{"id":"https://openalex.org/W117115851","doi":"https://doi.org/10.1007/978-3-540-28648-6_105","title":"A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security","display_name":"A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W117115851","doi":"https://doi.org/10.1007/978-3-540-28648-6_105","mag":"117115851"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-28648-6_105","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-28648-6_105","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100392099","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-8476-3181"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Wang","raw_affiliation_strings":["SKLMS (State Key Laboratory for Manufacturing Systems Engineering) and Research Center for Networked Systems and Information Security, Xi\u2019an Jiaotong University, 710049, Xi\u2019an, China","SKLMS (State Key Laboratory for Manufacturing Systems Engineering) and Research Center for Networked Systems and Information Security, Xi\u2019an Jiaotong University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"SKLMS (State Key Laboratory for Manufacturing Systems Engineering) and Research Center for Networked Systems and Information Security, Xi\u2019an Jiaotong University, 710049, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"SKLMS (State Key Laboratory for Manufacturing Systems Engineering) and Research Center for Networked Systems and Information Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075845093","display_name":"Xiaohong Guan","orcid":"https://orcid.org/0000-0002-8826-0362"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Guan","raw_affiliation_strings":["Center for Intelligent and Networked Systems, Tsinghua University, 100084, Beijing, China","SKLMS (State Key Laboratory for Manufacturing Systems Engineering) and Research Center for Networked Systems and Information Security, Xi\u2019an Jiaotong University, 710049, Xi\u2019an, China","Center for Intelligent and Networked Systems, Tsinghua University, Beijing, China","SKLMS (State Key Laboratory for Manufacturing Systems Engineering) and Research Center for Networked Systems and Information Security, Xi\u2019an Jiaotong University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Center for Intelligent and Networked Systems, Tsinghua University, 100084, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"SKLMS (State Key Laboratory for Manufacturing Systems Engineering) and Research Center for Networked Systems and Information Security, Xi\u2019an Jiaotong University, 710049, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Center for Intelligent and Networked Systems, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"SKLMS (State Key Laboratory for Manufacturing Systems Engineering) and Research Center for Networked Systems and Information Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000755750","display_name":"Xiangliang Zhang","orcid":"https://orcid.org/0000-0002-3574-5665"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangliang Zhang","raw_affiliation_strings":["Department of electronic science and technology, Xi\u2019an Jiaotong University, 710049, Xi\u2019an, China","Department of electronic science and technology, Xi\u2019an Jiaotong University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Department of electronic science and technology, Xi\u2019an Jiaotong University, 710049, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Department of electronic science and technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100392099"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.891,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.85259213,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"657","last_page":"662"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.778198778629303},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7291451096534729},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.7033853530883789},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6951343417167664},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.5922804474830627},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5407888889312744},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5159085988998413},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5110193490982056},{"id":"https://openalex.org/keywords/projection","display_name":"Projection (relational algebra)","score":0.45393455028533936},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.4461171627044678},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4403230845928192},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4246594309806824},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3894009590148926},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3052981495857239},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28141409158706665},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11754488945007324},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10854774713516235}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.778198778629303},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7291451096534729},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.7033853530883789},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6951343417167664},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.5922804474830627},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5407888889312744},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5159085988998413},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5110193490982056},{"id":"https://openalex.org/C57493831","wikidata":"https://www.wikidata.org/wiki/Q3134666","display_name":"Projection (relational algebra)","level":2,"score":0.45393455028533936},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.4461171627044678},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4403230845928192},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4246594309806824},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3894009590148926},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3052981495857239},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28141409158706665},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11754488945007324},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10854774713516235},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-28648-6_105","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-28648-6_105","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W34688585","https://openalex.org/W1583975142","https://openalex.org/W2017735590","https://openalex.org/W2096847629","https://openalex.org/W2128217000","https://openalex.org/W2129860818","https://openalex.org/W2138451337","https://openalex.org/W2799061466","https://openalex.org/W3099514962","https://openalex.org/W4214931895","https://openalex.org/W4229543188","https://openalex.org/W4250857377","https://openalex.org/W4290757805","https://openalex.org/W4300470068"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W1971929717","https://openalex.org/W3036013726","https://openalex.org/W1724519426","https://openalex.org/W2061466315","https://openalex.org/W2355532322","https://openalex.org/W2368329025","https://openalex.org/W3157271777","https://openalex.org/W1485296229"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
