{"id":"https://openalex.org/W2172201321","doi":"https://doi.org/10.1109/fuzz.2003.1206610","title":"Fuzzy feature extraction and visualization for intrusion detection","display_name":"Fuzzy feature extraction and visualization for intrusion detection","publication_year":2004,"publication_date":"2004-02-03","ids":{"openalex":"https://openalex.org/W2172201321","doi":"https://doi.org/10.1109/fuzz.2003.1206610","mag":"2172201321"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz.2003.1206610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz.2003.1206610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056574051","display_name":"Jianqiang Xin","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jianqiang Xin","raw_affiliation_strings":["Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075653014","display_name":"J.E. Dickerson","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J.E. Dickerson","raw_affiliation_strings":["Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077949687","display_name":"Julie Dickerson","orcid":"https://orcid.org/0000-0003-4973-5641"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J.A. Dickerson","raw_affiliation_strings":["Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056574051"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":3.5976,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.93299304,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":null,"first_page":"1249","last_page":"1254"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12805","display_name":"Cognitive Science and Mapping","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12805","display_name":"Cognitive Science and Mapping","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11303","display_name":"Bayesian Modeling and Causal Inference","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8198421001434326},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8064022064208984},{"id":"https://openalex.org/keywords/fuse","display_name":"Fuse (electrical)","score":0.7132502198219299},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6982336044311523},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6905723214149475},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.667484700679779},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.643934965133667},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5056459903717041},{"id":"https://openalex.org/keywords/fuzzy-cognitive-map","display_name":"Fuzzy cognitive map","score":0.5028747916221619},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4948078989982605},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.48796600103378296},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.4552837610244751},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.44359079003334045},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.3717415928840637},{"id":"https://openalex.org/keywords/neuro-fuzzy","display_name":"Neuro-fuzzy","score":0.3062676191329956},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12140661478042603},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1167653501033783}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8198421001434326},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8064022064208984},{"id":"https://openalex.org/C141353440","wikidata":"https://www.wikidata.org/wiki/Q182221","display_name":"Fuse (electrical)","level":2,"score":0.7132502198219299},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6982336044311523},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6905723214149475},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.667484700679779},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.643934965133667},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5056459903717041},{"id":"https://openalex.org/C5041914","wikidata":"https://www.wikidata.org/wiki/Q5511107","display_name":"Fuzzy cognitive map","level":5,"score":0.5028747916221619},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4948078989982605},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.48796600103378296},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.4552837610244751},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44359079003334045},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.3717415928840637},{"id":"https://openalex.org/C29470771","wikidata":"https://www.wikidata.org/wiki/Q4165150","display_name":"Neuro-fuzzy","level":4,"score":0.3062676191329956},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12140661478042603},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1167653501033783},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fuzz.2003.1206610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz.2003.1206610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W28210162","https://openalex.org/W654503046","https://openalex.org/W1516506771","https://openalex.org/W1687244664","https://openalex.org/W1890867917","https://openalex.org/W1999427165","https://openalex.org/W2015562474","https://openalex.org/W2051220667","https://openalex.org/W2079676654","https://openalex.org/W2095224843","https://openalex.org/W2150847526","https://openalex.org/W2334327389","https://openalex.org/W6601232705","https://openalex.org/W6621885778"],"related_works":["https://openalex.org/W2354322770","https://openalex.org/W3000097931","https://openalex.org/W1570848052","https://openalex.org/W2373192430","https://openalex.org/W4239268388","https://openalex.org/W1924837940","https://openalex.org/W2379407973","https://openalex.org/W4243305035","https://openalex.org/W2079488604","https://openalex.org/W2125195795"],"abstract_inverted_index":{"The":[0],"Fuzzy":[1],"Intrusion":[2],"Recognition":[3],"Engine":[4],"(FIRE)":[5],"is":[6,31],"a":[7,101],"network":[8],"intrusion":[9,28,58],"detection":[10,29,59],"system":[11,30],"that":[12,37,105],"uses":[13,47],"fuzzy":[14,88,102],"systems":[15],"to":[16,51,72,107,111],"assess":[17],"malicious":[18],"activity":[19],"against":[20],"computer":[21],"networks.":[22],"A":[23],"key":[24,35,77],"part":[25],"of":[26,34,42,55],"an":[27],"the":[32,40,43,53,62,69,109],"selection":[33],"features":[36,54,75],"can":[38,84,96],"characterize":[39,73],"state":[41],"network.":[44],"This":[45],"work":[46],"interactive":[48],"data":[49,70],"visualization":[50],"analyze":[52],"several":[56],"different":[57],"scenarios":[60],"using":[61],"DARPA":[63],"Lincoln":[64],"Labs":[65],"test":[66],"data.":[67],"Visualizing":[68],"helps":[71],"which":[74],"are":[76],"for":[78],"identifying":[79],"intrusions":[80],"and":[81],"if":[82],"they":[83],"be":[85,98],"characterized":[86],"as":[87],"sets":[89],"or":[90],"by":[91],"Boolean":[92],"variables.":[93],"These":[94],"inputs":[95,110],"then":[97],"input":[99],"into":[100],"cognitive":[103],"map":[104],"serves":[106],"fuse":[108],"detect":[112],"more":[113],"complex":[114],"attacks.":[115]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
