{"id":"https://openalex.org/W2768926704","doi":"https://doi.org/10.1109/codit.2017.8102628","title":"Protect healthcare system based on intelligent techniques","display_name":"Protect healthcare system based on intelligent techniques","publication_year":2017,"publication_date":"2017-04-01","ids":{"openalex":"https://openalex.org/W2768926704","doi":"https://doi.org/10.1109/codit.2017.8102628","mag":"2768926704"},"language":"en","primary_location":{"id":"doi:10.1109/codit.2017.8102628","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit.2017.8102628","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 4th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009409031","display_name":"Mohamed Adel Al-Shaher","orcid":null},"institutions":[{"id":"https://openalex.org/I202735123","display_name":"Thi Qar University","ror":"https://ror.org/02ypa8k59","country_code":"IQ","type":"education","lineage":["https://openalex.org/I202735123"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Mohamed Adel Al-Shaher","raw_affiliation_strings":["College of Science, Thi-Qar University, Nassiriyah, Iraq"],"affiliations":[{"raw_affiliation_string":"College of Science, Thi-Qar University, Nassiriyah, Iraq","institution_ids":["https://openalex.org/I202735123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040960638","display_name":"Rasha Talal Hameed","orcid":"https://orcid.org/0009-0009-6607-1251"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Rasha Talal Hameed","raw_affiliation_strings":["Faculty of Automatic Control and Computers, University POLITEHNICA of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Faculty of Automatic Control and Computers, University POLITEHNICA of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013822778","display_name":"Nicolae \u0162\u00e3pu\u015f","orcid":"https://orcid.org/0000-0002-7878-6598"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Nicolae Tapus","raw_affiliation_strings":["Faculty of Automatic Control and Computers, University POLITEHNICA of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Faculty of Automatic Control and Computers, University POLITEHNICA of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009409031"],"corresponding_institution_ids":["https://openalex.org/I202735123"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.67254841,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"0421","last_page":"0426"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7726899981498718},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.638139009475708},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.6151320934295654},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5583577752113342},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4720286428928375},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.44844749569892883},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37978580594062805},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35861536860466003},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33575400710105896},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.10589134693145752}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7726899981498718},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.638139009475708},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.6151320934295654},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5583577752113342},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4720286428928375},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.44844749569892883},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37978580594062805},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35861536860466003},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33575400710105896},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.10589134693145752},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/codit.2017.8102628","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit.2017.8102628","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 4th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1516960038","https://openalex.org/W1971751469","https://openalex.org/W1980572014","https://openalex.org/W1986668534","https://openalex.org/W2114238591","https://openalex.org/W2126345423","https://openalex.org/W2139598355","https://openalex.org/W2198987284","https://openalex.org/W2512306440","https://openalex.org/W2545008388","https://openalex.org/W6680428444","https://openalex.org/W6687478864"],"related_works":["https://openalex.org/W2515419187","https://openalex.org/W2092530219","https://openalex.org/W2077352188","https://openalex.org/W2507130582","https://openalex.org/W2388464034","https://openalex.org/W4399793156","https://openalex.org/W2009238965","https://openalex.org/W2533125852","https://openalex.org/W2387982609","https://openalex.org/W2359453783"],"abstract_inverted_index":{"Good":[0],"patient":[1],"care":[2],"means":[3],"safe":[4],"record-keeping":[5],"practices.":[6],"Never":[7],"forget":[8],"that":[9,30,68],"the":[10,43,47,57,70,91,114,148,165,172],"electronic":[11],"health":[12],"record":[13],"(EHR)":[14],"represents":[15],"a":[16,26,36,108],"unique":[17],"and":[18,84,133,146],"valuable":[19],"human":[20],"being:":[21],"it":[22,34,139],"is":[23,35,99],"not":[24],"just":[25],"collection":[27],"of":[28,42,50,53,72,93,174],"data":[29],"you":[31],"are":[32,40,161],"guarding,":[33],"life.":[37],"Malicious":[38],"codes":[39],"one":[41],"significant":[44],"reasons":[45],"for":[46,77,101,144],"rising":[48],"number":[49,173],"security":[51,66,75,98],"violations":[52],"systems":[54],"associated":[55],"with":[56,169],"web":[58,135],"or":[59],"worked":[60],"in":[61,96],"an":[62,123,152],"open":[63],"domain.":[64],"Some":[65],"organizations,":[67],"perceive":[69],"significance":[71],"security,":[73],"develop":[74],"systems,":[76],"example,":[78],"firewalls,":[79],"virus":[80],"scanning":[81],"proxy":[82],"servers,":[83],"intrusion":[85,129],"detection":[86,130,145],"system.":[87],"In":[88],"this":[89],"venture,":[90],"integration":[92],"different":[94],"techniques":[95],"network":[97,111,128,159,168],"applied":[100],"healthcare":[102],"system":[103],"protection.":[104],"This":[105],"work":[106],"portrays":[107],"wavelet":[109,157],"neural":[110,158,167],"approach":[112],"to":[113,163,171],"proposed":[115],"Intelligent":[116],"Healthcare":[117],"Security":[118],"System":[119],"(IHSS)":[120],"which":[121],"include":[122],"intelligent":[124,127,134],"firewall":[125],"(IFW),":[126],"subsystem":[131],"(INIDS),":[132],"filter":[136],"(IFW).":[137],"Also,":[138],"used":[140],"Multi-Layer":[141],"Perceptron":[142],"(MLP)":[143],"classifying":[147],"attacks":[149],"depend":[150],"on":[151],"on-line":[153],"analysis":[154],"mechanism.":[155],"Various":[156],"structures":[160],"analyzed":[162],"discover":[164],"optimal":[166],"regards":[170],"hidden":[175],"layers.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
