{"id":"https://openalex.org/W4391769265","doi":"https://doi.org/10.1109/ccwc60891.2024.10427810","title":"Next-Generation Reservoir Computing (NG-RC) Machine Learning Model for Advanced Cybersecurity","display_name":"Next-Generation Reservoir Computing (NG-RC) Machine Learning Model for Advanced Cybersecurity","publication_year":2024,"publication_date":"2024-01-08","ids":{"openalex":"https://openalex.org/W4391769265","doi":"https://doi.org/10.1109/ccwc60891.2024.10427810"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc60891.2024.10427810","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccwc60891.2024.10427810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022317738","display_name":"Andre Slonopas","orcid":"https://orcid.org/0000-0002-9128-9553"},"institutions":[{"id":"https://openalex.org/I23821868","display_name":"American Public University System","ror":"https://ror.org/02890tv09","country_code":"US","type":"education","lineage":["https://openalex.org/I23821868"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andre Slonopas","raw_affiliation_strings":["American Public University Sysytem (APUS),Department of Cybersecurity,Charles Town,WV","Department of Cybersecurity, American Public University Sysytem (APUS), Charles Town, WV"],"affiliations":[{"raw_affiliation_string":"American Public University Sysytem (APUS),Department of Cybersecurity,Charles Town,WV","institution_ids":["https://openalex.org/I23821868"]},{"raw_affiliation_string":"Department of Cybersecurity, American Public University Sysytem (APUS), Charles Town, WV","institution_ids":["https://openalex.org/I23821868"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109043064","display_name":"Harry Cooper","orcid":null},"institutions":[{"id":"https://openalex.org/I23821868","display_name":"American Public University System","ror":"https://ror.org/02890tv09","country_code":"US","type":"education","lineage":["https://openalex.org/I23821868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Harry Cooper","raw_affiliation_strings":["American Public University Sysytem (APUS),Department of Cybersecurity,Charles Town,WV","Department of Cybersecurity, American Public University Sysytem (APUS), Charles Town, WV"],"affiliations":[{"raw_affiliation_string":"American Public University Sysytem (APUS),Department of Cybersecurity,Charles Town,WV","institution_ids":["https://openalex.org/I23821868"]},{"raw_affiliation_string":"Department of Cybersecurity, American Public University Sysytem (APUS), Charles Town, WV","institution_ids":["https://openalex.org/I23821868"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5093917811","display_name":"Elliott Lynn","orcid":null},"institutions":[{"id":"https://openalex.org/I23821868","display_name":"American Public University System","ror":"https://ror.org/02890tv09","country_code":"US","type":"education","lineage":["https://openalex.org/I23821868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elliott Lynn","raw_affiliation_strings":["American Public University Sysytem (APUS),Department of Cybersecurity,Charles Town,WV","Department of Cybersecurity, American Public University Sysytem (APUS), Charles Town, WV"],"affiliations":[{"raw_affiliation_string":"American Public University Sysytem (APUS),Department of Cybersecurity,Charles Town,WV","institution_ids":["https://openalex.org/I23821868"]},{"raw_affiliation_string":"Department of Cybersecurity, American Public University Sysytem (APUS), Charles Town, WV","institution_ids":["https://openalex.org/I23821868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022317738"],"corresponding_institution_ids":["https://openalex.org/I23821868"],"apc_list":null,"apc_paid":null,"fwci":0.7274,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72697794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"16","issue":null,"first_page":"0014","last_page":"0021"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12611","display_name":"Neural Networks and Reservoir Computing","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12611","display_name":"Neural Networks and Reservoir Computing","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9690999984741211,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7951393127441406},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7300339341163635},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6312318444252014},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6272299289703369},{"id":"https://openalex.org/keywords/reservoir-computing","display_name":"Reservoir computing","score":0.5592764019966125},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46700891852378845},{"id":"https://openalex.org/keywords/train","display_name":"Train","score":0.4654195308685303},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44548267126083374},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.43117669224739075},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.426257461309433},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4121493101119995},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3921133577823639},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3541645109653473},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33098018169403076},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.2267145812511444},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19563806056976318},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.15148800611495972}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7951393127441406},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7300339341163635},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6312318444252014},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6272299289703369},{"id":"https://openalex.org/C135796866","wikidata":"https://www.wikidata.org/wiki/Q7315328","display_name":"Reservoir