{"id":"https://openalex.org/W3090290354","doi":"https://doi.org/10.1007/s11042-020-09916-0","title":"Data mining tools -a case study for network intrusion detection","display_name":"Data mining tools -a case study for network intrusion detection","publication_year":2020,"publication_date":"2020-10-02","ids":{"openalex":"https://openalex.org/W3090290354","doi":"https://doi.org/10.1007/s11042-020-09916-0","mag":"3090290354"},"language":"en","primary_location":{"id":"doi:10.1007/s11042-020-09916-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-020-09916-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-020-09916-0.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11042-020-09916-0.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101415939","display_name":"Soodeh Hosseini","orcid":"https://orcid.org/0000-0003-1495-3833"},"institutions":[{"id":"https://openalex.org/I115566878","display_name":"Shahid Bahonar University of Kerman","ror":"https://ror.org/04zn42r77","country_code":"IR","type":"education","lineage":["https://openalex.org/I115566878"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Soodeh Hosseini","raw_affiliation_strings":["Department of Computer Science, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran","Mahani Mathematical Research Center, Shahid Bahonar University of Kerman, Kerman, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran","institution_ids":["https://openalex.org/I115566878"]},{"raw_affiliation_string":"Mahani Mathematical Research Center, Shahid Bahonar University of Kerman, Kerman, Iran","institution_ids":["https://openalex.org/I115566878"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044634004","display_name":"Saman Rafiee Sardo","orcid":"https://orcid.org/0000-0003-3861-2013"},"institutions":[{"id":"https://openalex.org/I115566878","display_name":"Shahid Bahonar University of Kerman","ror":"https://ror.org/04zn42r77","country_code":"IR","type":"education","lineage":["https://openalex.org/I115566878"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Saman Rafiee Sardo","raw_affiliation_strings":["Department of Computer Science, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran","institution_ids":["https://openalex.org/I115566878"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101415939"],"corresponding_institution_ids":["https://openalex.org/I115566878"],"apc_list":null,"apc_paid":null,"fwci":2.7751,"has_fulltext":true,"cited_by_count":27,"citation_normalized_percentile":{"value":0.91004767,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"80","issue":"4","first_page":"4999","last_page":"5019"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8825891613960266},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5359362363815308},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5342162251472473},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5294943451881409},{"id":"https://openalex.org/keywords/ibm","display_name":"IBM","score":0.5111895203590393},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.457621693611145},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.44347286224365234},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43888571858406067}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8825891613960266},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5359362363815308},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5342162251472473},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5294943451881409},{"id":"https://openalex.org/C70388272","wikidata":"https://www.wikidata.org/wiki/Q5968558","display_name":"IBM","level":2,"score":0.5111895203590393},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.457621693611145},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.44347286224365234},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43888571858406067},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11042-020-09916-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-020-09916-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-020-09916-0.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s11042-020-09916-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-020-09916-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-020-09916-0.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3090290354.pdf","grobid_xml":"https://content.openalex.org/works/W3090290354.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1727039439","https://openalex.org/W1793209788","https://openalex.org/W1937068078","https://openalex.org/W1975415766","https://openalex.org/W1978760769","https://openalex.org/W1979900513","https://openalex.org/W1983479840","https://openalex.org/W1988918299","https://openalex.org/W2000190989","https://openalex.org/W2048267917","https://openalex.org/W2068438324","https://openalex.org/W2099940443","https://openalex.org/W2100253618","https://openalex.org/W2101234009","https://openalex.org/W2104694082","https://openalex.org/W2122496402","https://openalex.org/W2127282486","https://openalex.org/W2135511047","https://openalex.org/W2177019876","https://openalex.org/W2182722412","https://openalex.org/W2472149534","https://openalex.org/W2595969138","https://openalex.org/W2898543370","https://openalex.org/W2963267652","https://openalex.org/W2974538082","https://openalex.org/W2986055611","https://openalex.org/W2999323915","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3126131865","https://openalex.org/W2044344400","https://openalex.org/W4253186488","https://openalex.org/W1996938127","https://openalex.org/W2043380045","https://openalex.org/W4231814374","https://openalex.org/W2364419519","https://openalex.org/W2017948608","https://openalex.org/W2360767377","https://openalex.org/W2360951146"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,36,43,53,107,110,135],"growth":[3],"of":[4,35,39,45,68,101,109,114,117,119,137],"data":[5,46,78,120],"mining":[6,47,79,121],"and":[7,76,80,94,112,122,148],"machine":[8,81,123],"learning":[9,82],"approaches":[10],"in":[11,106,141],"recent":[12],"years,":[13],"many":[14],"efforts":[15,41],"have":[16],"been":[17],"made":[18],"to":[19,51,96],"generalize":[20],"these":[21,32,40,102],"sciences":[22],"so":[23,57],"that":[24,49,58],"researchers":[25,56],"from":[26,55],"any":[27,66],"field":[28],"can":[29,60],"easily":[30],"utilize":[31],"sciences.":[33],"One":[34],"most":[37],"important":[38],"is":[42,72],"development":[44],"tools":[48,83],"try":[50],"hide":[52],"complexities":[54,111],"they":[59],"achieve":[61],"a":[62,128],"professional":[63],"output":[64],"with":[65,145,150],"level":[67],"knowledge.":[69],"This":[70],"paper":[71,133],"focused":[73],"on":[74],"reviewing":[75],"comparing":[77],"including":[84],"WEKA,":[85],"KNIME,":[86],"Keel,":[87],"Orange,":[88],"Azure,":[89],"IBM":[90],"SPSS":[91],"Modeler,":[92],"R":[93],"Scikit-Learn":[95,149],"show":[97],"what":[98],"approach":[99],"each":[100],"methods":[103],"has":[104],"taken":[105],"face":[108],"problems":[113],"different":[115],"scenarios":[116],"generalization":[118],"learning.":[124],"In":[125],"addition,":[126],"for":[127],"more":[129],"detailed":[130],"review,":[131],"this":[132],"examines":[134],"challenge":[136],"network":[138],"intrusion":[139],"detection":[140],"two":[142],"tools,":[143],"Knime":[144],"graphical":[146],"interface":[147],"coding":[151],"environment.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
