{"id":"https://openalex.org/W7136192065","doi":"https://doi.org/10.1007/s10207-026-01224-2","title":"A hybrid feature fusion approach for multiclass Wi-Fi intrusion detection using classical machine learning","display_name":"A hybrid feature fusion approach for multiclass Wi-Fi intrusion detection using classical machine learning","publication_year":2026,"publication_date":"2026-03-16","ids":{"openalex":"https://openalex.org/W7136192065","doi":"https://doi.org/10.1007/s10207-026-01224-2"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-026-01224-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01224-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01224-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01224-2.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059688811","display_name":"\u015eevval \u015eolpan","orcid":null},"institutions":[{"id":"https://openalex.org/I51826884","display_name":"Kocaeli \u00dcniversitesi","ror":"https://ror.org/0411seq30","country_code":"TR","type":"education","lineage":["https://openalex.org/I51826884"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"\u015eevval \u015eolpan","raw_affiliation_strings":["Faculty of Engineering, Software Engineering Department, Kocaeli University, Kocaeli, 41001, Turkey"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Software Engineering Department, Kocaeli University, Kocaeli, 41001, Turkey","institution_ids":["https://openalex.org/I51826884"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022678740","display_name":"Hakan G\u00fcnd\u00fcz","orcid":"https://orcid.org/0000-0003-2152-5490"},"institutions":[{"id":"https://openalex.org/I51826884","display_name":"Kocaeli \u00dcniversitesi","ror":"https://ror.org/0411seq30","country_code":"TR","type":"education","lineage":["https://openalex.org/I51826884"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Hakan G\u00fcnd\u00fcz","raw_affiliation_strings":["Faculty of Engineering, Software Engineering Department, Kocaeli University, Kocaeli, 41001, Turkey"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Software Engineering Department, Kocaeli University, Kocaeli, 41001, Turkey","institution_ids":["https://openalex.org/I51826884"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121821280","display_name":"Kerem K\u00fc\u00e7\u00fck","orcid":null},"institutions":[{"id":"https://openalex.org/I51826884","display_name":"Kocaeli \u00dcniversitesi","ror":"https://ror.org/0411seq30","country_code":"TR","type":"education","lineage":["https://openalex.org/I51826884"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Kerem K\u00fc\u00e7\u00fck","raw_affiliation_strings":["Faculty of Engineering, Software Engineering Department, Kocaeli University, Kocaeli, 41001, Turkey"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Software Engineering Department, Kocaeli University, Kocaeli, 41001, Turkey","institution_ids":["https://openalex.org/I51826884"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003301865","display_name":"Fatih \u00d6zyurt","orcid":"https://orcid.org/0000-0002-8154-6691"},"institutions":[{"id":"https://openalex.org/I4210112681","display_name":"Software Research and Development Consulting","ror":"https://ror.org/01vbm2c42","country_code":"TR","type":"company","lineage":["https://openalex.org/I4210112681"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Fatih \u00d6zyurt","raw_affiliation_strings":["Faculty of Engineering, Software Engineering Department, F\u0131rat University, Elaz\u0131\u011f, 23119, Turkey"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Software Engineering Department, F\u0131rat University, Elaz\u0131\u011f, 23119, Turkey","institution_ids":["https://openalex.org/I4210112681"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059688811"],"corresponding_institution_ids":["https://openalex.org/I51826884"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.89548817,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3151000142097473,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3151000142097473,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.09849999845027924,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.0982000008225441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7421000003814697},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7409999966621399},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5697000026702881},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5651000142097473},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5343999862670898},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4205999970436096},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.4156999886035919},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.4092000126838684},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.40720000863075256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8228999972343445},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7421000003814697},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7409999966621399},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.728600025177002},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5997999906539917},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5697000026702881},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5651000142097473},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5343999862670898},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.4156999886035919},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.4092000126838684},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.40720000863075256},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39489999413490295},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C153668964","wikidata":"https://www.wikidata.org/wiki/Q27636","display_name":"Majority