{"id":"https://openalex.org/W2491009237","doi":"https://doi.org/10.1109/aiccsa.2015.7507112","title":"Intrusion detection based on Neuro-Fuzzy classification","display_name":"Intrusion detection based on Neuro-Fuzzy classification","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2491009237","doi":"https://doi.org/10.1109/aiccsa.2015.7507112","mag":"2491009237"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa.2015.7507112","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2015.7507112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009382117","display_name":"Imen Gaied","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Imen Gaied","raw_affiliation_strings":["Modeling of Automated Reasoning (MARS), Tunisia, Monastir"],"affiliations":[{"raw_affiliation_string":"Modeling of Automated Reasoning (MARS), Tunisia, Monastir","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083073132","display_name":"Farah Jemili","orcid":"https://orcid.org/0000-0001-7511-1221"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Farah Jemili","raw_affiliation_strings":["ISITCOM Hammam Sousse, Tunisia, Monastir"],"affiliations":[{"raw_affiliation_string":"ISITCOM Hammam Sousse, Tunisia, Monastir","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085758758","display_name":"Ouajdi Korbaa","orcid":"https://orcid.org/0000-0003-4462-1805"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ouajdi Korbaa","raw_affiliation_strings":["Modeling of Automated Reasoning (MARS), Tunisia, Monastir"],"affiliations":[{"raw_affiliation_string":"Modeling of Automated Reasoning (MARS), Tunisia, Monastir","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009382117"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.9969,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.88872821,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8326427340507507},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6817925572395325},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6643861532211304},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6204596757888794},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5620037317276001},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5463500618934631},{"id":"https://openalex.org/keywords/neuro-fuzzy","display_name":"Neuro-fuzzy","score":0.5443761348724365},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.542927622795105},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4611940383911133},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.4523254334926605},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.4483807384967804},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4343523383140564},{"id":"https://openalex.org/keywords/adaptive-neuro-fuzzy-inference-system","display_name":"Adaptive neuro fuzzy inference system","score":0.4263285994529724},{"id":"https://openalex.org/keywords/test-data","display_name":"Test data","score":0.42029333114624023},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.26564154028892517},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.23578855395317078}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8326427340507507},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6817925572395325},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6643861532211304},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6204596757888794},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5620037317276001},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5463500618934631},{"id":"https://openalex.org/C29470771","wikidata":"https://www.wikidata.org/wiki/Q4165150","display_name":"Neuro-fuzzy","level":4,"score":0.5443761348724365},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.542927622795105},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4611940383911133},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.4523254334926605},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.4483807384967804},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4343523383140564},{"id":"https://openalex.org/C186108316","wikidata":"https://www.wikidata.org/wiki/Q352530","display_name":"Adaptive neuro fuzzy inference system","level":4,"score":0.4263285994529724},{"id":"https://openalex.org/C16910744","wikidata":"https://www.wikidata.org/wiki/Q7705759","display_name":"Test