{"id":"https://openalex.org/W7141552273","doi":"https://doi.org/10.1109/icce67443.2026.11449661","title":"A Comparative Study of Isolation Forest and Autoencoder Models for Proactive Zero-Day Attack Detection","display_name":"A Comparative Study of Isolation Forest and Autoencoder Models for Proactive Zero-Day Attack Detection","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7141552273","doi":"https://doi.org/10.1109/icce67443.2026.11449661"},"language":null,"primary_location":{"id":"doi:10.1109/icce67443.2026.11449661","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449661","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130802142","display_name":"Shambhavi Anand","orcid":null},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shambhavi Anand","raw_affiliation_strings":["Manipal Academy of Higher Education - Dubai"],"affiliations":[{"raw_affiliation_string":"Manipal Academy of Higher Education - Dubai","institution_ids":["https://openalex.org/I164861460"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121592643","display_name":"Sundus Zehra","orcid":null},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sundus Zehra","raw_affiliation_strings":["Manipal Academy of Higher Education - Dubai"],"affiliations":[{"raw_affiliation_string":"Manipal Academy of Higher Education - Dubai","institution_ids":["https://openalex.org/I164861460"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5130802142"],"corresponding_institution_ids":["https://openalex.org/I164861460"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.9445902,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5439000129699707,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5439000129699707,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.1573999971151352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.041099999099969864,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.7041000127792358},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3700999915599823},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.30550000071525574},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.28200000524520874},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.2800000011920929}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.7041000127792358},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5927000045776367},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.554099977016449},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3700999915599823},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34459999203681946},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30550000071525574},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2944999933242798},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.2800000011920929},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.23829999566078186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce67443.2026.11449661","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449661","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W4385386018"],"related_works":[],"abstract_inverted_index":{"Zero-day":[0],"attacks":[1],"pose":[2],"a":[3,103,121],"major":[4],"risk":[5],"and":[6,63,92,130,145],"are":[7,77],"an":[8],"evolving":[9],"threat":[10],"to":[11,27,47,72,110,114,140,160],"cybersecurity,":[12],"as":[13,125],"they":[14],"exploit":[15],"software":[16],"vulnerabilities":[17],"that":[18,24],"evade":[19],"traditional":[20],"signature-based":[21],"detection":[22,38],"methods":[23],"often":[25],"fail":[26],"recognize":[28],"them.":[29],"To":[30],"address":[31],"this":[32],"challenge,":[33],"machine":[34],"learning":[35],"based":[36],"anomaly":[37,70,87],"approaches":[39,60],"have":[40],"gained":[41],"increased":[42],"attention":[43],"for":[44,69,79,85,94],"their":[45,80,112],"potential":[46],"identify":[48],"unusual":[49],"behaviors":[50],"of":[51,106,147],"emerging":[52],"threats":[53],"attack":[54,118,132],"patterns":[55],"proactively.":[56],"Among":[57],"these,":[58],"two":[59,108],"Isolation":[61,83],"Forest":[62,84],"Autoencoder":[64,93],"models":[65,109],"use":[66],"unsupervised":[67],"techniques":[68],"detection,":[71,119],"distinguish":[73],"malicious":[74],"activities.":[75],"These":[76],"selected":[78],"complementary":[81],"strengths:":[82],"efficient":[86],"isolation":[88],"in":[89,134,150],"high-dimensional":[90],"data,":[91],"capturing":[95],"complex":[96],"nonlinear":[97],"data":[98],"patterns.":[99],"This":[100],"paper":[101],"presents":[102],"comparative":[104],"study":[105,138],"these":[107],"evaluate":[111,141],"ability":[113],"detect":[115],"proactive":[116,162],"zero-day":[117,131,152],"using":[120],"UGRansome":[122],"dataset":[123],"exclusively,":[124],"it":[126],"specifically":[127],"targets":[128],"ransomware":[129],"behaviours":[133],"network":[135],"traffic.":[136],"The":[137],"aims":[139],"the":[142,157],"performance,":[143],"strengths":[144],"limitations":[146],"each":[148],"model":[149],"detecting":[151],"threats.":[153],"Through":[154],"systematic":[155],"experimentation":[156],"research":[158],"contributes":[159],"enhancing":[161],"security":[163],"solutions.":[164]},"counts_by_year":[],"updated_date":"2026-03-29T06:01:01.467347","created_date":"2026-03-28T00:00:00"}
