{"id":"https://openalex.org/W4308632271","doi":"https://doi.org/10.1145/3548606.3560609","title":"AI/ML for Network Security","display_name":"AI/ML for Network Security","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308632271","doi":"https://doi.org/10.1145/3548606.3560609"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3560609","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560609","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044197011","display_name":"Arthur Selle Jacobs","orcid":"https://orcid.org/0000-0003-0624-5001"},"institutions":[{"id":"https://openalex.org/I130442723","display_name":"Universidade Federal do Rio Grande do Sul","ror":"https://ror.org/041yk2d64","country_code":"BR","type":"education","lineage":["https://openalex.org/I130442723"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Arthur S. Jacobs","raw_affiliation_strings":["UFRGS, Porto Alegre, Brazil"],"affiliations":[{"raw_affiliation_string":"UFRGS, Porto Alegre, Brazil","institution_ids":["https://openalex.org/I130442723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072884806","display_name":"Roman Beltiukov","orcid":"https://orcid.org/0000-0001-8270-0219"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Roman Beltiukov","raw_affiliation_strings":["UCSB, Santa Barbara, CA, USA"],"affiliations":[{"raw_affiliation_string":"UCSB, Santa Barbara, CA, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082255432","display_name":"Walter Willinger","orcid":"https://orcid.org/0000-0002-1384-8188"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Walter Willinger","raw_affiliation_strings":["NIKSUN Inc., Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"NIKSUN Inc., Princeton, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049004680","display_name":"Ronaldo A. Ferreira","orcid":"https://orcid.org/0000-0002-9144-7187"},"institutions":[{"id":"https://openalex.org/I122558511","display_name":"Universidade Federal de Mato Grosso do Sul","ror":"https://ror.org/0366d2847","country_code":"BR","type":"education","lineage":["https://openalex.org/I122558511"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Ronaldo A. Ferreira","raw_affiliation_strings":["UFMS, Campo Grande, Brazil"],"affiliations":[{"raw_affiliation_string":"UFMS, Campo Grande, Brazil","institution_ids":["https://openalex.org/I122558511"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046100948","display_name":"Arpit Gupta","orcid":"https://orcid.org/0000-0002-6378-7440"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arpit Gupta","raw_affiliation_strings":["UCSB, Santa Barbara, CA, USA"],"affiliations":[{"raw_affiliation_string":"UCSB, Santa Barbara, CA, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069321002","display_name":"Lisandro Zambenedetti Granville","orcid":"https://orcid.org/0000-0001-8956-8660"},"institutions":[{"id":"https://openalex.org/I130442723","display_name":"Universidade Federal do Rio Grande do Sul","ror":"https://ror.org/041yk2d64","country_code":"BR","type":"education","lineage":["https://openalex.org/I130442723"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Lisandro Z. Granville","raw_affiliation_strings":["UFRGS, Porto Alegre, Brazil"],"affiliations":[{"raw_affiliation_string":"UFRGS, Porto Alegre, Brazil","institution_ids":["https://openalex.org/I130442723"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044197011"],"corresponding_institution_ids":["https://openalex.org/I130442723"],"apc_list":null,"apc_paid":null,"fwci":16.4132,"has_fulltext":false,"cited_by_count":76,"citation_normalized_percentile":{"value":0.9969567,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1537","last_page":"1551"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.8056055903434753},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7541143894195557},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5693399310112},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.5088949203491211},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4939735531806946},{"id":"https://openalex.org/keywords/underspecification","display_name":"Underspecification","score":0.4576314091682434},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.44339069724082947},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43747612833976746},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.41748738288879395},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4108855426311493},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35607266426086426},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34875690937042236}],"concepts":[{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.8056055903434753},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7541143894195557},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