{"id":"https://openalex.org/W3163331173","doi":"https://doi.org/10.1109/csicc52343.2021.9420618","title":"A Network Intrusion Detection Approach at the Edge of Fog","display_name":"A Network Intrusion Detection Approach at the Edge of Fog","publication_year":2021,"publication_date":"2021-03-03","ids":{"openalex":"https://openalex.org/W3163331173","doi":"https://doi.org/10.1109/csicc52343.2021.9420618","mag":"3163331173"},"language":"en","primary_location":{"id":"doi:10.1109/csicc52343.2021.9420618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csicc52343.2021.9420618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060532761","display_name":"Seyed Omid Azarkasb","orcid":"https://orcid.org/0009-0003-3322-2216"},"institutions":[{"id":"https://openalex.org/I80543232","display_name":"K.N.Toosi University of Technology","ror":"https://ror.org/0433abe34","country_code":"IR","type":"education","lineage":["https://openalex.org/I80543232"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Seyed Omid Azarkasb","raw_affiliation_strings":["K.N. Toosi University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"K.N. Toosi University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I80543232"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052514512","display_name":"Saeed Sedighian Kashi","orcid":"https://orcid.org/0000-0002-5849-3106"},"institutions":[{"id":"https://openalex.org/I80543232","display_name":"K.N.Toosi University of Technology","ror":"https://ror.org/0433abe34","country_code":"IR","type":"education","lineage":["https://openalex.org/I80543232"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Saeed Sedighian Kashi","raw_affiliation_strings":["K.N. Toosi University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"K.N. Toosi University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I80543232"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022190009","display_name":"Seyed Hossein Khasteh","orcid":"https://orcid.org/0000-0003-2227-4507"},"institutions":[{"id":"https://openalex.org/I80543232","display_name":"K.N.Toosi University of Technology","ror":"https://ror.org/0433abe34","country_code":"IR","type":"education","lineage":["https://openalex.org/I80543232"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Seyed Hossein Khasteh","raw_affiliation_strings":["K.N. Toosi University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"K.N. Toosi University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I80543232"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060532761"],"corresponding_institution_ids":["https://openalex.org/I80543232"],"apc_list":null,"apc_paid":null,"fwci":0.6113,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68969637,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.806002140045166},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7997227907180786},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5842748880386353},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5808529257774353},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5508942604064941},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.49101924896240234},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4738781154155731},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4388563632965088},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.41703125834465027},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2202897071838379},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.20312464237213135},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11520108580589294},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1064932644367218}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.806002140045166},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7997227907180786},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5842748880386353},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5808529257774353},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5508942604064941},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.49101924896240234},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4738781154155731},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4388563632965088},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.41703125834465027},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2202897071838379},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.20312464237213135},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11520108580589294},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1064932644367218},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csicc52343.2021.9420618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csicc52343.2021.9420618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2085686002","https://openalex.org/W2130106291","https://openalex.org/W2142876969","https://openalex.org/W2545263909","https://openalex.org/W2618984630","https://openalex.org/W2763925543","https://openalex.org/W2768152971","https://openalex.org/W2782713273","https://openalex.org/W2791756253","https://openalex.org/W2793174642","https://openalex.org/W2804147884","https://openalex.org/W2810087077","https://openalex.org/W2899764587","https://openalex.org/W2910612999","https://openalex.org/W2912817322","https://openalex.org/W2942653132","https://openalex.org/W3039274670","https://openalex.org/W6738824078","https://openalex.org/W6745238584","https://openalex.org/W6753259544","https://openalex.org/W6758667602"],"related_works":["https://openalex.org/W3148526535","https://openalex.org/W2380962566","https://openalex.org/W2368379890","https://openalex.org/W2183525346","https://openalex.org/W2350859535","https://openalex.org/W2009124313","https://openalex.org/W2379417114","https://openalex.org/W2184360008","https://openalex.org/W2081159194","https://openalex.org/W2383965035"],"abstract_inverted_index":{"In":[0,153],"addition":[1,145,161],"to":[2,13,43,64,122,146,162,184,186],"the":[3,17,20,23,47,58,61,65,74,81,84,95,101,120,134,148,154,168,173,181],"feature":[4],"of":[5,19,49,73,76,83,91,104,108,111,115,136],"real-time":[6],"analytics,":[7],"fog":[8,87,142,150],"computing":[9],"allows":[10],"detection":[11,27,78,112,114,139,165],"nodes":[12,79,140,169,182],"be":[14],"located":[15],"at":[16,80],"edges":[18,82],"network.":[21],"On":[22],"other":[24],"hand,":[25],"intrusion":[26,138,164,177],"systems":[28,38],"require":[29],"prompt":[30],"and":[31,35,52,67,119,125,132,179],"accurate":[32],"attack":[33],"analysis":[34],"detection.":[36],"These":[37],"must":[39],"promptly":[40],"respond":[41],"appropriately":[42],"an":[44],"event.":[45],"Increasing":[46],"speed":[48],"data":[50,62],"transfer":[51],"response":[53],"requires":[54],"less":[55],"bandwidth":[56],"in":[57,86,94,141,144,160],"network,":[59],"reducing":[60],"sent":[63],"cloud":[66],"increasing":[68],"information":[69],"security":[70],"as":[71],"some":[72],"advantages":[75],"using":[77],"network":[85,137,151],"computing.":[88],"The":[89,128],"use":[90],"neural":[92],"networks":[93],"analyzer":[96],"engine":[97],"is":[98],"important":[99],"for":[100],"low":[102],"consumption":[103],"system":[105],"resources,":[106],"avoidance":[107],"explicit":[109],"production":[110],"rules,":[113],"known":[116],"deformed":[117],"attacks,":[118],"ability":[121],"manage":[123],"noise":[124],"outlier":[126],"data.":[127],"current":[129],"paper":[130],"proposes":[131],"implements":[133],"architecture":[135],"computing,":[143],"presenting":[147],"proposed":[149,155],"architecture.":[152],"architecture,":[156],"each":[157],"node":[158,175],"can,":[159],"performing":[163],"operations,":[166],"observe":[167],"around":[170],"it,":[171],"find":[172],"compromised":[174],"or":[176],"node,":[178],"inform":[180],"close":[183],"it":[185],"disconnect":[187],"from":[188],"that":[189],"node.":[190]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
