{"id":"https://openalex.org/W2154376209","doi":"https://doi.org/10.1109/aina.2003.1192972","title":"Intrusion Detection Systems: technology and development","display_name":"Intrusion Detection Systems: technology and development","publication_year":2003,"publication_date":"2003-12-22","ids":{"openalex":"https://openalex.org/W2154376209","doi":"https://doi.org/10.1109/aina.2003.1192972","mag":"2154376209"},"language":"en","primary_location":{"id":"doi:10.1109/aina.2003.1192972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2003.1192972","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009438377","display_name":"Yujing Bai","orcid":"https://orcid.org/0000-0003-2195-4551"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I104946051","display_name":"Nihon University","ror":"https://ror.org/05jk51a88","country_code":"JP","type":"education","lineage":["https://openalex.org/I104946051"]}],"countries":["CN","JP"],"is_corresponding":true,"raw_author_name":"Y. Bai","raw_affiliation_strings":["Beihang University, China","Nihon University, Japan"],"affiliations":[{"raw_affiliation_string":"Beihang University, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"Nihon University, Japan","institution_ids":["https://openalex.org/I104946051"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005824874","display_name":"Hiroki Kobayashi","orcid":"https://orcid.org/0000-0002-9674-0374"},"institutions":[{"id":"https://openalex.org/I104946051","display_name":"Nihon University","ror":"https://ror.org/05jk51a88","country_code":"JP","type":"education","lineage":["https://openalex.org/I104946051"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"H. Kobayashi","raw_affiliation_strings":["Nihon University, Japan"],"affiliations":[{"raw_affiliation_string":"Nihon University, Japan","institution_ids":["https://openalex.org/I104946051"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009438377"],"corresponding_institution_ids":["https://openalex.org/I104946051","https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":2.8329,"has_fulltext":false,"cited_by_count":101,"citation_normalized_percentile":{"value":0.92405533,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"710","last_page":"715"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.857265830039978},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.7920984029769897},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.707729697227478},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6166094541549683},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5443782806396484},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.5155032277107239},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.465553343296051}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.857265830039978},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.7920984029769897},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.707729697227478},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6166094541549683},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5443782806396484},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.5155032277107239},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.465553343296051},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aina.2003.1192972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2003.1192972","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1500501810","https://openalex.org/W1583975142","https://openalex.org/W1972062587","https://openalex.org/W2103042216","https://openalex.org/W2124365372","https://openalex.org/W2131963831","https://openalex.org/W2147840338","https://openalex.org/W2967372837","https://openalex.org/W6634829514","https://openalex.org/W6679351333"],"related_works":["https://openalex.org/W3105682467","https://openalex.org/W1583975142","https://openalex.org/W2150847526","https://openalex.org/W2142889610","https://openalex.org/W2126345423","https://openalex.org/W2107409339","https://openalex.org/W1994212840","https://openalex.org/W1884606608","https://openalex.org/W1674877186","https://openalex.org/W2735019208","https://openalex.org/W2345595457","https://openalex.org/W2682214335","https://openalex.org/W2073828460","https://openalex.org/W2756301141","https://openalex.org/W3170956352","https://openalex.org/W3207920586","https://openalex.org/W3160027800","https://openalex.org/W122712303","https://openalex.org/W1807157444","https://openalex.org/W2945965099"],"abstract_inverted_index":{"Attacks":[0],"on":[1,54,73],"network":[2,9,50],"infrastructure":[3],"presently":[4],"are":[5,81,103,118],"main":[6,67],"threats":[7],"against":[8,39],"and":[10,45,77,97,114],"information":[11],"security.":[12,51],"With":[13],"rapidly":[14],"growing":[15],"unauthorized":[16],"activities":[17],"in":[18,59,86],"networks,":[19],"intrusion":[20,74],"detection":[21,75],"(ID)":[22],"as":[23,90],"a":[24],"component":[25],"of":[26,49,69],"defense-in-depth":[27],"is":[28,42,57,63],"very":[29],"necessary":[30],"because":[31],"traditional":[32],"firewall":[33],"techniques":[34,76,80],"cannot":[35],"provide":[36],"complete":[37],"protection":[38],"intrusion.":[40],"ID":[41,55,70,87,95,101,107],"an":[43],"active":[44],"important":[46],"research":[47],"area":[48],"A":[52],"survey":[53],"technology":[56,108],"shown":[58],"this":[60],"paper.":[61],"It":[62],"involved":[64],"with":[65],"several":[66],"aspects":[68],"technology.":[71],"Analyses":[72],"data":[78,92,98],"collection":[79],"emphasized.":[82],"Some":[83],"novel":[84],"developments":[85],"Systems,":[88],"such":[89],"both":[91],"mining":[93],"based":[94,100],"systems":[96],"fusion":[99],"systems,":[102],"also":[104],"discussed.":[105],"Current":[106],"faces":[109],"powerful":[110],"challenges,":[111],"major":[112],"challenges":[113],"future":[115],"promising":[116],"directions":[117],"presented.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":12},{"year":2012,"cited_by_count":10}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
