{"id":"https://openalex.org/W4205813740","doi":"https://doi.org/10.1109/acit53391.2021.9677338","title":"Network Intrusion Detection with StackNet: A phi coefficient Based Weak Learner Selection Approach","display_name":"Network Intrusion Detection with StackNet: A phi coefficient Based Weak Learner Selection Approach","publication_year":2021,"publication_date":"2021-12-21","ids":{"openalex":"https://openalex.org/W4205813740","doi":"https://doi.org/10.1109/acit53391.2021.9677338"},"language":"en","primary_location":{"id":"doi:10.1109/acit53391.2021.9677338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit53391.2021.9677338","pdf_url":null,"source":{"id":"https://openalex.org/S4363608487","display_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019060398","display_name":"Isaac Kofi Nti","orcid":"https://orcid.org/0000-0001-9257-4295"},"institutions":[{"id":"https://openalex.org/I291863076","display_name":"University of Energy and Natural Resources","ror":"https://ror.org/05r9rzb75","country_code":"GH","type":"education","lineage":["https://openalex.org/I291863076"]}],"countries":["GH"],"is_corresponding":true,"raw_author_name":"Isaac Kofi Nti","raw_affiliation_strings":["University of Energy and Natural Resources,Department of Computer Science and Informatics,Sunyani,Ghana","Department of Computer Science and Informatics, University of Energy and Natural Resources, Sunyani, Ghana"],"affiliations":[{"raw_affiliation_string":"University of Energy and Natural Resources,Department of Computer Science and Informatics,Sunyani,Ghana","institution_ids":["https://openalex.org/I291863076"]},{"raw_affiliation_string":"Department of Computer Science and Informatics, University of Energy and Natural Resources, Sunyani, Ghana","institution_ids":["https://openalex.org/I291863076"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076595419","display_name":"Owusu Nyarko\u2010Boateng","orcid":"https://orcid.org/0000-0003-0300-2469"},"institutions":[{"id":"https://openalex.org/I291863076","display_name":"University of Energy and Natural Resources","ror":"https://ror.org/05r9rzb75","country_code":"GH","type":"education","lineage":["https://openalex.org/I291863076"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Owusu Nyarko-Boateng","raw_affiliation_strings":["University of Energy and Natural Resources,Department of Computer Science and Informatics,Sunyani,Ghana","Department of Computer Science and Informatics, University of Energy and Natural Resources, Sunyani, Ghana"],"affiliations":[{"raw_affiliation_string":"University of Energy and Natural Resources,Department of Computer Science and Informatics,Sunyani,Ghana","institution_ids":["https://openalex.org/I291863076"]},{"raw_affiliation_string":"Department of Computer Science and Informatics, University of Energy and Natural Resources, Sunyani, Ghana","institution_ids":["https://openalex.org/I291863076"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064291326","display_name":"Adebayo Felix Adekoya","orcid":"https://orcid.org/0000-0002-5029-2393"},"institutions":[{"id":"https://openalex.org/I291863076","display_name":"University of Energy and Natural Resources","ror":"https://ror.org/05r9rzb75","country_code":"GH","type":"education","lineage":["https://openalex.org/I291863076"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Adebayo Felix Adekoya","raw_affiliation_strings":["University of Energy and Natural Resources,Department of Computer Science and Informatics,Sunyani,Ghana","Department of Computer Science and Informatics, University of Energy and Natural Resources, Sunyani, Ghana"],"affiliations":[{"raw_affiliation_string":"University of Energy and Natural Resources,Department of Computer Science and Informatics,Sunyani,Ghana","institution_ids":["https://openalex.org/I291863076"]},{"raw_affiliation_string":"Department of Computer Science and Informatics, University of Energy and Natural Resources, Sunyani, Ghana","institution_ids":["https://openalex.org/I291863076"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112896666","display_name":"R. Arjun","orcid":"https://orcid.org/0009-0004-8478-5366"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R Arjun","raw_affiliation_strings":["Vellore Institute of Technology,School of Computer Science and Engineering,Vellore,India,632 014","School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology,School of Computer Science and Engineering,Vellore,India,632 014","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5019060398"],"corresponding_institution_ids":["https://openalex.org/I291863076"],"apc_list":null,"apc_paid":null,"fwci":0.924,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68151281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8092374801635742},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7632534503936768},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6326284408569336},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5633270740509033},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5486541390419006},{"id":"https://openalex.org/keywords/matthews-correlation-coefficient","display_name":"Matthews correlation coefficient","score":0.5257129073143005},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.49861693382263184},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.466220885515213},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4616388976573944},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4467080235481262},{"id":"https://openalex.org/keywords/correlation","display_name":"Correlation","score":0.43213126063346863},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.14039930701255798},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08694544434547424}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8092374801635742},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7632534503936768},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6326284408569336},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5633270740509033},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5486541390419006},{"id":"https://openalex.org/C164085508","wikidata":"https://www.wikidata.org/wiki/Q4811327","display_name":"Matthews