{"id":"https://openalex.org/W2811163328","doi":"https://doi.org/10.1109/fskd.2017.8393092","title":"Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data","display_name":"Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2811163328","doi":"https://doi.org/10.1109/fskd.2017.8393092","mag":"2811163328"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2017.8393092","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2017.8393092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038329998","display_name":"Teoh Teik Toe","orcid":"https://orcid.org/0000-0001-9290-5517"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"T. T. Teoh","raw_affiliation_strings":["Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083267686","display_name":"Yok-Yen Nguwi","orcid":"https://orcid.org/0000-0001-7021-9188"},"institutions":[{"id":"https://openalex.org/I4210110442","display_name":"James Cook University Singapore","ror":"https://ror.org/01y5z8p89","country_code":"SG","type":"education","lineage":["https://openalex.org/I4210110442"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Y. Y. Nguwi","raw_affiliation_strings":["School of Business (IT), James Cook University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Business (IT), James Cook University, Singapore","institution_ids":["https://openalex.org/I4210110442"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072913672","display_name":"Yuval Elovici","orcid":"https://orcid.org/0000-0002-9641-128X"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yuval Elovici","raw_affiliation_strings":["Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057453537","display_name":"Ngai\u2010Man Cheung","orcid":"https://orcid.org/0000-0003-0135-3791"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"N. M. Cheung","raw_affiliation_strings":["Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103559242","display_name":"Willie Ng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"W. L. Ng","raw_affiliation_strings":["ST Electronics (Info-Security) Pte Ltd, Singapore"],"affiliations":[{"raw_affiliation_string":"ST Electronics (Info-Security) Pte Ltd, Singapore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038329998"],"corresponding_institution_ids":["https://openalex.org/I152815399"],"apc_list":null,"apc_paid":null,"fwci":0.8772,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.7968012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2080","last_page":"2083"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.8790393471717834},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7739149332046509},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5723976492881775},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5706026554107666},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.5144708156585693},{"id":"https://openalex.org/keywords/intuition","display_name":"Intuition","score":0.5029799342155457},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5013830661773682},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46131396293640137},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46062368154525757}],"concepts":[{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.8790393471717834},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7739149332046509},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5723976492881775},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5706026554107666},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.5144708156585693},{"id":"https://openalex.org/C132010649","wikidata":"https://www.wikidata.org/wiki/Q189222","display_name":"Intuition","level":2,"score":0.5029799342155457},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5013830661773682},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46131396293640137},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46062368154525757},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/fskd.2017.8393092","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2017.8393092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","raw_type":"proceedings-article"},{"id":"pmh:oai:researchonline.jcu.edu.au:50164","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400520","display_name":"ResearchOnline at James Cook University (James Cook University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I86467917","host_organization_name":"James Cook University","host_organization_lineage":["https://openalex.org/I86467917"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Item"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1513350018","https://openalex.org/W1774737591","https://openalex.org/W1963768606","https://openalex.org/W2005394020","https://openalex.org/W2048451411","https://openalex.org/W2052773181","https://openalex.org/W2059339978","https://openalex.org/W2090151803","https://openalex.org/W2103413029","https://openalex.org/W2114214552","https://openalex.org/W2121127516","https://openalex.org/W2135041608","https://openalex.org/W2145177374","https://openalex.org/W2146974293","https://openalex.org/W2155248635","https://openalex.org/W2275147437","https://openalex.org/W2330737497","https://openalex.org/W2464730619","https://openalex.org/W2524321966","https://openalex.org/W6702364799","https://openalex.org/W6990766348"],"related_works":["https://openalex.org/W2053269318","https://openalex.org/W2364370872","https://openalex.org/W2097963413","https://openalex.org/W2294335174","https://openalex.org/W2499612753","https://openalex.org/W3111802945","https://openalex.org/W2946096271","https://openalex.org/W2295423552","https://openalex.org/W1598471830","https://openalex.org/W3107369729"],"abstract_inverted_index":{"Hidden":[0],"Markov":[1],"Models":[2],"(HMM)":[3],"are":[4,198],"probabilistic":[5],"models":[6],"that":[7],"can":[8,121],"be":[9,122],"used":[10,106],"for":[11],"forecasting":[12],"time":[13],"series":[14],"data.":[15,73,131],"It":[16,74],"has":[17],"seen":[18],"success":[19],"in":[20,39,107,206,214],"various":[21],"domains":[22],"like":[23],"finance":[24],"[1-5],":[25],"bioinformatics":[26],"[6-8],":[27],"healthcare":[28],"[9-11],":[29],"agriculture":[30],"[12-14],":[31],"artificial":[32],"intelligence[15-17].":[33],"However,":[34],"the":[35,49,77,84,137,149,169],"use":[36,189],"of":[37,51,79,87,117,139,218],"HMM":[38,52,154,190],"cyber":[40,71,101,133,159,208],"security":[41,72,92,102,134,160,209],"found":[42],"to":[43,59,69,82,90,110,128,155,203],"date":[44],"is":[45,75],"numbered.":[46],"We":[47,152],"believe":[48],"properties":[50],"being":[53],"predictive,":[54],"probabilistic,":[55],"and":[56,142,163,187],"its":[57],"ability":[58],"model":[60,70],"different":[61],"naturally":[62],"occurring":[63],"states":[64],"form":[65],"a":[66,144,158,182,207],"good":[67],"basis":[68],"hence":[76],"motivation":[78],"this":[80,108],"work":[81,109],"provide":[83],"initial":[85],"results":[86,197,213],"our":[88,125,196],"attempts":[89],"predict":[91],"attacks":[93,103],"using":[94,174],"HMM.":[95],"A":[96],"large":[97],"network":[98],"datasets":[99,127],"representing":[100],"have":[104],"been":[105],"establish":[111],"an":[112],"expert":[113,135],"system.":[114],"The":[115,132],"characteristics":[116],"attacker's":[118],"IP":[119],"addresses":[120],"extracted":[123],"from":[124],"integrated":[126],"generate":[129],"statistical":[130],"provides":[136],"weight":[138],"each":[140],"attribute":[141],"forms":[143],"scoring":[145],"system":[146],"by":[147,166],"annotating":[148],"log":[150],"history.":[151],"applied":[153],"distinguish":[156],"between":[157],"attack,":[161],"unsure":[162],"no":[164],"attack":[165],"first":[167],"breaking":[168],"data":[170,184],"into":[171],"3":[172],"cluster":[173],"Fuzzy":[175],"K":[176],"mean":[177],"(FKM),":[178],"then":[179],"manually":[180],"label":[181],"small":[183],"(Analyst":[185],"Intuition)":[186],"finally":[188],"state-based":[191],"approach.":[192],"By":[193],"doing":[194],"so,":[195],"very":[199],"encouraging":[200],"as":[201],"compare":[202],"finding":[204],"anomaly":[205],"log,":[210],"which":[211],"generally":[212],"creating":[215],"huge":[216],"amount":[217],"false":[219],"detection.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
