{"id":"https://openalex.org/W2111485561","doi":"https://doi.org/10.1109/hicss.2004.1265658","title":"Intrusion sensor data fusion in an intelligent intrusion detection system architecture","display_name":"Intrusion sensor data fusion in an intelligent intrusion detection system architecture","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2111485561","doi":"https://doi.org/10.1109/hicss.2004.1265658","mag":"2111485561"},"language":"en","primary_location":{"id":"doi:10.1109/hicss.2004.1265658","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2004.1265658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110955589","display_name":"A. Siraj","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"A. Siraj","raw_affiliation_strings":["Department of Computer Science & Engineering Center for Computer Security Research, Mississippi State University, USA","Department of Computer Science and Engineering, Mississippi State University, MS, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering Center for Computer Security Research, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Mississippi State University, MS, USA","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087064145","display_name":"Rayford B. Vaughn","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R.B. Vaughn","raw_affiliation_strings":["Department of Computer Science & Engineering Center for Computer Security Research, Mississippi State University, USA","Department of Computer Science and Engineering, Mississippi State University, MS, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering Center for Computer Security Research, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Mississippi State University, MS, USA","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111501188","display_name":"S.M. Bridges","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S.M. Bridges","raw_affiliation_strings":["Department of Computer Science & Engineering Center for Computer Security Research, Mississippi State University, USA","Department of Computer Science and Engineering, Mississippi State University, MS, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering Center for Computer Security Research, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Mississippi State University, MS, USA","institution_ids":["https://openalex.org/I99041443"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110955589"],"corresponding_institution_ids":["https://openalex.org/I99041443"],"apc_list":null,"apc_paid":null,"fwci":4.6213,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.94712705,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"10 pp.","last_page":"10 pp."},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12805","display_name":"Cognitive Science and Mapping","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12805","display_name":"Cognitive Science and Mapping","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11303","display_name":"Bayesian Modeling and Causal Inference","score":0.947700023651123,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8989412784576416},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7156317234039307},{"id":"https://openalex.org/keywords/sensor-fusion","display_name":"Sensor fusion","score":0.5773224830627441},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5309794545173645},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5207000374794006},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.5020444393157959},{"id":"https://openalex.org/keywords/fuzzy-cognitive-map","display_name":"Fuzzy cognitive map","score":0.48804202675819397},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4792171120643616},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.4538300633430481},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4511215388774872},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4447008967399597},{"id":"https://openalex.org/keywords/knowledge-acquisition","display_name":"Knowledge acquisition","score":0.4429861605167389},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44037503004074097},{"id":"https://openalex.org/keywords/expert-system","display_name":"Expert system","score":0.42136555910110474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29703783988952637},{"id":"https://openalex.org/keywords/neuro-fuzzy","display_name":"Neuro-fuzzy","score":0.26332977414131165},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.2387934923171997},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09033709764480591}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8989412784576416},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7156317234039307},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.5773224830627441},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5309794545173645},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5207000374794006},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.5020444393157959},{"id":"https://openalex.org/C5041914","wikidata":"https://www.wikidata.org/wiki/Q5511107","display_name":"Fuzzy cognitive map","level":5,"score":0.48804202675819397},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4792171120643616},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.4538300633430481},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4511215388774872},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4447008967399597},{"id":"https://openalex.org/C2777220311","wikidata":"https://www.wikidata.org/wiki/Q6423340","display_name":"Knowledge acquisition","level":2,"score":0.4429861605167389},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44037503004074097},{"id":"https://openalex.org/C58328972","wikidata":"https://www.wikidata.org/wiki/Q184609","display_name":"Expert system","level":2,"score":0.42136555910110474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29703783988952637},{"id":"https://openalex.org/C29470771","wikidata":"https://www.wikidata.org/wiki/Q4165150","display_name":"Neuro-fuzzy","level":4,"score":0.26332977414131165},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.2387934923171997},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09033709764480591},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/hicss.2004.1265658","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2004.1265658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.96.9615","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.9615","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://csdl.computer.org/comp/proceedings/hicss/2004/2056/09/205690279c.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1501162218","https://openalex.org/W1509467863","https://openalex.org/W1516443426","https://openalex.org/W1561159328","https://openalex.org/W1585005850","https://openalex.org/W1598733259","https://openalex.org/W1599790193","https://openalex.org/W1838112905","https://openalex.org/W1892014502","https://openalex.org/W1992820542","https://openalex.org/W2095224843","https://openalex.org/W2103613587","https://openalex.org/W2145301614","https://openalex.org/W2156697706","https://openalex.org/W2156854121","https://openalex.org/W2622105632","https://openalex.org/W6630077370","https://openalex.org/W6631034356","https://openalex.org/W6635046848","https://openalex.org/W6635930068","https://openalex.org/W6638946015","https://openalex.org/W6648139719","https://openalex.org/W6739076064"],"related_works":["https://openalex.org/W2063798559","https://openalex.org/W2991207020","https://openalex.org/W1661487699","https://openalex.org/W2359218533","https://openalex.org/W2168903966","https://openalex.org/W182930519","https://openalex.org/W2005785555","https://openalex.org/W2030203886","https://openalex.org/W2752593466","https://openalex.org/W1786747378"],"abstract_inverted_index":{"Most":[0],"modern":[1],"intrusion":[2,7,20,52,61],"detection":[3,21,53,62],"systems":[4],"employ":[5],"multiple":[6],"sensors":[8,63],"to":[9,28,85],"maximize":[10],"their":[11],"trustworthiness.":[12],"The":[13,69],"overall":[14],"security":[15],"view":[16],"of":[17,100],"the":[18,30,33,87,98,101,110,116],"multi-sensor":[19],"system":[22,54],"can":[23],"serve":[24],"as":[25],"an":[26,50,65],"aid":[27],"appraise":[29],"trustworthiness":[31],"in":[32,41],"system.":[34],"This":[35],"paper":[36],"presents":[37],"our":[38],"research":[39],"effort":[40],"that":[42,56,104],"direction":[43],"by":[44],"describing":[45],"a":[46],"decision":[47,70,102],"engine":[48,71,103],"for":[49,80,118],"intelligent":[51],"(IIDS)":[55],"fuses":[57],"information":[58],"from":[59],"different":[60],"using":[64],"artificial":[66],"intelligence":[67],"technique.":[68],"uses":[72],"fuzzy":[73,78],"cognitive":[74],"maps":[75],"(FCMs)":[76],"and":[77,84],"rule-bases":[79],"causal":[81,88],"knowledge":[82,89],"acquisition":[83],"support":[86],"reasoning":[90],"process.":[91],"In":[92],"this":[93],"paper,":[94],"we":[95],"report":[96],"on":[97],"workings":[99],"has":[105],"been":[106],"successfully":[107],"embedded":[108],"into":[109],"IIDS":[111],"architecture":[112],"being":[113],"built":[114],"at":[115],"Center":[117],"Computer":[119],"Security":[120],"Research":[121],"(CCSR),":[122],"Mississippi":[123],"State":[124],"University.":[125]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
