{"id":"https://openalex.org/W3093940796","doi":"https://doi.org/10.1109/icccnt49239.2020.9225415","title":"AI Based Intrusion Detection System Using Self-Adaptive Energy Efficient BAT Algorithm for Software Defined IoT Networks","display_name":"AI Based Intrusion Detection System Using Self-Adaptive Energy Efficient BAT Algorithm for Software Defined IoT Networks","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093940796","doi":"https://doi.org/10.1109/icccnt49239.2020.9225415","mag":"3093940796"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225415","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022539172","display_name":"Geethu M Suresh","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Geethu M Suresh","raw_affiliation_strings":["Sree Buddha College of Engineering, Kerala, India"],"affiliations":[{"raw_affiliation_string":"Sree Buddha College of Engineering, Kerala, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088032070","display_name":"Minu Lalitha Madhavu","orcid":"https://orcid.org/0000-0002-5551-299X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minu Lalitha Madhavu","raw_affiliation_strings":["Sree Buddha College of Engineering, Kerala, India"],"affiliations":[{"raw_affiliation_string":"Sree Buddha College of Engineering, Kerala, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022539172"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4625,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.67397945,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.811080813407898},{"id":"https://openalex.org/keywords/bat-algorithm","display_name":"Bat algorithm","score":0.6760948896408081},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6112809181213379},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5673341751098633},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5590465068817139},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.4795648455619812},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4623912572860718},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43235477805137634},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.334720253944397},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.295126736164093},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24026155471801758},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22593620419502258}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.811080813407898},{"id":"https://openalex.org/C5351157","wikidata":"https://www.wikidata.org/wiki/Q4868485","display_name":"Bat algorithm","level":3,"score":0.6760948896408081},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6112809181213379},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5673341751098633},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5590465068817139},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.4795648455619812},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4623912572860718},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43235477805137634},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.334720253944397},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.295126736164093},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24026155471801758},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22593620419502258},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225415","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1511751452","https://openalex.org/W1935000124","https://openalex.org/W2000924949","https://openalex.org/W2103292786","https://openalex.org/W2293559422","https://openalex.org/W2335999708","https://openalex.org/W2469255646","https://openalex.org/W2560162835","https://openalex.org/W2562908385","https://openalex.org/W2963073179","https://openalex.org/W6730169028","https://openalex.org/W7017641875"],"related_works":["https://openalex.org/W4288714711","https://openalex.org/W3200708550","https://openalex.org/W2736680465","https://openalex.org/W2771637876","https://openalex.org/W4294093918","https://openalex.org/W4240853094","https://openalex.org/W2810496283","https://openalex.org/W2170656329","https://openalex.org/W3131977017","https://openalex.org/W2989745152"],"abstract_inverted_index":{"A":[0],"software":[1],"defined":[2],"IoT":[3,28],"network":[4,17,36,107],"can":[5],"be":[6],"considered":[7],"as":[8,74],"global":[9],"controller":[10],"managing":[11],"all":[12],"the":[13,16,32,35,106,110,139,161],"tasks":[14],"of":[15,26,39,112,166],"like":[18,64],"resource":[19],"sharing,":[20],"traffic":[21,73,108],"management":[22],"and":[23,43,54,57,66,115,168],"effective":[24],"utilization":[25],"individual":[27],"devices":[29],"connected":[30],"to":[31,71,159],"network.":[33],"As":[34],"involves":[37],"transmission":[38],"potential":[40],"data":[41],"intrusions":[42],"other":[44],"vulnerabilities":[45],"may":[46],"arise.":[47],"Traditional":[48],"systems":[49],"uses":[50,55,98],"a":[51,80,127,152],"standard":[52],"dataset":[53,102],"evolutionary":[56],"population":[58],"based":[59,154],"algorithms":[60,70],"for":[61,87,93,101],"feature":[62],"selection":[63],"BAT":[65,85,91,141,150],"well":[67],"known":[68],"classification":[69],"classify":[72],"normal":[75],"or":[76],"attack.":[77],"We":[78],"propose":[79],"novel":[81],"self-adaptive":[82,128],"energy":[83,133,169],"efficient":[84],"algorithm":[86],"achieving":[88],"optimization":[89],"in":[90,164],"Algorithm":[92],"Feature":[94],"selection.":[95],"Existing":[96],"system":[97],"swarm":[99,121],"division":[100,122],"clustering.":[103],"But":[104],"when":[105],"increases":[109,114],"number":[111],"features":[113,117],"non-continuous":[116],"will":[118],"result.":[119],"Hence":[120],"doesn't":[123],"works":[124],"well.":[125],"So":[126],"parallel":[129],"processing":[130],"strategy":[131],"with":[132],"efficiency":[134],"is":[135,157],"proposed":[136],"which":[137],"optimizes":[138],"existing":[140],"algorithm.":[142],"To":[143],"handle":[144],"complex":[145],"batch":[146],"process":[147],"loops":[148],"within":[149],"algorithms,":[151],"fitness":[153],"task":[155],"parallelism":[156],"implemented":[158],"get":[160],"most":[162],"benefit":[163],"terms":[165],"scalability":[167],"efficiency.":[170]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