computing","level":4,"score":0.5592764019966125},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46700891852378845},{"id":"https://openalex.org/C190839683","wikidata":"https://www.wikidata.org/wiki/Q2448197","display_name":"Train","level":2,"score":0.4654195308685303},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44548267126083374},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.43117669224739075},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.426257461309433},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4121493101119995},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3921133577823639},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3541645109653473},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33098018169403076},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2267145812511444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19563806056976318},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.15148800611495972},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc60891.2024.10427810","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccwc60891.2024.10427810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2123222757","https://openalex.org/W2203714058","https://openalex.org/W2612932631","https://openalex.org/W2765128778","https://openalex.org/W2788043262","https://openalex.org/W2808720320","https://openalex.org/W2918639172","https://openalex.org/W2964937598","https://openalex.org/W2977331641","https://openalex.org/W2981025625","https://openalex.org/W2992151920","https://openalex.org/W3001275383","https://openalex.org/W3035923830","https://openalex.org/W3036484052","https://openalex.org/W3097529015","https://openalex.org/W3097652319","https://openalex.org/W3105585588","https://openalex.org/W3108671495","https://openalex.org/W3108827348","https://openalex.org/W3123421154","https://openalex.org/W3170977978","https://openalex.org/W3185076287","https://openalex.org/W3198954758","https://openalex.org/W3201489801","https://openalex.org/W4210358464","https://openalex.org/W4226206258","https://openalex.org/W4232266924","https://openalex.org/W4283313119","https://openalex.org/W4320157905","https://openalex.org/W4386398005","https://openalex.org/W6678521640"],"related_works":["https://openalex.org/W3192662224","https://openalex.org/W4389072666","https://openalex.org/W2887258823","https://openalex.org/W4300888463","https://openalex.org/W2161225422","https://openalex.org/W2358069691","https://openalex.org/W4367591269","https://openalex.org/W4281398169","https://openalex.org/W2992161509","https://openalex.org/W3027216454"],"abstract_inverted_index":{"Preventing":[0],"and":[1,14,23,56,59,102,125,137,150,191],"mitigating":[2],"cyberattacks":[3],"requires":[4],"precise":[5],"network":[6,43,73,93,119,181],"anomaly":[7,17,45],"detection.":[8,46],"Due":[9],"to":[10,75,85,100,166,193],"cyber":[11],"threats'":[12],"dynamic":[13],"complexity,":[15],"traditional":[16],"detection":[18],"systems":[19,186],"need":[20],"more":[21],"flexible":[22],"intelligent":[24],"methods.":[25],"This":[26,174],"paper":[27],"offers":[28],"an":[29],"enhanced":[30],"use":[31],"of":[32,71,80],"Next-Generation":[33],"Reservoir":[34],"Computing":[35],"(NG-RC)":[36],"with":[37,121,138],"Nonlinear":[38],"Vector":[39],"Auto-regression":[40],"(NVAR)":[41],"for":[42,110],"traffic":[44,81,94,123],"NG-RC":[47,66,97,115,130,143],"overcomes":[48],"reservoir":[49],"computing's":[50],"constraints":[51],"by":[52,183],"removing":[53],"random":[54],"matrices":[55],"decreasing":[57],"meta-parameters":[58],"training":[60],"data.":[61],"Our":[62],"method":[63],"trains":[64],"the":[65,96,114,163,167],"model":[67,79,116],"on":[68,117],"a":[69,77,177],"dataset":[70],"typical":[72],"activity":[74],"create":[76],"predictive":[78],"patterns,":[82,95,170],"allowing":[83],"it":[84,108],"detect":[86],"security":[87,182],"breaches.":[88],"To":[89],"quickly":[90],"discover":[91],"unexpected":[92],"model's":[98,144],"ability":[99],"learn":[101],"forecast":[103],"complicated":[104],"time-series":[105],"data":[106],"makes":[107],"ideal":[109],"monitoring.":[111],"We":[112,127],"validated":[113],"several":[118],"situations":[120],"varying":[122],"sizes":[124],"kinds.":[126],"found":[128],"that":[129,187],"detects":[131],"abnormalities":[132],"faster":[133],"than":[134],"standard":[135],"models":[136],"fewer":[139],"false":[140],"positives.":[141],"The":[142],"computational":[145],"efficiency":[146],"allows":[147],"real-time":[148],"analysis":[149],"detection,":[151],"critical":[152],"in":[153,180,195],"operational":[154],"contexts":[155],"where":[156],"speed":[157],"is":[158],"vital.":[159],"Continuous":[160],"learning":[161],"lets":[162],"system":[164],"adapt":[165],"network's":[168],"changing":[169],"assuring":[171],"long-term":[172],"performance.":[173],"study":[175],"suggests":[176],"significant":[178],"enhancement":[179],"leveraging":[184],"autonomous":[185],"can":[188],"detect,":[189],"forecast,":[190],"react":[192],"cyber-attacks":[194],"real-time.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