correlation coefficient","level":3,"score":0.5257129073143005},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49861693382263184},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.466220885515213},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4616388976573944},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4467080235481262},{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.43213126063346863},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.14039930701255798},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08694544434547424},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit53391.2021.9677338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit53391.2021.9677338","pdf_url":null,"source":{"id":"https://openalex.org/S4363608487","display_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.6899999976158142,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W28412257","https://openalex.org/W42722137","https://openalex.org/W162522237","https://openalex.org/W1679074130","https://openalex.org/W2085618569","https://openalex.org/W2125194875","https://openalex.org/W2139669429","https://openalex.org/W2168755630","https://openalex.org/W2291532640","https://openalex.org/W2578505644","https://openalex.org/W2602509076","https://openalex.org/W2724268118","https://openalex.org/W2775103799","https://openalex.org/W2783380896","https://openalex.org/W2886793380","https://openalex.org/W2889320515","https://openalex.org/W2891280833","https://openalex.org/W2893123663","https://openalex.org/W2902087014","https://openalex.org/W2913997948","https://openalex.org/W2920449071","https://openalex.org/W2969792674","https://openalex.org/W2971797472","https://openalex.org/W2979777156","https://openalex.org/W2987177413","https://openalex.org/W2994866269","https://openalex.org/W3002193070","https://openalex.org/W3004778666","https://openalex.org/W3005630930","https://openalex.org/W3005805195","https://openalex.org/W3009422166","https://openalex.org/W3013734981","https://openalex.org/W3014732532","https://openalex.org/W3016889527","https://openalex.org/W3017217726","https://openalex.org/W3026226589","https://openalex.org/W3034039006","https://openalex.org/W3034448881","https://openalex.org/W3034608746","https://openalex.org/W3042029410","https://openalex.org/W3044563643","https://openalex.org/W3044853528","https://openalex.org/W3045215350","https://openalex.org/W3047132966","https://openalex.org/W3047446736","https://openalex.org/W3047945431","https://openalex.org/W3048313003","https://openalex.org/W3080177360","https://openalex.org/W3082172267","https://openalex.org/W3101894954","https://openalex.org/W3107422599","https://openalex.org/W3109157956","https://openalex.org/W3110245168","https://openalex.org/W3110280350","https://openalex.org/W3115025749","https://openalex.org/W3119693685","https://openalex.org/W3121117407","https://openalex.org/W3161976747","https://openalex.org/W3166798539","https://openalex.org/W4242281216","https://openalex.org/W4287776057","https://openalex.org/W6606645873","https://openalex.org/W6732703524","https://openalex.org/W6778235376","https://openalex.org/W6786539988"],"related_works":["https://openalex.org/W4281560664","https://openalex.org/W4282839226","https://openalex.org/W4316087365","https://openalex.org/W4249229055","https://openalex.org/W4293069612","https://openalex.org/W4375930479","https://openalex.org/W4318350883","https://openalex.org/W4322744035","https://openalex.org/W4283016678","https://openalex.org/W4205813740"],"abstract_inverted_index":{"Network":[0],"intrusion":[1,26,60,109,148,212],"detection":[2,61,149,213],"is":[3,35,42],"a":[4,29,84,102,175],"subject":[5],"of":[6,32,75,97,126,178],"great":[7],"concern":[8],"as":[9],"technology":[10],"advances.":[11],"Ensemble":[12],"models":[13,138],"that":[14,170],"put":[15],"together":[16],"many":[17,52],"base":[18,33,70,127],"learners":[19,34,71],"have":[20,65],"been":[21],"widely":[22],"used":[23,145],"to":[24,72,92,116],"advance":[25,93],"detection.":[27,110],"Nevertheless,":[28],"random":[30],"collection":[31],"challenging.":[36],"The":[37,161],"Matthews":[38],"correlation":[39],"coefficient":[40],"(MCC)":[41],"an":[43,208],"effective":[44],"measure":[45],"for":[46,107],"detecting":[47],"associations":[48],"between":[49,120],"variables":[50],"in":[51,58,68,146],"fields;":[53],"however,":[54],"very":[55],"few":[56],"studies":[57,64],"network":[59,108,147,182],"and":[62,124,139,157,203,210],"ensemble":[63,99,137],"applied":[66],"MCC":[67,90],"selecting":[69],"the":[73,76,89,94,98,112,118,121,171,188],"best":[74],"authors\u2019":[77],"knowledge.":[78],"In":[79],"this":[80],"paper,":[81],"we":[82],"propose":[83],"correlation-based":[85],"classifier":[86],"selection":[87],"using":[88],"technique":[91],"classification":[95],"performance":[96],"model":[100,114,173],"under":[101],"StackNet":[103],"strategy":[104],"(named":[105],"MCC-Stacknet)":[106],"Specifically,":[111],"MCC-StackNet":[113,133,172,207],"sought":[115],"improve":[117],"association":[119],"prediction":[122],"accuracy":[123,186],"diversity":[125],"classifiers.":[128],"We":[129],"compare":[130],"our":[131],"proposed":[132],"with":[134,164],"five":[135],"other":[136],"two":[140],"stand-alone":[141],"state-of-the-art":[142],"classifiers":[143],"commonly":[144],"based":[150],"on":[151],"accuracy,":[152],"AUC,":[153],"recall,":[154],"precision,":[155],"F1-score":[156],"Kappa":[158],"evaluation":[159],"metrics.":[160],"experimental":[162],"results":[163],"open-source":[165],"data":[166],"from":[167],"Kaggle":[168],"show":[169],"has":[174],"higher":[176],"probability":[177],"correctly":[179],"identifying":[180],"unauthorised":[181],"traffic":[183],"at":[184],"99.73%":[185],"than":[187],"Xgboost":[189],"(97.61%),":[190],"Catboost":[191],"(97.49%),":[192],"LightGMB":[193],"(%),":[194],"GBC":[195],"(97.63%),":[196],"RF":[197],"(97.97%),":[198],"ET":[199],"(95.82%),":[200],"DT":[201],"(96.95%)":[202],"KNN":[204],"(95.56),":[205],"making":[206],"efficient":[209],"better":[211],"model.":[214]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
