{"id":"https://openalex.org/W4320915505","doi":"https://doi.org/10.1007/978-981-99-0272-9_38","title":"On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security","display_name":"On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4320915505","doi":"https://doi.org/10.1007/978-981-99-0272-9_38"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-99-0272-9_38","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-0272-9_38","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060560709","display_name":"Omar Alshaikh","orcid":"https://orcid.org/0000-0002-1350-8933"},"institutions":[{"id":"https://openalex.org/I133837150","display_name":"University of Huddersfield","ror":"https://ror.org/05t1h8f27","country_code":"GB","type":"education","lineage":["https://openalex.org/I133837150"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Omar Alshaikh","raw_affiliation_strings":["Department of Computer Science, University of Huddersfield, Huddersfield, HD1 3DH, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Huddersfield, Huddersfield, HD1 3DH, UK","institution_ids":["https://openalex.org/I133837150"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037686924","display_name":"Simon Parkinson","orcid":"https://orcid.org/0000-0002-1747-9914"},"institutions":[{"id":"https://openalex.org/I133837150","display_name":"University of Huddersfield","ror":"https://ror.org/05t1h8f27","country_code":"GB","type":"education","lineage":["https://openalex.org/I133837150"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Simon Parkinson","raw_affiliation_strings":["Department of Computer Science, University of Huddersfield, Huddersfield, HD1 3DH, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Huddersfield, Huddersfield, HD1 3DH, UK","institution_ids":["https://openalex.org/I133837150"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053811883","display_name":"Saad Khan","orcid":"https://orcid.org/0000-0001-8613-8200"},"institutions":[{"id":"https://openalex.org/I133837150","display_name":"University of Huddersfield","ror":"https://ror.org/05t1h8f27","country_code":"GB","type":"education","lineage":["https://openalex.org/I133837150"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Saad Khan","raw_affiliation_strings":["Department of Computer Science, University of Huddersfield, Huddersfield, HD1 3DH, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Huddersfield, Huddersfield, HD1 3DH, UK","institution_ids":["https://openalex.org/I133837150"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060560709"],"corresponding_institution_ids":["https://openalex.org/I133837150"],"apc_list":null,"apc_paid":null,"fwci":2.8338,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.8970824,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"545","last_page":"555"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7148127555847168},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6692271828651428},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6687306761741638},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6020830869674683},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5140672922134399},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4367027282714844},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.36308610439300537},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3580373525619507},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33990785479545593},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11873459815979004},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07116526365280151},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07023879885673523}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7148127555847168},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6692271828651428},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6687306761741638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6020830869674683},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5140672922134399},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4367027282714844},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.36308610439300537},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3580373525619507},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33990785479545593},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11873459815979004},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07116526365280151},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07023879885673523},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-981-99-0272-9_38","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-0272-9_38","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:publications/64836dbb-fa55-46b9-889a-c0ff297ed7c6","is_oa":false,"landing_page_url":"https://pure.hud.ac.uk/en/publications/64836dbb-fa55-46b9-889a-c0ff297ed7c6","pdf_url":null,"source":{"id":"https://openalex.org/S4306402508","display_name":"Huddersfield Research Portal (University of Huddersfield)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I133837150","host_organization_name":"University of Huddersfield","host_organization_lineage":["https://openalex.org/I133837150"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Alshaikh, O, Parkinson, S & Khan, S 2023, On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security. in G Wang, K-K R Choo, J Wu & E Damiani (eds), Ubiquitous Security : Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28\u201331, 2022, Revised Selected Papers. 1st edn, vol. 1768 CCIS, Communications in Computer and Information Science, vol. 1768 CCIS, Springer Singapore, pp. 545-555, The 2nd International Conference on Ubiquitous Security, Zhangjiajie, China, 28/12/22. https://doi.org/10.1007/978-981-99-0272-9_38","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1680797894","https://openalex.org/W2170505850","https://openalex.org/W2296609147","https://openalex.org/W2571196383","https://openalex.org/W2734140326","https://openalex.org/W2756408590","https://openalex.org/W2772393799","https://openalex.org/W2775195841","https://openalex.org/W2779627157","https://openalex.org/W2783033852","https://openalex.org/W2794778778","https://openalex.org/W2892195839","https://openalex.org/W2903155847","https://openalex.org/W2908954810","https://openalex.org/W2911731407","https://openalex.org/W2949836779","https://openalex.org/W2971361125","https://openalex.org/W2977506040","https://openalex.org/W2994101726","https://openalex.org/W2994783069","https://openalex.org/W3003487773","https://openalex.org/W3080622597","https://openalex.org/W3092922850","https://openalex.org/W3096831136","https://openalex.org/W3105640742","https://openalex.org/W3111962011","https://openalex.org/W3139187101","https://openalex.org/W3146350232","https://openalex.org/W3166321059","https://openalex.org/W3168414501","https://openalex.org/W4212960548","https://openalex.org/W4213358345","https://openalex.org/W4214743186"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4224009465","https://openalex.org/W4286629047","https://openalex.org/W2329452785","https://openalex.org/W2356380379","https://openalex.org/W4306321456","https://openalex.org/W4285260836","https://openalex.org/W3046775127","https://openalex.org/W2364562957"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-01-24T23:23:39.755997","created_date":"2025-10-10T00:00:00"}
