https://openalex.org/W3116162237","https://openalex.org/W3129273143","https://openalex.org/W3139708147","https://openalex.org/W3161898103","https://openalex.org/W3176609646","https://openalex.org/W3206325220","https://openalex.org/W4244188031","https://openalex.org/W4245876067","https://openalex.org/W4281693361"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Currently,":[0],"machine":[1],"learning":[2,101],"sees":[3],"growing":[4],"adoption":[5],"in":[6,63,110],"numerous":[7],"domains,":[8],"including":[9],"critical":[10],"applications,":[11],"like":[12,78],"cybersecurity.":[13],"However,":[14],"to":[15,29,31,47,85,103],"fully":[16],"enjoy":[17],"the":[18,23,42,49,83,97,105],"benefits":[19],"of":[20,35,44,99,107],"artificial":[21],"intelligence":[22],"end-user":[24],"has":[25],"some":[26],"high":[27],"barriers":[28],"entry":[30],"circumnavigate.":[32],"The":[33],"deployment":[34,92,108],"machine-learning-based":[36,111],"Network":[37],"Intrusion":[38],"Detection":[39],"Systems":[40],"requires":[41],"collection":[43],"labelled":[45,74],"data":[46,71],"train":[48],"intelligent":[50],"components.":[51],"This":[52,94],"is":[53],"an":[54],"expensive":[55],"and":[56,65,73],"laborious":[57],"process,":[58],"which":[59],"necessitates":[60],"expert":[61],"knowledge":[62],"cyberattacks":[64],"computer":[66],"networks.":[67],"Even":[68],"when":[69],"using":[70],"collected":[72],"on":[75],"premises,":[76],"phenomena":[77],"concept":[79,89],"drift":[80],"can":[81],"cause":[82],"model":[84],"underperform":[86],"-":[87],"a":[88],"known":[90],"as":[91],"shift.":[93],"paper":[95],"evaluates":[96],"use":[98],"transfer":[100],"techniques":[102],"curb":[104],"effects":[106],"shift":[109],"network":[112],"intrusion":[113],"detection.":[114]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