rule","level":2,"score":0.3499999940395355},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.3492000102996826},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3479999899864197},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.3296000063419342},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.30809998512268066},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.29429998993873596},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C101814296","wikidata":"https://www.wikidata.org/wiki/Q5439685","display_name":"Feature model","level":3,"score":0.2646999955177307},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-026-01224-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01224-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01224-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:eeff0f56-8f11-4fe3-8c9f-d9a2d3569c09","is_oa":false,"landing_page_url":"https://avesis.kocaeli.edu.tr/publication/details/eeff0f56-8f11-4fe3-8c9f-d9a2d3569c09/oai","pdf_url":null,"source":{"id":"https://openalex.org/S7407055291","display_name":"Kocaeli \u00dcniversitesi - AVES\u0130S","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10207-026-01224-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01224-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01224-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322341","display_name":"Kocaeli \u00dcniversitesi","ror":"https://ror.org/0411seq30"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7136192065.pdf","grobid_xml":"https://content.openalex.org/works/W7136192065.grobid-xml"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W1548212946","https://openalex.org/W2028070713","https://openalex.org/W2883690386","https://openalex.org/W2967609625","https://openalex.org/W3003685271","https://openalex.org/W3116274835","https://openalex.org/W3125078888","https://openalex.org/W3132842072","https://openalex.org/W3158799343","https://openalex.org/W3159151987","https://openalex.org/W3186042079","https://openalex.org/W3189826552","https://openalex.org/W3194206058","https://openalex.org/W3197150995","https://openalex.org/W4210648373","https://openalex.org/W4221102375","https://openalex.org/W4285055378","https://openalex.org/W4294691673","https://openalex.org/W4295788744","https://openalex.org/W4296342837","https://openalex.org/W4306760877","https://openalex.org/W4309969872","https://openalex.org/W4311415244","https://openalex.org/W4312204616","https://openalex.org/W4313201183","https://openalex.org/W4315629579","https://openalex.org/W4362587694","https://openalex.org/W4377028392","https://openalex.org/W4379928215","https://openalex.org/W4380442259","https://openalex.org/W4384945913","https://openalex.org/W4385482064","https://openalex.org/W4385494113","https://openalex.org/W4386249757","https://openalex.org/W4386920901","https://openalex.org/W4387606158","https://openalex.org/W4387913088","https://openalex.org/W4388427892","https://openalex.org/W4389076563","https://openalex.org/W4390044127","https://openalex.org/W4390045736","https://openalex.org/W4390075196","https://openalex.org/W4390328057","https://openalex.org/W4390937897","https://openalex.org/W4391172162","https://openalex.org/W4391582627","https://openalex.org/W4392255041","https://openalex.org/W4392399503","https://openalex.org/W4398226227","https://openalex.org/W4399426244","https://openalex.org/W4400526624","https://openalex.org/W4401210511","https://openalex.org/W4401210725","https://openalex.org/W4402830280","https://openalex.org/W4403446768","https://openalex.org/W4403936878","https://openalex.org/W4406016596","https://openalex.org/W4406262280","https://openalex.org/W4407366087","https://openalex.org/W4408100195","https://openalex.org/W4410770889","https://openalex.org/W4414126826","https://openalex.org/W4415084653"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Wi-Fi":[1,47,174],"networks":[2],"have":[3],"become":[4],"a":[5,24,140],"fundamental":[6],"component":[7],"of":[8,10,27,35,66],"Internet":[9],"Things":[11],"(IoT)":[12],"environments,":[13],"while":[14],"their":[15],"open":[16],"and":[17,83,89,104,116,147,168],"shared":[18],"nature":[19],"also":[20],"exposes":[21],"them":[22],"to":[23,62],"wide":[25],"range":[26],"cyber":[28],"attacks.":[29],"This":[30],"study":[31],"examines":[32],"the":[33,51],"use":[34],"time-series":[36,60,134],"feature":[37,74,117,157],"engineering":[38],"combined":[39,131],"with":[40,132,145,161],"classical":[41,125],"machine":[42,126],"learning":[43,127],"techniques":[44],"for":[45,172],"multiclass":[46],"intrusion":[48,142,175],"detection":[49,143,176],"using":[50,97],"AWID3":[52],"dataset.":[53],"Network":[54],"traffic":[55],"is":[56,95],"segmented":[57],"into":[58],"multivariate":[59],"blocks":[61],"capture":[63,87],"temporal":[64,90],"characteristics":[65],"wireless":[67],"communication.":[68],"From":[69],"these":[70],"segments,":[71],"two":[72],"complementary":[73],"representations":[75],"are":[76],"derived:":[77],"statistical":[78,133],"descriptors":[79],"that":[80,86,124,154],"support":[81],"interpretability":[82],"CNN-based":[84],"features":[85],"spatial":[88],"patterns.":[91],"The":[92,120],"proposed":[93],"framework":[94],"evaluated":[96],"K-Nearest":[98],"Neighbors,":[99],"Support":[100],"Vector":[101],"Machines,":[102],"XGBoost,":[103],"ensemble":[105],"voting":[106],"classifiers":[107],"across":[108],"24":[109],"experimental":[110,121],"configurations,":[111],"considering":[112],"different":[113],"sequence":[114],"lengths":[115],"extraction":[118],"strategies.":[119],"results":[122],"indicate":[123],"models,":[128],"particularly":[129],"XGBoost":[130],"features,":[135],"achieve":[136],"strong":[137],"performance":[138],"in":[139],"14-class":[141],"task,":[144],"accuracy":[146],"F1-score":[148],"exceeding":[149],"0.98.":[150],"These":[151],"findings":[152],"demonstrate":[153],"carefully":[155],"designed":[156],"representations,":[158],"when":[159],"paired":[160],"well-established":[162],"classifiers,":[163],"can":[164],"provide":[165],"an":[166],"effective":[167],"computationally":[169],"efficient":[170],"solution":[171],"practical":[173],"scenarios.":[177]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2026-03-17T00:00:00"}
