{"id":"https://openalex.org/W2152106139","doi":"https://doi.org/10.1109/cicybs.2011.5949392","title":"Fuzzy logic based anomaly detection for embedded network security cyber sensor","display_name":"Fuzzy logic based anomaly detection for embedded network security cyber sensor","publication_year":2011,"publication_date":"2011-04-01","ids":{"openalex":"https://openalex.org/W2152106139","doi":"https://doi.org/10.1109/cicybs.2011.5949392","mag":"2152106139"},"language":"en","primary_location":{"id":"doi:10.1109/cicybs.2011.5949392","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2011.5949392","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.osti.gov/biblio/1013712","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052896958","display_name":"Ondrej Linda","orcid":null},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ondrej Linda","raw_affiliation_strings":["University of Idaho, Idaho Falls, ID, USA"],"affiliations":[{"raw_affiliation_string":"University of Idaho, Idaho Falls, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032679061","display_name":"Milos Manic","orcid":"https://orcid.org/0000-0003-1484-7678"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milos Manic","raw_affiliation_strings":["University of Idaho, Idaho Falls, ID, USA"],"affiliations":[{"raw_affiliation_string":"University of Idaho, Idaho Falls, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043432266","display_name":"Todd Vollmer","orcid":"https://orcid.org/0000-0003-1035-8789"},"institutions":[{"id":"https://openalex.org/I2800102766","display_name":"Idaho National Laboratory","ror":"https://ror.org/00ty2a548","country_code":"US","type":"facility","lineage":["https://openalex.org/I1325736334","https://openalex.org/I1330989302","https://openalex.org/I2800102766","https://openalex.org/I2801818860"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Todd Vollmer","raw_affiliation_strings":["Idaho National Laboratory, Idaho Falls, ID, USA"],"affiliations":[{"raw_affiliation_string":"Idaho National Laboratory, Idaho Falls, ID, USA","institution_ids":["https://openalex.org/I2800102766"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023267039","display_name":"Jason L. Wright","orcid":"https://orcid.org/0000-0002-6443-1681"},"institutions":[{"id":"https://openalex.org/I2800102766","display_name":"Idaho National Laboratory","ror":"https://ror.org/00ty2a548","country_code":"US","type":"facility","lineage":["https://openalex.org/I1325736334","https://openalex.org/I1330989302","https://openalex.org/I2800102766","https://openalex.org/I2801818860"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jason Wright","raw_affiliation_strings":["Idaho National Laboratory, Idaho Falls, ID, USA"],"affiliations":[{"raw_affiliation_string":"Idaho National Laboratory, Idaho Falls, ID, USA","institution_ids":["https://openalex.org/I2800102766"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052896958"],"corresponding_institution_ids":["https://openalex.org/I155093810"],"apc_list":null,"apc_paid":null,"fwci":4.0657,"has_fulltext":false,"cited_by_count":58,"citation_normalized_percentile":{"value":0.94113346,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"202","last_page":"209"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7460594773292542},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7385703325271606},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7249575257301331},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5961048603057861},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5640783309936523},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5461146235466003},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.515770673751831},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5143216848373413},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.45295464992523193},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.43720743060112},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41824808716773987},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39246076345443726},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3780645728111267},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.29477572441101074},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2759544253349304}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7460594773292542},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7385703325271606},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7249575257301331},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5961048603057861},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5640783309936523},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5461146235466003},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.515770673751831},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5143216848373413},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.45295464992523193},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.43720743060112},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41824808716773987},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39246076345443726},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3780645728111267},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.29477572441101074},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2759544253349304}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cicybs.2011.5949392","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2011.5949392","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","raw_type":"proceedings-article"},{"id":"pmh:oai:osti.gov:1013712","is_oa":true,"landing_page_url":"https://www.osti.gov/biblio/1013712","pdf_url":null,"source":{"id":"https://openalex.org/S4306402487","display_name":"OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I139351228","host_organization_name":"Office of Scientific and Technical Information","host_organization_lineage":["https://openalex.org/I139351228"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"pmh:oai:osti.gov:1013712","is_oa":true,"landing_page_url":"https://www.osti.gov/biblio/1013712","pdf_url":null,"source":{"id":"https://openalex.org/S4306402487","display_name":"OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I139351228","host_organization_name":"Office of Scientific and Technical Information","host_organization_lineage":["https://openalex.org/I139351228"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W6091113","https://openalex.org/W564030374","https://openalex.org/W1513209138","https://openalex.org/W1563814383","https://openalex.org/W1570448133","https://openalex.org/W1898259180","https://openalex.org/W1959547409","https://openalex.org/W1964124216","https://openalex.org/W1965902027","https://openalex.org/W1985987493","https://openalex.org/W2016070752","https://openalex.org/W2122217421","https://openalex.org/W2122646361","https://openalex.org/W2127546815","https://openalex.org/W2146196597","https://openalex.org/W2150847526","https://openalex.org/W2157665255","https://openalex.org/W2162555916","https://openalex.org/W2240862428","https://openalex.org/W2275675895","https://openalex.org/W2912565176","https://openalex.org/W2913642042","https://openalex.org/W2966207845","https://openalex.org/W3142229452","https://openalex.org/W3208688400","https://openalex.org/W3214373139","https://openalex.org/W4205471131","https://openalex.org/W4211007335","https://openalex.org/W4232580291","https://openalex.org/W6633666935","https://openalex.org/W6681545543","https://openalex.org/W6683235873","https://openalex.org/W7064111672"],"related_works":["https://openalex.org/W2614996178","https://openalex.org/W3084463301","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777"],"abstract_inverted_index":{"Resiliency":[0],"and":[1],"security":[2,22,49,106],"in":[3,8],"critical":[4,31,132],"infrastructure":[5,133],"control":[6,134],"systems":[7],"the":[9,27,68,79,98,112,128],"modern":[10],"world":[11],"of":[12,29,34,81,102,111,119,130],"cyber":[13,50,107],"terrorism":[14],"constitute":[15],"a":[16,20,35,41,62,117,131],"relevant":[17],"concern.":[18],"Developing":[19],"network":[21,48,70,105,120],"system":[23,113],"specifically":[24,93],"tailored":[25],"to":[26,95],"requirements":[28,101],"such":[30],"assets":[32],"is":[33],"primary":[36],"importance.":[37],"This":[38,89],"paper":[39],"proposes":[40],"novel":[42],"learning":[43,59,90],"algorithm":[44,60,91],"for":[45],"anomaly":[46],"based":[47],"sensor":[51],"together":[52],"with":[53,97],"its":[54],"hardware":[55],"implementation.":[56],"The":[57,109],"presented":[58],"constructs":[61],"fuzzy":[63,73],"logic":[64],"rule":[65],"base":[66],"modeling":[67],"normal":[69],"behavior.":[71],"Individual":[72],"rules":[74],"are":[75],"extracted":[76],"directly":[77],"from":[78,123],"stream":[80],"incoming":[82],"packets":[83],"using":[84],"an":[85,124],"online":[86],"clustering":[87],"algorithm.":[88],"was":[92,114],"developed":[94],"comply":[96],"constrained":[99],"computational":[100],"low-cost":[103],"embedded":[104],"sensors.":[108],"performance":[110],"evaluated":[115],"on":[116],"set":[118],"data":[121],"recorded":[122],"experimental":[125],"test-bed":[126],"mimicking":[127],"environment":[129],"system.":[135]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
