{"id":"https://openalex.org/W3181774430","doi":"https://doi.org/10.1007/978-3-030-78811-7_22","title":"Intelligent Intrusion Detection System for a Group of UAVs","display_name":"Intelligent Intrusion Detection System for a Group of UAVs","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3181774430","doi":"https://doi.org/10.1007/978-3-030-78811-7_22","mag":"3181774430"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-78811-7_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-78811-7_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009411018","display_name":"Elena Basan","orcid":"https://orcid.org/0000-0001-6127-4484"},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Elena Basan","raw_affiliation_strings":["Southern Federal University, Chekov St., 2, 347922, Taganrog, Russian Federation"],"raw_orcid":"https://orcid.org/0000-0001-6127-4484","affiliations":[{"raw_affiliation_string":"Southern Federal University, Chekov St., 2, 347922, Taganrog, Russian Federation","institution_ids":["https://openalex.org/I137534880"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013293452","display_name":"Maria Lapina","orcid":"https://orcid.org/0000-0001-8117-9142"},"institutions":[{"id":"https://openalex.org/I210043505","display_name":"North-Caucasus Federal University","ror":"https://ror.org/05g1k4d79","country_code":"RU","type":"education","lineage":["https://openalex.org/I210043505"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Maria Lapina","raw_affiliation_strings":["North-Caucasus Federal University, Pushkin St., 1, 355017, Stavropol, Russian Federation"],"raw_orcid":"https://orcid.org/0000-0001-8117-9142","affiliations":[{"raw_affiliation_string":"North-Caucasus Federal University, Pushkin St., 1, 355017, Stavropol, Russian Federation","institution_ids":["https://openalex.org/I210043505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010573159","display_name":"Nikita N. Mudruk","orcid":"https://orcid.org/0000-0002-4120-817X"},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Nikita Mudruk","raw_affiliation_strings":["Southern Federal University, Chekov St., 2, 347922, Taganrog, Russian Federation"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Southern Federal University, Chekov St., 2, 347922, Taganrog, Russian Federation","institution_ids":["https://openalex.org/I137534880"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038380534","display_name":"Evgeny Abramov","orcid":null},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Evgeny Abramov","raw_affiliation_strings":["Southern Federal University, Chekov St., 2, 347922, Taganrog, Russian Federation"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Southern Federal University, Chekov St., 2, 347922, Taganrog, Russian Federation","institution_ids":["https://openalex.org/I137534880"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009411018"],"corresponding_institution_ids":["https://openalex.org/I137534880"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":10.3913,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.98735972,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"230","last_page":"240"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.9021546840667725},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8213332891464233},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.7280466556549072},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6577361822128296},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5607687830924988},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5039829611778259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4835057556629181},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4813055098056793},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.43230631947517395},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.42851877212524414},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41931819915771484},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25054872035980225},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1404748558998108},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06954878568649292}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.9021546840667725},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8213332891464233},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.7280466556549072},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6577361822128296},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5607687830924988},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5039829611778259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4835057556629181},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4813055098056793},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.43230631947517395},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.42851877212524414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41931819915771484},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25054872035980225},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1404748558998108},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06954878568649292},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-78811-7_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-78811-7_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1480376833","https://openalex.org/W1598852905","https://openalex.org/W1879630343","https://openalex.org/W1906479473","https://openalex.org/W1992488456","https://openalex.org/W1994212840","https://openalex.org/W2007087405","https://openalex.org/W2079406686","https://openalex.org/W2099940443","https://openalex.org/W2110531057","https://openalex.org/W2111404412","https://openalex.org/W2125905417","https://openalex.org/W2535751405","https://openalex.org/W2607429810","https://openalex.org/W2608911009","https://openalex.org/W2752291283","https://openalex.org/W2787894218","https://openalex.org/W2789828921","https://openalex.org/W2916244526","https://openalex.org/W2916399742","https://openalex.org/W2940716932","https://openalex.org/W2973817887","https://openalex.org/W2997853417","https://openalex.org/W2998614618","https://openalex.org/W3043527956"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W3048672182","https://openalex.org/W1509300825","https://openalex.org/W2054620577","https://openalex.org/W3092582874","https://openalex.org/W2133389611"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
