{"id":"https://openalex.org/W2102291758","doi":"https://doi.org/10.1109/fuzz.2003.1206614","title":"Fuzzy clustering for intrusion detection","display_name":"Fuzzy clustering for intrusion detection","publication_year":2004,"publication_date":"2004-03-22","ids":{"openalex":"https://openalex.org/W2102291758","doi":"https://doi.org/10.1109/fuzz.2003.1206614","mag":"2102291758"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz.2003.1206614","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz.2003.1206614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044319347","display_name":"Hemanshi Shah","orcid":"https://orcid.org/0000-0002-2379-0637"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]},{"id":"https://openalex.org/I6059380","display_name":"University of Baltimore","ror":"https://ror.org/024gw2733","country_code":"US","type":"education","lineage":["https://openalex.org/I6059380"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"H. Shah","raw_affiliation_strings":["Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, Baltimore, MD, USA","Dept. of Comput. Sci.& Electr. Eng., Maryland Univ., Baltimore, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, Baltimore, MD, USA","institution_ids":["https://openalex.org/I79272384"]},{"raw_affiliation_string":"Dept. of Comput. Sci.& Electr. Eng., Maryland Univ., Baltimore, MD, USA","institution_ids":["https://openalex.org/I6059380"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037044501","display_name":"Jeffrey Undercoffer","orcid":null},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]},{"id":"https://openalex.org/I6059380","display_name":"University of Baltimore","ror":"https://ror.org/024gw2733","country_code":"US","type":"education","lineage":["https://openalex.org/I6059380"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. Undercoffer","raw_affiliation_strings":["Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, Baltimore, MD, USA","Dept. of Comput. Sci.& Electr. Eng., Maryland Univ., Baltimore, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, Baltimore, MD, USA","institution_ids":["https://openalex.org/I79272384"]},{"raw_affiliation_string":"Dept. of Comput. Sci.& Electr. Eng., Maryland Univ., Baltimore, MD, USA","institution_ids":["https://openalex.org/I6059380"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020975010","display_name":"Anupam Joshi","orcid":"https://orcid.org/0000-0002-8641-3193"},"institutions":[{"id":"https://openalex.org/I6059380","display_name":"University of Baltimore","ror":"https://ror.org/024gw2733","country_code":"US","type":"education","lineage":["https://openalex.org/I6059380"]},{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Joshi","raw_affiliation_strings":["Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, Baltimore, MD, USA","Dept. of Comput. Sci.& Electr. Eng., Maryland Univ., Baltimore, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, Baltimore, MD, USA","institution_ids":["https://openalex.org/I79272384"]},{"raw_affiliation_string":"Dept. of Comput. Sci.& Electr. Eng., Maryland Univ., Baltimore, MD, USA","institution_ids":["https://openalex.org/I6059380"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044319347"],"corresponding_institution_ids":["https://openalex.org/I6059380","https://openalex.org/I79272384"],"apc_list":null,"apc_paid":null,"fwci":6.0254,"has_fulltext":false,"cited_by_count":84,"citation_normalized_percentile":{"value":0.96520409,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2","issue":null,"first_page":"1274","last_page":"1278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8195499181747437},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7871859073638916},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.6700685620307922},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6424204111099243},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5520317554473877},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.5334316492080688},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.4916234612464905},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.47755488753318787},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4756324291229248},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36701834201812744},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.318239688873291}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8195499181747437},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7871859073638916},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.6700685620307922},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6424204111099243},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5520317554473877},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.5334316492080688},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.4916234612464905},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.47755488753318787},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4756324291229248},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36701834201812744},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.318239688873291},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fuzz.2003.1206614","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz.2003.1206614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1507179106","https://openalex.org/W1535015034","https://openalex.org/W1583975142","https://openalex.org/W1670263352","https://openalex.org/W1887038067","https://openalex.org/W1890867917","https://openalex.org/W1941427975","https://openalex.org/W2113076747","https://openalex.org/W2150147654","https://openalex.org/W2150847526","https://openalex.org/W3214373139","https://openalex.org/W6628737389","https://openalex.org/W6634829514","https://openalex.org/W6639415379"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W1724519426","https://openalex.org/W2351051591","https://openalex.org/W2369534771","https://openalex.org/W2357468538","https://openalex.org/W1548126107","https://openalex.org/W2209997499"],"abstract_inverted_index":{"The":[0,74,165],"newly":[1,25],"formed":[2,26],"Department":[3],"of":[4,46,77,88,105,108,122,171,186,202,205],"Homeland":[5],"Security":[6],"has":[7],"been":[8],"mandated":[9],"to":[10,14,18,69,83,128,147,161,176,208],"reduce":[11],"America's":[12],"vulnerability":[13],"terrorism.":[15],"In":[16],"addition":[17],"being":[19],"charged":[20],"with":[21],"physical":[22],"protection,":[23],"this":[24],"department":[27],"is":[28,42,82,136],"also":[29],"responsible":[30],"for":[31],"protecting":[32],"the":[33,48,62,123,140,183,199,203],"nation's":[34,49],"critical":[35],"infrastructure.":[36,50],"Protecting":[37],"computer":[38],"systems":[39],"from":[40],"intrusions":[41],"an":[43,89,106,114,120],"important":[44],"aspect":[45],"securing":[47],"We":[51],"are":[52],"exploring":[53],"how":[54],"fuzzy":[55,206],"data":[56,144,151,194,215],"mining":[57,145],"and":[58,99,157,160],"concepts":[59],"introduced":[60],"by":[61],"semantic":[63],"Web":[64],"can":[65,116],"operate":[66],"in":[67],"synergy":[68],"perform":[70],"distributed":[71],"intrusion":[72,79,133],"detection.":[73],"underlying":[75],"premise":[76],"our":[78,132,177,187],"detection":[80,134,190],"model":[81,135],"describe":[84],"attacks":[85],"as":[86,103,119],"instances":[87,104,170],"ontology":[90],"using":[91],"a":[92,109],"semantically":[93],"rich":[94],"language,":[95],"reason":[96],"over":[97,169],"them":[98,102],"subsequently":[100],"classify":[101],"attack":[107],"specific":[110],"type.":[111],"However,":[112],"before":[113],"abnormality":[115],"be":[117,129],"specified":[118,174],"instance":[121],"ontology,":[124],"it":[125],"first":[126,141],"needs":[127],"detected.":[130],"Hence,":[131],"two":[137],"phased,":[138],"where":[139],"phase":[142,167,185],"uses":[143],"techniques":[146],"analyze":[148],"low":[149,192,212],"level":[150,193,213],"streams":[152],"that":[153],"capture":[154],"process,":[155],"system":[156],"network":[158],"states":[159],"detect":[162,209],"anomalous":[163,172],"behavior.":[164],"second":[166],"reasons":[168],"behavior":[173],"according":[175],"ontology.":[178],"This":[179],"paper":[180],"focuses":[181],"on":[182],"initial":[184],"model:":[188],"outlier":[189],"within":[191,211],"streams.":[195,216],"Accordingly,":[196],"we":[197],"present":[198],"preliminary":[200],"results":[201],"use":[204],"clustering":[207],"anomalies":[210],"kernel":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
