{"id":"https://openalex.org/W2810808530","doi":"https://doi.org/10.1109/fskd.2017.8393229","title":"Intrusion detection algorithms based on correlation information entropy and binary particle swarm optimization","display_name":"Intrusion detection algorithms based on correlation information entropy and binary particle swarm optimization","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2810808530","doi":"https://doi.org/10.1109/fskd.2017.8393229","mag":"2810808530"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2017.8393229","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2017.8393229","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100359580","display_name":"Yanfei Wang","orcid":"https://orcid.org/0000-0001-7992-3999"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yan-fei Wang","raw_affiliation_strings":["School of Information Science and Engineering, Computer Software Novel Technology, Jinan Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Computer Software Novel Technology, Jinan Shandong, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100716216","display_name":"Peiyu Liu","orcid":"https://orcid.org/0000-0002-2905-5473"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pei-yu Liu","raw_affiliation_strings":["School of Information Science and Engineering, Computer Software Novel Technology, Jinan Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Computer Software Novel Technology, Jinan Shandong, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101539085","display_name":"Min Ren","orcid":"https://orcid.org/0000-0002-6763-3297"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Min Ren","raw_affiliation_strings":["School of Information Science and Engineering, Computer Software Novel Technology, Jinan Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Computer Software Novel Technology, Jinan Shandong, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038258771","display_name":"Xiaoxue Chen","orcid":"https://orcid.org/0000-0002-2077-6020"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiao-xue Chen","raw_affiliation_strings":["School of Information Science and Engineering, Computer Software Novel Technology, Jinan Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Computer Software Novel Technology, Jinan Shandong, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100359580"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2072,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61510954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2829","last_page":"2834"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.7150871753692627},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6238532066345215},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6186366677284241},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6183634996414185},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5612720847129822},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5050039887428284},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.4956320524215698},{"id":"https://openalex.org/keywords/multi-swarm-optimization","display_name":"Multi-swarm optimization","score":0.45359936356544495},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.27291232347488403},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2545902132987976},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22357183694839478},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.11017823219299316}],"concepts":[{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.7150871753692627},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6238532066345215},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6186366677284241},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6183634996414185},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5612720847129822},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5050039887428284},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.4956320524215698},{"id":"https://openalex.org/C122357587","wikidata":"https://www.wikidata.org/wiki/Q6934508","display_name":"Multi-swarm optimization","level":3,"score":0.45359936356544495},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27291232347488403},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2545902132987976},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22357183694839478},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.11017823219299316},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2017.8393229","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2017.8393229","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2007087405","https://openalex.org/W2072412055","https://openalex.org/W2111285839","https://openalex.org/W2122646361","https://openalex.org/W2125213524","https://openalex.org/W2139669429","https://openalex.org/W2142889610","https://openalex.org/W2152195021","https://openalex.org/W2380998351","https://openalex.org/W2393711107","https://openalex.org/W2543580944","https://openalex.org/W2598115742","https://openalex.org/W3006677114","https://openalex.org/W6668570621","https://openalex.org/W6676491728","https://openalex.org/W7071948177"],"related_works":["https://openalex.org/W2006324351","https://openalex.org/W2965421953","https://openalex.org/W2349895019","https://openalex.org/W2116074880","https://openalex.org/W2950423922","https://openalex.org/W2121780490","https://openalex.org/W2070977815","https://openalex.org/W2137136732","https://openalex.org/W2132113279","https://openalex.org/W2113224065"],"abstract_inverted_index":{"In":[0,71],"current":[1],"intrusion":[2,19],"detection,":[3],"redundant":[4],"features":[5],"often":[6],"lead":[7],"to":[8,40,98],"the":[9,49,67,74,91,99,105,109],"degradation":[10],"of":[11,108],"detection":[12,20],"accuracy.":[13],"Aiming":[14],"at":[15],"this":[16,72],"problem,":[17],"an":[18],"algorithm":[21,32,79],"based":[22],"on":[23],"correlation":[24],"information":[25,36],"entropy":[26,37],"and":[27,104],"binary":[28],"particle":[29,76],"swarm":[30,77],"optimization":[31,78],"was":[33,38,52,95,111],"proposed.":[34],"Correlation":[35],"used":[39,65],"sort":[41],"features.":[42,47],"This":[43],"can":[44],"filter":[45],"irrelevant":[46],"So":[48],"feature":[50,62,102],"dimension":[51],"reduced.":[53],"Then":[54],"some":[55],"better":[56,92],"subsets":[57],"that":[58,90],"were":[59,64],"gotten":[60],"from":[61],"sorting":[63],"as":[66],"part":[68],"initial":[69],"population.":[70],"way,":[73],"following":[75],"would":[80],"have":[81],"a":[82],"good":[83],"starting":[84],"point.":[85],"The":[86],"test":[87],"results":[88],"showed":[89],"classification":[93],"performance":[94],"obtained":[96],"according":[97],"selected":[100],"optimal":[101],"subset,":[103],"testing":[106],"time":[107],"system":[110],"reduced":[112],"effectively.":[113]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
