{"id":"https://openalex.org/W2905461731","doi":"https://doi.org/10.1007/978-3-030-05345-1_14","title":"Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment","display_name":"Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2905461731","doi":"https://doi.org/10.1007/978-3-030-05345-1_14","mag":"2905461731"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-05345-1_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-05345-1_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101861024","display_name":"Kai Peng","orcid":"https://orcid.org/0000-0001-9148-7616"},"institutions":[{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]},{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]},{"id":"https://openalex.org/I4210143087","display_name":"Fujian Provincial Hospital","ror":"https://ror.org/045wzwx52","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210143087"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Kai Peng","raw_affiliation_strings":["College of Engineering, Huaqiao University, Quanzhou, 362021, Fujian, China","Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, V6T 1Z4, Canada","Fujian Provincial Academic Engineering Research Centre in Industrial Intellectual Techniques and Systems, Quanzhou, 362021, Fujian, China"],"raw_orcid":"https://orcid.org/0000-0001-9148-7616","affiliations":[{"raw_affiliation_string":"College of Engineering, Huaqiao University, Quanzhou, 362021, Fujian, China","institution_ids":["https://openalex.org/I119045251"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, V6T 1Z4, Canada","institution_ids":["https://openalex.org/I141945490"]},{"raw_affiliation_string":"Fujian Provincial Academic Engineering Research Centre in Industrial Intellectual Techniques and Systems, Quanzhou, 362021, Fujian, China","institution_ids":["https://openalex.org/I4210143087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051758870","display_name":"Lixin Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]},{"id":"https://openalex.org/I4210143087","display_name":"Fujian Provincial Hospital","ror":"https://ror.org/045wzwx52","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210143087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lixin Zheng","raw_affiliation_strings":["College of Engineering, Huaqiao University, Quanzhou, 362021, Fujian, China","Fujian Provincial Academic Engineering Research Centre in Industrial Intellectual Techniques and Systems, Quanzhou, 362021, Fujian, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering, Huaqiao University, Quanzhou, 362021, Fujian, China","institution_ids":["https://openalex.org/I119045251"]},{"raw_affiliation_string":"Fujian Provincial Academic Engineering Research Centre in Industrial Intellectual Techniques and Systems, Quanzhou, 362021, Fujian, China","institution_ids":["https://openalex.org/I4210143087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007818509","display_name":"Xiaolong Xu","orcid":"https://orcid.org/0000-0003-4879-9803"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolong Xu","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, 210044, China"],"raw_orcid":"https://orcid.org/0000-0003-4879-9803","affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, 210044, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109036828","display_name":"Tao Lin","orcid":"https://orcid.org/0000-0001-9100-6042"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Lin","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035919267","display_name":"Victor C. M. Leung","orcid":"https://orcid.org/0000-0003-3529-2640"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Victor C. M. Leung","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, V6T 1Z4, Canada"],"raw_orcid":"https://orcid.org/0000-0003-3529-2640","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, V6T 1Z4, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5051758870"],"corresponding_institution_ids":["https://openalex.org/I119045251","https://openalex.org/I4210143087"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":4.875,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.95647419,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"166","last_page":"177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10637","display_name":"Advanced Clustering Algorithms Research","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.9089404940605164},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8019211292266846},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6602393388748169},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6564074754714966},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6561908721923828},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.6393981575965881},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5917555093765259},{"id":"https://openalex.org/keywords/cure-data-clustering-algorithm","display_name":"CURE data clustering algorithm","score":0.49177172780036926},{"id":"https://openalex.org/keywords/data-stream-clustering","display_name":"Data stream clustering","score":0.4381354749202728},{"id":"https://openalex.org/keywords/correlation-clustering","display_name":"Correlation clustering","score":0.43725740909576416},{"id":"https://openalex.org/keywords/k-means-clustering","display_name":"k-means clustering","score":0.4327000379562378},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19490373134613037}],"concepts":[{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.9089404940605164},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8019211292266846},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6602393388748169},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6564074754714966},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6561908721923828},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.6393981575965881},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5917555093765259},{"id":"https://openalex.org/C33704608","wikidata":"https://www.wikidata.org/wiki/Q5014717","display_name":"CURE data clustering algorithm","level":4,"score":0.49177172780036926},{"id":"https://openalex.org/C193143536","wikidata":"https://www.wikidata.org/wiki/Q5227360","display_name":"Data stream clustering","level":5,"score":0.4381354749202728},{"id":"https://openalex.org/C94641424","wikidata":"https://www.wikidata.org/wiki/Q5172845","display_name":"Correlation clustering","level":3,"score":0.43725740909576416},{"id":"https://openalex.org/C207968372","wikidata":"https://www.wikidata.org/wiki/Q310401","display_name":"k-means clustering","level":3,"score":0.4327000379562378},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19490373134613037},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-05345-1_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-05345-1_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1583975142","https://openalex.org/W2040263621","https://openalex.org/W2057261601","https://openalex.org/W2085487226","https://openalex.org/W2095897464","https://openalex.org/W2146610201","https://openalex.org/W2150847526","https://openalex.org/W2160841769","https://openalex.org/W2289700993","https://openalex.org/W2592603995","https://openalex.org/W2741125053","https://openalex.org/W2784146178","https://openalex.org/W2790117078","https://openalex.org/W2791950267","https://openalex.org/W2793174642","https://openalex.org/W2809721476","https://openalex.org/W3214373139"],"related_works":["https://openalex.org/W2491448268","https://openalex.org/W2559422900","https://openalex.org/W2892323093","https://openalex.org/W3144143113","https://openalex.org/W2394193399","https://openalex.org/W2181939267","https://openalex.org/W2390610678","https://openalex.org/W3071522575","https://openalex.org/W2363054820","https://openalex.org/W2160785859"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2026-01-15T23:16:33.117629","created_date":"2025-10-10T00:00:00"}
