{"id":"https://openalex.org/W2021677986","doi":"https://doi.org/10.1109/dictap.2012.6215351","title":"Network intrusion detection using multi-attributed frame decision tree","display_name":"Network intrusion detection using multi-attributed frame decision tree","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2021677986","doi":"https://doi.org/10.1109/dictap.2012.6215351","mag":"2021677986"},"language":"en","primary_location":{"id":"doi:10.1109/dictap.2012.6215351","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dictap.2012.6215351","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034449756","display_name":"Krung Sinapiromsaran","orcid":"https://orcid.org/0000-0001-9733-8937"},"institutions":[{"id":"https://openalex.org/I158708052","display_name":"Chulalongkorn University","ror":"https://ror.org/028wp3y58","country_code":"TH","type":"education","lineage":["https://openalex.org/I158708052"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Krung Sinapiromsaran","raw_affiliation_strings":["Department of Mathematics and Computer Science, Faculty of Science, Chulalongkom University, Bangkok, Thailand","Department of Mathematics and Computer Science, Faculty of Science,#N#Chulalongkorn University, Bangkok 10330, Thailand"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Faculty of Science, Chulalongkom University, Bangkok, Thailand","institution_ids":["https://openalex.org/I158708052"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science, Faculty of Science,#N#Chulalongkorn University, Bangkok 10330, Thailand","institution_ids":["https://openalex.org/I158708052"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086983340","display_name":"Narudom Techaval","orcid":null},"institutions":[{"id":"https://openalex.org/I158708052","display_name":"Chulalongkorn University","ror":"https://ror.org/028wp3y58","country_code":"TH","type":"education","lineage":["https://openalex.org/I158708052"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Narudom Techaval","raw_affiliation_strings":["Department of Mathematics and Computer Science, Faculty of Science, Chulalongkom University, Bangkok, Thailand","Department of Mathematics and Computer Science, Faculty of Science,#N#Chulalongkorn University, Bangkok 10330, Thailand"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Faculty of Science, Chulalongkom University, Bangkok, Thailand","institution_ids":["https://openalex.org/I158708052"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science, Faculty of Science,#N#Chulalongkorn University, Bangkok 10330, Thailand","institution_ids":["https://openalex.org/I158708052"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034449756"],"corresponding_institution_ids":["https://openalex.org/I158708052"],"apc_list":null,"apc_paid":null,"fwci":1.0638,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.77966985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"11","issue":null,"first_page":"203","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7745879888534546},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.7569461464881897},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6802912950515747},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6588769555091858},{"id":"https://openalex.org/keywords/incremental-decision-tree","display_name":"Incremental decision tree","score":0.48834797739982605},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4874425232410431},{"id":"https://openalex.org/keywords/id3-algorithm","display_name":"ID3 algorithm","score":0.4771977365016937},{"id":"https://openalex.org/keywords/decision-tree-learning","display_name":"Decision tree learning","score":0.47188034653663635},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.44700008630752563},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.43907737731933594},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4383507966995239},{"id":"https://openalex.org/keywords/partition","display_name":"Partition (number theory)","score":0.43542250990867615},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1153002679347992}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7745879888534546},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.7569461464881897},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6802912950515747},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6588769555091858},{"id":"https://openalex.org/C10229987","wikidata":"https://www.wikidata.org/wiki/Q17083028","display_name":"Incremental decision tree","level":4,"score":0.48834797739982605},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4874425232410431},{"id":"https://openalex.org/C183931066","wikidata":"https://www.wikidata.org/wiki/Q1653378","display_name":"ID3 algorithm","level":5,"score":0.4771977365016937},{"id":"https://openalex.org/C5481197","wikidata":"https://www.wikidata.org/wiki/Q16766476","display_name":"Decision tree learning","level":3,"score":0.47188034653663635},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.44700008630752563},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.43907737731933594},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4383507966995239},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.43542250990867615},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1153002679347992},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dictap.2012.6215351","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dictap.2012.6215351","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1482924192","https://openalex.org/W1887038067","https://openalex.org/W2101109743","https://openalex.org/W2125055259","https://openalex.org/W2126996952","https://openalex.org/W2141254179","https://openalex.org/W2146082061","https://openalex.org/W2159047538","https://openalex.org/W2180355528","https://openalex.org/W3105682467","https://openalex.org/W4366454906","https://openalex.org/W6628924854","https://openalex.org/W6639415379","https://openalex.org/W6852745194"],"related_works":["https://openalex.org/W2030894524","https://openalex.org/W2592385415","https://openalex.org/W1982169401","https://openalex.org/W1648970942","https://openalex.org/W2348694184","https://openalex.org/W2188355725","https://openalex.org/W2143508752","https://openalex.org/W3197772267","https://openalex.org/W2167102385","https://openalex.org/W2622249843"],"abstract_inverted_index":{"Network":[0],"intrusion":[1,22,182],"problem":[2,183],"has":[3],"been":[4,25],"received":[5],"more":[6,111],"attention":[7],"during":[8],"the":[9,15,42,51,57,68,90,146,150,157,171,177,180,187],"past":[10,43],"few":[11],"years":[12],"due":[13],"to":[14,32,60,117,135],"increase":[16],"company":[17],"network":[18,21,39,181],"usages.":[19],"Many":[20],"systems":[23],"have":[24],"proposed":[26],"and":[27],"in":[28,109],"cooperated":[29],"various":[30],"classifiers":[31],"identify":[33],"malicious":[34],"packages":[35,40],"among":[36,75],"all":[37,76],"regular":[38,188],"using":[41,156],"history.":[44],"Decision":[45],"tree":[46,64,92,129,190],"algorithm":[47,130,147],"is":[48,163],"one":[49],"of":[50,71,88,98,179],"popular":[52],"adapted":[53],"classifier.":[54],"It":[55],"utilizes":[56],"training":[58,82],"records":[59],"build":[61],"a":[62,72,86,95,103,110,126,137],"decision":[63,91,128,189],"model":[65],"which":[66,100],"select":[67],"best":[69,80,161],"split":[70,162],"single":[73],"attribute":[74],"candidate":[77],"attributes":[78,134],"that":[79,114,131],"classifies":[81],"records.":[83,144],"To":[84],"facilitate":[85],"combination":[87],"attributes,":[89],"must":[93],"apply":[94],"finite":[96],"number":[97],"branches":[99],"may":[101,107],"generate":[102],"tall":[104],"tree.":[105],"Attributes":[106],"relate":[108],"complex":[112],"setting":[113],"they":[115],"need":[116],"be":[118],"simultaneously":[119],"used":[120],"for":[121],"branching.":[122],"This":[123],"paper":[124],"proposes":[125],"new":[127],"uses":[132],"multiple":[133],"construct":[136],"core":[138,154,167],"vector":[139,155,158,168],"generated":[140],"from":[141,184],"two":[142],"farthest":[143],"Then":[145],"recursively":[148],"partition":[149],"dataset":[151],"along":[152,165],"this":[153,166],"projection.":[159],"The":[160],"identified":[164],"based":[169],"on":[170],"information":[172],"gain.":[173],"Our":[174],"results":[175],"show":[176],"improvement":[178],"UCI":[185],"over":[186],"algorithm.":[191]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