data","level":2,"score":0.42029333114624023},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.26564154028892517},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23578855395317078},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa.2015.7507112","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2015.7507112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1536559965","https://openalex.org/W1999448603","https://openalex.org/W2003087683","https://openalex.org/W2015401767","https://openalex.org/W2020822564","https://openalex.org/W2030207315","https://openalex.org/W2078155096","https://openalex.org/W2099292440","https://openalex.org/W2099940443","https://openalex.org/W2131970275","https://openalex.org/W2142720090","https://openalex.org/W2155198498","https://openalex.org/W2164117960","https://openalex.org/W2166048520","https://openalex.org/W2185092051","https://openalex.org/W2622768993","https://openalex.org/W2730006550","https://openalex.org/W2992371152","https://openalex.org/W3082269319","https://openalex.org/W3101397573","https://openalex.org/W3140706010","https://openalex.org/W4251199811","https://openalex.org/W6632098109","https://openalex.org/W6783062944","https://openalex.org/W6792273215"],"related_works":["https://openalex.org/W2785395359","https://openalex.org/W1549951490","https://openalex.org/W2247295643","https://openalex.org/W2111426611","https://openalex.org/W1966629635","https://openalex.org/W3159983598","https://openalex.org/W2357953609","https://openalex.org/W2367175432","https://openalex.org/W2374727787","https://openalex.org/W2751094408"],"abstract_inverted_index":{"Computer":[0],"security":[1,191],"is":[2,50,80,91,104,121,136,175,244],"far":[3],"from":[4],"being":[5],"guaranteed":[6],"due":[7,148],"to":[8,29,52,69,142,149],"the":[9,14,20,31,47,71,75,81,88,92,105,109,123,160,164,190,196,223,228,232,251,259,263,273,278],"scalability":[10,165],"of":[11,17,22,36,46,55,84,115,125,128,198],"computer":[12],"networks,":[13],"constant":[15],"evolution":[16],"risks":[18],"and":[19,34,64,87,130,146,226,281,288],"presence":[21],"noisy":[23],"information.":[24],"Several":[25],"solutions":[26],"were":[27],"proposed":[28,102],"ensure":[30],"integrity,":[32],"confidentiality":[33],"availability":[35],"resources,":[37],"including":[38],"intrusion":[39],"detection":[40],"systems":[41],"(IDS).":[42],"The":[43,77,101],"main":[44],"objective":[45,79],"current":[48],"work":[49],"first":[51],"take":[53],"advantage":[54],"data":[56,73],"mining":[57],"techniques":[58],"such":[59],"as":[60,173],"normalization,":[61],"feature":[62],"selection":[63],"eliminating":[65],"redundancies":[66],"in":[67,122,168,201,222,247],"order":[68],"analyze":[70],"huge":[72],"like":[74],"KDDCUP'99.":[76],"second":[78],"learning":[82],"ability":[83],"neural":[85],"networks":[86],"third":[89],"one":[90,252],"fuzzy":[93,118,131],"logic":[94],"reasoning":[95],"that":[96,185,214,218,237],"realizes":[97],"knowledge":[98],"wave":[99],"characters.":[100],"model":[103,107,114,135,180,233,243,280],"Neuro-Fuzzy":[106,264],"precisely":[108],"NEFCLASS":[110,242,279],"(Neuro":[111],"Fuzzy":[112],"Classification)":[113],"a":[116,126,207,266],"generic":[117],"perceptron":[119],"which":[120,285],"form":[124],"combination":[127],"neuron":[129],"system":[132],"networks.":[133],"This":[134],"characterized":[137],"by":[138,177,182,189,231,271],"its":[139,143,150,169],"powerfulness":[140],"thanks":[141],"large":[144],"database":[145,209],"rapidity":[147],"parallel":[151],"architecture.":[152,170],"Moreover,":[153],"it":[154,174],"can":[155],"be":[156],"easily":[157,187],"updated":[158],"through":[159],"re-learning":[161],"process":[162],"following":[163],"potential":[166],"inherited":[167],"As":[171],"well":[172],"distinguished":[176],"an":[178],"intuitive":[179],"presented":[181],"linguistic":[183],"rules":[184],"are":[186,219,286],"understood":[188],"operator.":[192],"To":[193,257],"test":[194,208,213],"out":[195],"adaptability":[197],"our":[199,238],"approach":[200,239],"detecting":[202],"unknown":[203],"attacks":[204,217],"we":[205],"use":[206],",":[210],"namely":[211],"corrected":[212],"contains":[215],"new":[216],"not":[220],"present":[221],"training":[224],"set":[225],"compare":[227],"results":[229],"obtained":[230],"ANFIS.":[234],"We":[235],"prove":[236],"based":[240,253],"on":[241,254],"more":[245],"powerful":[246],"classifying":[248],"intrusions":[249],"than":[250],"ANFIS":[255],"model.":[256],"highlight":[258],"motivation":[260],"for":[261],"using":[262,272],"Classifier,":[265],"comparative":[267],"study":[268],"was":[269],"conducted":[270],"full":[274],"10%":[275],"KDD":[276],"among":[277],"other":[282],"supervised":[283],"classifiers":[284],"ANN":[287],"C5.0.":[289]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
