{"id":"https://openalex.org/W1988933354","doi":"https://doi.org/10.1109/cybersec.2014.6913971","title":"A cognitive approach for botnet detection using Artificial Immune System in the cloud","display_name":"A cognitive approach for botnet detection using Artificial Immune System in the cloud","publication_year":2014,"publication_date":"2014-04-01","ids":{"openalex":"https://openalex.org/W1988933354","doi":"https://doi.org/10.1109/cybersec.2014.6913971","mag":"1988933354"},"language":"en","primary_location":{"id":"doi:10.1109/cybersec.2014.6913971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersec.2014.6913971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063662573","display_name":"Victor R. Kebande","orcid":"https://orcid.org/0000-0003-4071-4596"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Victor R. Kebande","raw_affiliation_strings":["Information and Computer Security Architecture(ICSA) Research Group, University of Pretoria, Pretoria, South Africa","Information and Computer Security Architecture(ICSA), Research Group, Department of Computer Science, University of Pretoria, Lynwood Road, Private Bag X20, Hatfield 0028, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Information and Computer Security Architecture(ICSA) Research Group, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]},{"raw_affiliation_string":"Information and Computer Security Architecture(ICSA), Research Group, Department of Computer Science, University of Pretoria, Lynwood Road, Private Bag X20, Hatfield 0028, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037461417","display_name":"Hein S. Venter","orcid":"https://orcid.org/0000-0002-3607-8630"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Hein. S. Venter","raw_affiliation_strings":["Information and Computer Security Architecture (ICSA) Research Group, University of Pretoria, Pretoria, South Africa","Information and Computer Security Architecture(ICSA), Research Group, Department of Computer Science, University of Pretoria, Lynwood Road, Private Bag X20, Hatfield 0028, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Information and Computer Security Architecture (ICSA) Research Group, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]},{"raw_affiliation_string":"Information and Computer Security Architecture(ICSA), Research Group, Department of Computer Science, University of Pretoria, Lynwood Road, Private Bag X20, Hatfield 0028, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063662573"],"corresponding_institution_ids":["https://openalex.org/I69552723"],"apc_list":null,"apc_paid":null,"fwci":3.5406,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.93204938,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"52","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8932658433914185},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8836898803710938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7580739855766296},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6485074162483215},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6470238566398621},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.642684817314148},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.517716109752655},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.48501917719841003},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2508981227874756},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20726317167282104}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8932658433914185},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8836898803710938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7580739855766296},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6485074162483215},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6470238566398621},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.642684817314148},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.517716109752655},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.48501917719841003},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2508981227874756},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20726317167282104},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cybersec.2014.6913971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersec.2014.6913971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1462349742","https://openalex.org/W1533945909","https://openalex.org/W1594131070","https://openalex.org/W1847647515","https://openalex.org/W1922851884","https://openalex.org/W2058657545","https://openalex.org/W2061455058","https://openalex.org/W2099653669","https://openalex.org/W2118820208","https://openalex.org/W2148323889","https://openalex.org/W2275530856","https://openalex.org/W2545374358","https://openalex.org/W3139397679","https://openalex.org/W4298424212","https://openalex.org/W6628628164","https://openalex.org/W6640487242","https://openalex.org/W6664911161","https://openalex.org/W6694821995"],"related_works":["https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W2088620127","https://openalex.org/W572531444","https://openalex.org/W2921575628","https://openalex.org/W2743348030","https://openalex.org/W1963799338","https://openalex.org/W2174174426","https://openalex.org/W2542775576"],"abstract_inverted_index":{"The":[0,79,122,133],"advent":[1],"of":[2,20,30,44,60,114],"cloud":[3,51,97,120],"computing":[4,61],"has":[5,23],"given":[6,48],"a":[7,18,115,125],"provision":[8],"for":[9,110],"both":[10],"good":[11],"and":[12,74,93],"malicious":[13],"opportunities.":[14],"Virtualization":[15],"itself":[16],"as":[17],"component":[19],"Cloud":[21],"computing,":[22],"provided":[24],"users":[25],"with":[26],"an":[27,108,112],"immediate":[28],"way":[29],"accessing":[31],"limitless":[32],"resource":[33],"infrastructures.":[34],"Botnets":[35],"have":[36],"evolved":[37],"to":[38,55,63,66],"be":[39,56],"the":[40,49,57,64,96,105,119],"most":[41],"dangerous":[42],"group":[43],"remote-operated":[45],"zombie":[46],"computers":[47],"open":[50],"environment.":[52,121],"They":[53],"happen":[54],"dark":[58],"side":[59],"due":[62],"ability":[65],"run":[67],"illegal":[68],"activities":[69],"through":[70,76],"remote":[71],"installations,":[72],"attacks":[73],"propagations":[75],"exploiting":[77],"vulnerabilities.":[78],"problem":[80],"that":[81,86,136],"this":[82,102,137],"paper":[83],"addresses":[84],"is":[85,89,98,139],"botnet":[87],"technology":[88],"advancing":[90],"each":[91],"day":[92],"detection":[94,126],"in":[95,118],"becoming":[99],"hard.":[100],"In":[101],"paper,":[103],"therefore,":[104],"authors'":[106],"presents":[107],"approach":[109],"detecting":[111],"infection":[113],"robot":[116],"network":[117],"authors":[123],"proposed":[124],"mechanism":[127],"using":[128],"Artificial":[129],"Immune":[130],"System":[131],"(AIS).":[132],"results":[134],"show":[135],"research":[138],"significant.":[140]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
