{"id":"https://openalex.org/W2944268036","doi":"https://doi.org/10.1109/fuzz-ieee.2019.8859006","title":"Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection","display_name":"Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2944268036","doi":"https://doi.org/10.1109/fuzz-ieee.2019.8859006","mag":"2944268036"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz-ieee.2019.8859006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2019.8859006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://nrl.northumbria.ac.uk/id/eprint/38822/1/PID5871841.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007051028","display_name":"Noe Elisa","orcid":"https://orcid.org/0000-0002-5558-9647"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Noe Elisa","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, UK","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065079117","display_name":"Longzhi Yang","orcid":"https://orcid.org/0000-0003-2115-4909"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Longzhi Yang","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, UK","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068016934","display_name":"Xin Fu","orcid":"https://orcid.org/0000-0003-4015-0778"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Fu","raw_affiliation_strings":["School of Management, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, UK"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, UK","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007051028"],"corresponding_institution_ids":["https://openalex.org/I32394136"],"apc_list":null,"apc_paid":null,"fwci":0.9923,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.7354092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12576","display_name":"vaccines and immunoinformatics approaches","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7577637434005737},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7009413838386536},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6838843822479248},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5938036441802979},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5833556652069092},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5403071045875549},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5118202567100525},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5042763948440552},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4969816505908966},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4963398575782776},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4924808442592621},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.48030441999435425},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4717182517051697},{"id":"https://openalex.org/keywords/fuzzy-inference","display_name":"Fuzzy inference","score":0.4345269203186035},{"id":"https://openalex.org/keywords/fuzzy-inference-system","display_name":"Fuzzy inference system","score":0.4187326729297638},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39537057280540466},{"id":"https://openalex.org/keywords/adaptive-neuro-fuzzy-inference-system","display_name":"Adaptive neuro fuzzy inference system","score":0.2777610123157501},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.2614730894565582}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7577637434005737},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7009413838386536},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6838843822479248},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5938036441802979},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5833556652069092},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5403071045875549},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5118202567100525},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5042763948440552},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4969816505908966},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4963398575782776},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4924808442592621},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.48030441999435425},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4717182517051697},{"id":"https://openalex.org/C2986395286","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy inference","level":5,"score":0.4345269203186035},{"id":"https://openalex.org/C2987376176","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy inference system","level":5,"score":0.4187326729297638},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39537057280540466},{"id":"https://openalex.org/C186108316","wikidata":"https://www.wikidata.org/wiki/Q352530","display_name":"Adaptive neuro fuzzy inference system","level":4,"score":0.2777610123157501},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.2614730894565582},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/fuzz-ieee.2019.8859006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2019.8859006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},{"id":"pmh:oai:nrl.northumbria.ac.uk:38822","is_oa":true,"landing_page_url":null,"pdf_url":"http://nrl.northumbria.ac.uk/id/eprint/38822/1/PID5871841.pdf","source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Book Section"}],"best_oa_location":{"id":"pmh:oai:nrl.northumbria.ac.uk:38822","is_oa":true,"landing_page_url":null,"pdf_url":"http://nrl.northumbria.ac.uk/id/eprint/38822/1/PID5871841.pdf","source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Book Section"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2944268036.pdf","grobid_xml":"https://content.openalex.org/works/W2944268036.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1481915258","https://openalex.org/W1570448133","https://openalex.org/W1942111125","https://openalex.org/W1992176519","https://openalex.org/W2013198395","https://openalex.org/W2038683228","https://openalex.org/W2058657545","https://openalex.org/W2079325629","https://openalex.org/W2118599924","https://openalex.org/W2126120381","https://openalex.org/W2156715830","https://openalex.org/W2296509296","https://openalex.org/W2468072172","https://openalex.org/W2750004798","https://openalex.org/W2768881458","https://openalex.org/W2807997445","https://openalex.org/W2883435185","https://openalex.org/W2887733428","https://openalex.org/W2887890150","https://openalex.org/W4249749961","https://openalex.org/W4285719527","https://openalex.org/W6753885085"],"related_works":["https://openalex.org/W3049253145","https://openalex.org/W2140069467","https://openalex.org/W2353340517","https://openalex.org/W4285030048","https://openalex.org/W2098652397","https://openalex.org/W4386337832","https://openalex.org/W2953622168","https://openalex.org/W2983346692","https://openalex.org/W2587667809","https://openalex.org/W2918889792"],"abstract_inverted_index":{"Dendritic":[0],"cell":[1],"algorithm":[2,8],"(DCA)":[3],"is":[4,10,93],"an":[5,113],"immune-inspired":[6],"classification":[7,104,186],"which":[9,58],"developed":[11],"for":[12,115,141],"the":[13,70,80,87,117,123,127,136,142,161,172,176,180],"purpose":[14],"of":[15,36,91,122,185],"anomaly":[16],"detection":[17,30],"in":[18,27,183],"computer":[19],"networks.":[20],"The":[21,65,150,169],"DCA":[22,71,124,182],"uses":[23],"a":[24,147],"weighted":[25,66],"function":[26,67],"its":[28],"context":[29,50,120],"phase":[31],"to":[32,47,62,96,101,160],"process":[33],"three":[34,48,118],"categories":[35],"input":[37],"signals":[38],"including":[39],"safe,":[40],"danger":[41],"and":[42,56,155,166],"pathogenic":[43],"associated":[44],"molecular":[45],"pattern":[46],"output":[49,119],"values":[51,121],"termed":[52],"as":[53],"co-stimulatory,":[54],"mature":[55],"semi-mature,":[57],"are":[59,138],"then":[60],"used":[61,68],"perform":[63],"classification.":[64],"by":[69,79,125,157],"requires":[72],"either":[73],"manually":[74],"pre-defined":[75],"weights":[76,85,137],"usually":[77],"provided":[78,143],"immunologists,":[81],"or":[82],"empirically":[83],"derived":[84],"from":[86,171],"training":[88],"dataset.":[89],"Neither":[90],"these":[92],"sufficiently":[94],"flexible":[95],"work":[97,111],"with":[98],"different":[99],"datasets":[100,164],"produce":[102],"optimum":[103],"result.":[105],"To":[106],"address":[107],"such":[108,134],"limitation,":[109],"this":[110],"proposes":[112],"approach":[114,152,178],"computing":[116],"employing":[126],"recently":[128],"proposed":[129,151,177],"TSK+":[130],"fuzzy":[131],"inference":[132],"system,":[133],"that":[135],"always":[139],"optimal":[140],"data":[144],"set":[145],"regarding":[146],"specific":[148],"application.":[149],"was":[153],"validated":[154],"evaluated":[156],"applying":[158],"it":[159],"two":[162],"popular":[163],"KDD99":[165],"UNSW":[167],"NB15.":[168],"results":[170],"experiments":[173],"demonstrate":[174],"that,":[175],"outperforms":[179],"conventional":[181],"terms":[184],"accuracy.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-20T20:47:17.329874","created_date":"2025-10-10T00:00:00"}
