{"id":"https://openalex.org/W4313546833","doi":"https://doi.org/10.1109/acit57182.2022.9994119","title":"Insiders Detection in the Uncertain IoD using Fuzzy Logic","display_name":"Insiders Detection in the Uncertain IoD using Fuzzy Logic","publication_year":2022,"publication_date":"2022-11-22","ids":{"openalex":"https://openalex.org/W4313546833","doi":"https://doi.org/10.1109/acit57182.2022.9994119"},"language":"en","primary_location":{"id":"doi:10.1109/acit57182.2022.9994119","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit57182.2022.9994119","pdf_url":null,"source":{"id":"https://openalex.org/S4363608405","display_name":"2022 International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075091985","display_name":"Sihem Benfriha","orcid":"https://orcid.org/0000-0002-4669-6053"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sihem Benfriha","raw_affiliation_strings":["STIC Laboratorv"],"affiliations":[{"raw_affiliation_string":"STIC Laboratorv","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016476518","display_name":"Nabila Labraoui","orcid":"https://orcid.org/0000-0002-5135-8972"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nabila Labraoui","raw_affiliation_strings":["LRIT Laboratory"],"affiliations":[{"raw_affiliation_string":"LRIT Laboratory","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075091985"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6665,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.87132052,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7800910472869873},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6418679356575012},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6202415823936462},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6123039722442627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5891338586807251},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.5243014097213745},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.5115790963172913},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4371459484100342},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4331715703010559},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4154670834541321},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17969819903373718},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13596579432487488},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11794278025627136}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7800910472869873},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6418679356575012},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6202415823936462},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6123039722442627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5891338586807251},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.5243014097213745},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.5115790963172913},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4371459484100342},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4331715703010559},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4154670834541321},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17969819903373718},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13596579432487488},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11794278025627136},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit57182.2022.9994119","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit57182.2022.9994119","pdf_url":null,"source":{"id":"https://openalex.org/S4363608405","display_name":"2022 International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W33933511","https://openalex.org/W1836048184","https://openalex.org/W2229747717","https://openalex.org/W2315113356","https://openalex.org/W2508925649","https://openalex.org/W2565233589","https://openalex.org/W2802144941","https://openalex.org/W2805895412","https://openalex.org/W2885821533","https://openalex.org/W2986499130","https://openalex.org/W3018785029","https://openalex.org/W3035044663","https://openalex.org/W3048796162","https://openalex.org/W3097308740","https://openalex.org/W3127169628","https://openalex.org/W3142822491","https://openalex.org/W4282596923","https://openalex.org/W4377007801","https://openalex.org/W6756088261"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W2605096541","https://openalex.org/W3200286695","https://openalex.org/W4386322305"],"abstract_inverted_index":{"Unmanned":[0],"aerial":[1],"vehicles":[2],"(UAVs)":[3],"and":[4,47,54,57,92,135,155,179],"various":[5,86],"network":[6,24],"entities":[7],"deployed":[8],"on":[9],"the":[10,18,143],"ground":[11],"can":[12,78],"communicate":[13],"with":[14,113],"each":[15],"other":[16,114],"over":[17],"Internet":[19],"of":[20,40,52,175,181],"Drones":[21],"(IoD),":[22],"a":[23,37,98,106,122],"architecture":[25],"designed":[26],"expressly":[27],"to":[28,64,71,81,101,162],"allow":[29],"communications":[30],"between":[31],"heterogenous":[32],"entities.":[33],"Drone":[34],"technology":[35],"has":[36],"wide":[38],"range":[39],"uses,":[41],"including":[42],"on-demand":[43],"package":[44],"delivery,":[45],"traffic":[46],"wild":[48],"life":[49],"surveillance,":[50],"inspection":[51],"infrastructure":[53],"search,":[55],"rescue":[56],"agriculture.":[58],"However,":[59],"IoD":[60],"systems":[61],"are":[62],"vulnerable":[63],"numerous":[65],"attacks,":[66],"The":[67],"main":[68],"goal":[69],"is":[70,97,110,159,171],"develop":[72],"an":[73,126],"all-encompassing":[74],"security":[75,83,115],"model":[76],"that":[77,168],"be":[79],"used":[80],"analyze":[82],"concerns":[84],"in":[85,160,173],"UAV-based":[87],"systems.":[88],"With":[89],"exceptional":[90],"flexibility":[91],"increasing":[93],"efficiency,":[94],"trust":[95,134,149,154],"management":[96],"promising":[99],"alternative":[100],"traditional":[102],"detection":[103],"methods.":[104],"In":[105,117],"heterogeneous":[107],"environment,":[108],"it":[109],"also":[111],"compatible":[112],"mechanisms.":[116],"this":[118],"article,":[119],"we":[120],"present":[121],"fuzzy":[123],"logic":[124],"as":[125],"Insider":[127],"Detection":[128],"technique":[129],"which":[130],"calculate":[131],"sensor":[132],"data":[133],"assessing":[136],"node":[137],"behavior.":[138],"To":[139],"build":[140],"confidence":[141],"throughout":[142],"entire":[144],"IoD,":[145],"our":[146,169],"proposal":[147],"divides":[148],"into":[150],"two":[151],"parts:":[152],"Data":[153],"Node":[156],"trust.":[157],"This":[158],"contrast":[161],"earlier":[163],"models.":[164],"Experimental":[165],"results":[166],"show":[167],"solution":[170],"effective":[172],"terms":[174],"False":[176],"positive":[177],"ratio":[178],"Average":[180],"end-to-end":[182],"delay.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
