{"id":"https://openalex.org/W1789139944","doi":"https://doi.org/10.1007/978-3-642-12214-9_17","title":"Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison","display_name":"Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1789139944","doi":"https://doi.org/10.1007/978-3-642-12214-9_17","mag":"1789139944"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-12214-9_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-12214-9_17","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052648916","display_name":"B. Kavitha","orcid":"https://orcid.org/0000-0002-4428-6528"},"institutions":[{"id":"https://openalex.org/I111575329","display_name":"Bharathiar University","ror":"https://ror.org/04fht8c22","country_code":"IN","type":"education","lineage":["https://openalex.org/I111575329"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"B. Kavitha","raw_affiliation_strings":["Research Scholar, Bharathiar University,"],"affiliations":[{"raw_affiliation_string":"Research Scholar, Bharathiar University,","institution_ids":["https://openalex.org/I111575329"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044917514","display_name":"S. Karthikeyan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114546","display_name":"College of Applied Sciences, Nizwa","ror":"https://ror.org/01xf31a71","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210114546"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"S. Karthikeyan","raw_affiliation_strings":["College of Applied Sciences, Sohar, Sultanatae of Oman (ACEEE Senior Member No: 7000490),"],"affiliations":[{"raw_affiliation_string":"College of Applied Sciences, Sohar, Sultanatae of Oman (ACEEE Senior Member No: 7000490),","institution_ids":["https://openalex.org/I4210114546"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026830205","display_name":"B. Chitra","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. Chitra","raw_affiliation_strings":["Department of Computer Applications, SNMV College of Arts and Science,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Applications, SNMV College of Arts and Science,","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052648916"],"corresponding_institution_ids":["https://openalex.org/I111575329"],"apc_list":null,"apc_paid":null,"fwci":3.2977,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.91768617,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9732000231742859,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9639999866485596,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/c4.5-algorithm","display_name":"C4.5 algorithm","score":0.9183906316757202},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7651605606079102},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7502387166023254},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.7036823034286499},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6427879333496094},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.523611843585968},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.49668675661087036},{"id":"https://openalex.org/keywords/id3","display_name":"ID3","score":0.48883575201034546},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4549420177936554},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.4406552016735077},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.43535569310188293},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4344123303890228},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3723839521408081},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.24591705203056335},{"id":"https://openalex.org/keywords/decision-tree-learning","display_name":"Decision tree learning","score":0.15290820598602295},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07016703486442566}],"concepts":[{"id":"https://openalex.org/C52003472","wikidata":"https://www.wikidata.org/wiki/Q1022655","display_name":"C4.5 algorithm","level":4,"score":0.9183906316757202},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7651605606079102},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7502387166023254},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.7036823034286499},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6427879333496094},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.523611843585968},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.49668675661087036},{"id":"https://openalex.org/C174599459","wikidata":"https://www.wikidata.org/wiki/Q1054220","display_name":"ID3","level":4,"score":0.48883575201034546},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4549420177936554},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.4406552016735077},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.43535569310188293},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4344123303890228},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3723839521408081},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.24591705203056335},{"id":"https://openalex.org/C5481197","wikidata":"https://www.wikidata.org/wiki/Q16766476","display_name":"Decision tree learning","level":3,"score":0.15290820598602295},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07016703486442566},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-12214-9_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-12214-9_17","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W349770100","https://openalex.org/W1560593431","https://openalex.org/W2181357864","https://openalex.org/W2183056407"],"related_works":["https://openalex.org/W2997511728","https://openalex.org/W4214653893","https://openalex.org/W2149097950","https://openalex.org/W3124731355","https://openalex.org/W3036853918","https://openalex.org/W3211372245","https://openalex.org/W2505282017","https://openalex.org/W3013263334","https://openalex.org/W2995276271","https://openalex.org/W2748867426"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