5693399310112},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.5088949203491211},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4939735531806946},{"id":"https://openalex.org/C2779631151","wikidata":"https://www.wikidata.org/wiki/Q7883767","display_name":"Underspecification","level":2,"score":0.4576314091682434},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.44339069724082947},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43747612833976746},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.41748738288879395},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4108855426311493},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35607266426086426},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34875690937042236},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3560609","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560609","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1678356000","https://openalex.org/W1767470961","https://openalex.org/W2108598243","https://openalex.org/W2111022379","https://openalex.org/W2145949183","https://openalex.org/W2516809705","https://openalex.org/W2521200999","https://openalex.org/W2604382266","https://openalex.org/W2618851150","https://openalex.org/W2623293810","https://openalex.org/W2744628735","https://openalex.org/W2803881474","https://openalex.org/W2809684781","https://openalex.org/W2888505697","https://openalex.org/W2913818095","https://openalex.org/W2945976633","https://openalex.org/W2962843949","https://openalex.org/W2962862931","https://openalex.org/W2971644666","https://openalex.org/W2977675538","https://openalex.org/W2983123278","https://openalex.org/W2986844069","https://openalex.org/W3005073185","https://openalex.org/W3005097670","https://openalex.org/W3016970897","https://openalex.org/W3023061032","https://openalex.org/W3024905798","https://openalex.org/W3035517615","https://openalex.org/W3035574168","https://openalex.org/W3098136764","https://openalex.org/W3102091066","https://openalex.org/W3103934428","https://openalex.org/W3108671495","https://openalex.org/W3138819813","https://openalex.org/W4200186003","https://openalex.org/W4245210885","https://openalex.org/W4247489640","https://openalex.org/W4256257446","https://openalex.org/W4287552728","https://openalex.org/W4287826698","https://openalex.org/W4293713156","https://openalex.org/W4301810047","https://openalex.org/W4308632271"],"related_works":["https://openalex.org/W2048198238","https://openalex.org/W2041829265","https://openalex.org/W1984757285","https://openalex.org/W2048884548","https://openalex.org/W1500924816","https://openalex.org/W4200263774","https://openalex.org/W2744370558","https://openalex.org/W3109877713","https://openalex.org/W3089060762","https://openalex.org/W4295136046"],"abstract_inverted_index":{"Several":[0],"recent":[1],"research":[2],"efforts":[3],"have":[4],"proposed":[5],"Machine":[6],"Learning":[7],"(ML)-based":[8],"solutions":[9,112],"that":[10,57,93,133],"can":[11],"detect":[12],"complex":[13],"patterns":[14],"in":[15,46,76,90,100,108,150],"network":[16,23,37,83],"traffic":[17],"for":[18,53,116,152],"a":[19,74,121,135],"wide":[20],"range":[21],"of":[22,65],"security":[24,84],"problems.":[25],"However,":[26,128],"without":[27],"understanding":[28],"how":[29,120],"these":[30,58],"black-box":[31,123,137],"models":[32,59,92,132],"are":[33,39,60],"making":[34],"their":[35,47],"decisions,":[36],"operators":[38],"reluctant":[40],"to":[41,62,72,81,118,154],"trust":[42],"and":[43,103],"deploy":[44],"them":[45],"production":[48],"settings.":[49],"One":[50],"key":[51],"reason":[52],"this":[54,86],"reluctance":[55],"is":[56,156],"prone":[61],"the":[63,70,82],"problem":[64,87],"underspecification,":[66],"defined":[67],"here":[68],"as":[69],"failure":[71],"specify":[73],"model":[75,124],"adequate":[77],"detail.":[78],"Not":[79],"unique":[80],"domain,":[85],"manifests":[88],"itself":[89],"ML":[91,111],"exhibit":[94],"unexpectedly":[95],"poor":[96],"behavior":[97],"when":[98],"deployed":[99],"real-world":[101],"settings":[102],"has":[104],"prompted":[105],"growing":[106],"interest":[107],"developing":[109],"interpretable":[110],"(e.g.,":[113],"decision":[114],"trees)":[115],"\"explaining''":[117],"humans":[119,153],"given":[122,136],"makes":[125],"its":[126],"decisions.":[127],"synthesizing":[129],"such":[130],"explainable":[131],"capture":[134],"model's":[138],"decisions":[139],"with":[140],"high":[141],"fidelity":[142],"while":[143],"also":[144],"being":[145],"practical":[146],"(i.e.,":[147],"small":[148],"enough":[149],"size":[151],"comprehend)":[155],"challenging.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":32},{"year":2023,"cited_by_count":19},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
