{"id":"https://openalex.org/W2144859043","doi":"https://doi.org/10.1109/cisda.2009.5356546","title":"Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing","display_name":"Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing","publication_year":2009,"publication_date":"2009-07-01","ids":{"openalex":"https://openalex.org/W2144859043","doi":"https://doi.org/10.1109/cisda.2009.5356546","mag":"2144859043"},"language":"en","primary_location":{"id":"doi:10.1109/cisda.2009.5356546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisda.2009.5356546","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014127435","display_name":"H. G\u00fcne\u015f Kayac\u0131k","orcid":null},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Hilmi Gunes Kayacik","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Canada","Faculty of Computer Science, Dalhousie University , Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Canada","institution_ids":["https://openalex.org/I129902397"]},{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University , Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008462534","display_name":"A. Nur Zincir\u2010Heywood","orcid":"https://orcid.org/0000-0003-2796-7265"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Nur Zincir-Heywood","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Canada","Faculty of Computer Science, Dalhousie University , Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Canada","institution_ids":["https://openalex.org/I129902397"]},{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University , Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003699164","display_name":"Malcolm I. Heywood","orcid":"https://orcid.org/0000-0002-1521-0671"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Malcolm Heywood","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Canada","Faculty of Computer Science, Dalhousie University , Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Canada","institution_ids":["https://openalex.org/I129902397"]},{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University , Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013126732","display_name":"Stefan Burschka","orcid":null},"institutions":[{"id":"https://openalex.org/I59105498","display_name":"Swisscom (Switzerland)","ror":"https://ror.org/04t1f4f50","country_code":"CH","type":"company","lineage":["https://openalex.org/I59105498"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Stefan Burschka","raw_affiliation_strings":["Swisscom Innovations Inc., Switzerland","Swisscom Innovations Inc., Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"Swisscom Innovations Inc., Switzerland","institution_ids":["https://openalex.org/I59105498"]},{"raw_affiliation_string":"Swisscom Innovations Inc., Switzerland#TAB#","institution_ids":["https://openalex.org/I59105498"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014127435"],"corresponding_institution_ids":["https://openalex.org/I129902397"],"apc_list":null,"apc_paid":null,"fwci":0.7049,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70700852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2516","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8783742189407349},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7508877515792847},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.7052738666534424},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6566608548164368},{"id":"https://openalex.org/keywords/unix","display_name":"Unix","score":0.5640862584114075},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5539782643318176},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.4708508849143982},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.461868554353714},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44411057233810425},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.41978198289871216},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3357422947883606},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2161630392074585},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1860550343990326},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.18050894141197205},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15185943245887756},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09923607110977173},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08838647603988647}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8783742189407349},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7508877515792847},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.7052738666534424},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6566608548164368},{"id":"https://openalex.org/C112968700","wikidata":"https://www.wikidata.org/wiki/Q11368","display_name":"Unix","level":3,"score":0.5640862584114075},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5539782643318176},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.4708508849143982},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.461868554353714},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44411057233810425},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.41978198289871216},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3357422947883606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2161630392074585},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1860550343990326},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.18050894141197205},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15185943245887756},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09923607110977173},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08838647603988647},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisda.2009.5356546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisda.2009.5356546","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W34732858","https://openalex.org/W1590452455","https://openalex.org/W1591826096","https://openalex.org/W1595498733","https://openalex.org/W1639032689","https://openalex.org/W1674877186","https://openalex.org/W1903577715","https://openalex.org/W2086586141","https://openalex.org/W2100604298","https://openalex.org/W2135143063","https://openalex.org/W2148293771","https://openalex.org/W2148324316","https://openalex.org/W2161641280","https://openalex.org/W2904250082","https://openalex.org/W3023540311","https://openalex.org/W3136767761","https://openalex.org/W4285719527","https://openalex.org/W6637096788","https://openalex.org/W6639770171","https://openalex.org/W6683460333"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W4385301282","https://openalex.org/W3023977444","https://openalex.org/W2766647240","https://openalex.org/W4210660460","https://openalex.org/W2352737138"],"abstract_inverted_index":{"This":[0],"work":[1],"focuses":[2],"on":[3,110],"testing":[4],"anomaly":[5,23,101],"detectors":[6],"from":[7],"the":[8,40,46,64,74,79,84,88,92,126],"perspective":[9],"of":[10,22,31,51,91],"a":[11,18,43,118,123],"Multi-objective":[12],"Evolutionary":[13],"Exploit":[14],"Generator":[15],"(EEG).":[16],"Such":[17],"framework":[19],"provides":[20],"users":[21],"detection":[24],"systems":[25],"two":[26,98,127],"capabilities.":[27],"Firstly,":[28],"no":[29],"knowledge":[30,48],"protected":[32],"data":[33],"structures":[34],"need":[35],"to":[36,53,70,116],"be":[37,60],"assumed":[38],"(i.e.":[39],"detector":[41,76],"is":[42,95],"black-box),":[44],"where":[45],"time,":[47],"and":[49,105,121],"availability":[50],"tools":[52],"perform":[54,117],"such":[55],"an":[56],"analysis":[57],"might":[58],"not":[59],"generally":[61],"available.":[62],"Secondly,":[63],"evolved":[65],"exploits":[66],"are":[67],"then":[68],"able":[69],"demonstrate":[71],"weaknesses":[72],"in":[73,114],"ensuing":[75],"parameterization.":[77],"Therefore,":[78],"system":[80],"administrator":[81],"can":[82],"identify":[83],"suitable":[85],"parameters":[86],"for":[87],"effective":[89],"operation":[90],"detector.":[93],"EEG":[94],"employed":[96],"against":[97],"second":[99],"generation":[100],"detectors,":[102],"namely":[103],"pH":[104,106],"with":[107],"schema":[108],"mask,":[109],"four":[111],"UNIX":[112],"applications":[113],"order":[115],"vulnerability":[119],"assessment":[120],"make":[122],"comparison":[124],"between":[125],"detectors.":[128]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
