{"id":"https://openalex.org/W2797059531","doi":"https://doi.org/10.1007/978-3-319-78813-5_14","title":"SDN-Based Kernel Modular Countermeasure for Intrusion Detection","display_name":"SDN-Based Kernel Modular Countermeasure for Intrusion Detection","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2797059531","doi":"https://doi.org/10.1007/978-3-319-78813-5_14","mag":"2797059531"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-78813-5_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-78813-5_14","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010095679","display_name":"Tommy Chin","orcid":"https://orcid.org/0000-0003-0446-1325"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tommy Chin","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101689516","display_name":"Kaiqi Xiong","orcid":"https://orcid.org/0000-0003-2933-8083"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaiqi Xiong","raw_affiliation_strings":["University of South Florida, Tampa, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017529726","display_name":"Mohamed Rahouti","orcid":"https://orcid.org/0000-0001-9701-5505"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Rahouti","raw_affiliation_strings":["University of South Florida, Tampa, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, USA","institution_ids":["https://openalex.org/I2613432"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010095679"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":7.0554,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.97288432,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"270","last_page":"290"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7518963813781738},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7180251479148865},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6383653283119202},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.614462673664093},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5992630124092102},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5261863470077515},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.44689494371414185},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.4268546402454376},{"id":"https://openalex.org/keywords/string-searching-algorithm","display_name":"String searching algorithm","score":0.4138070046901703},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4115392565727234},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37984713912010193},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3551921546459198},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3302341103553772},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.18120574951171875},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17098331451416016},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14450237154960632},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.11038103699684143}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7518963813781738},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7180251479148865},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6383653283119202},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.614462673664093},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5992630124092102},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5261863470077515},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.44689494371414185},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.4268546402454376},{"id":"https://openalex.org/C7757238","wikidata":"https://www.wikidata.org/wiki/Q374040","display_name":"String searching algorithm","level":3,"score":0.4138070046901703},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4115392565727234},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37984713912010193},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3551921546459198},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3302341103553772},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.18120574951171875},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17098331451416016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14450237154960632},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.11038103699684143},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-78813-5_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-78813-5_14","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W103634144","https://openalex.org/W158224344","https://openalex.org/W1516506771","https://openalex.org/W1522342021","https://openalex.org/W1531996150","https://openalex.org/W1568205223","https://openalex.org/W1608999459","https://openalex.org/W1674877186","https://openalex.org/W1675033504","https://openalex.org/W1972041827","https://openalex.org/W1984451560","https://openalex.org/W1985609408","https://openalex.org/W1988774297","https://openalex.org/W2017524370","https://openalex.org/W2018204504","https://openalex.org/W2023009782","https://openalex.org/W2030239292","https://openalex.org/W2031175798","https://openalex.org/W2063109203","https://openalex.org/W2080897277","https://openalex.org/W2084915558","https://openalex.org/W2122109510","https://openalex.org/W2122695394","https://openalex.org/W2127540081","https://openalex.org/W2137845741","https://openalex.org/W2155624544","https://openalex.org/W2158900125","https://openalex.org/W2160824842","https://openalex.org/W2164998096","https://openalex.org/W2165855437","https://openalex.org/W2183397118","https://openalex.org/W2221972625","https://openalex.org/W2275015310","https://openalex.org/W2293280451","https://openalex.org/W2347800168","https://openalex.org/W2402147878","https://openalex.org/W2464408822","https://openalex.org/W2751455334","https://openalex.org/W2765915567","https://openalex.org/W4210878699","https://openalex.org/W6636558983","https://openalex.org/W6705298760"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W2735897973","https://openalex.org/W3114854705","https://openalex.org/W4229489764","https://openalex.org/W3036366741","https://openalex.org/W1543555101","https://openalex.org/W3195575042","https://openalex.org/W2898113880","https://openalex.org/W2793567886","https://openalex.org/W3020967770"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
