{"id":"https://openalex.org/W2782607921","doi":"https://doi.org/10.1109/iciinfs.2016.8262948","title":"Cyber fraud detection using evolving spiking neural network","display_name":"Cyber fraud detection using evolving spiking neural network","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2782607921","doi":"https://doi.org/10.1109/iciinfs.2016.8262948","mag":"2782607921"},"language":"en","primary_location":{"id":"doi:10.1109/iciinfs.2016.8262948","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iciinfs.2016.8262948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference on Industrial and Information Systems (ICIIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036800105","display_name":"Amit Soni Arya","orcid":"https://orcid.org/0000-0001-9178-7256"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Amit Soni Arya","raw_affiliation_strings":["School of Computer and Information Sciences, University of Hyderbad, India"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Sciences, University of Hyderbad, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073505371","display_name":"Vadlamani Ravi","orcid":"https://orcid.org/0000-0003-0082-6227"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vadlamani Ravi","raw_affiliation_strings":["Center of Excellence in Analytics, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Analytics, Hyderabad, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014312194","display_name":"Vadali Tejasviram","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vadali Tejasviram","raw_affiliation_strings":["Center of Excellence in Analytics, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Analytics, Hyderabad, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031399640","display_name":"Neelava Sengupta","orcid":"https://orcid.org/0000-0002-7879-5742"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Neelava Sengupta","raw_affiliation_strings":["KEDRI, Auckland University of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"KEDRI, Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024893012","display_name":"Nikola Kasabov","orcid":"https://orcid.org/0000-0003-4433-7521"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"N. Kasabov","raw_affiliation_strings":["KEDRI, Auckland University of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"KEDRI, Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036800105"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7351,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.76568767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"263","last_page":"268"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10581","display_name":"Neural dynamics and brain function","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12611","display_name":"Neural Networks and Reservoir Computing","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9293959140777588},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8046824932098389},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6737576723098755},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6376508474349976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6277098655700684},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6004716157913208},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5831514000892639},{"id":"https://openalex.org/keywords/spiking-neural-network","display_name":"Spiking neural network","score":0.4706793427467346},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3562854528427124},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3134517967700958}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9293959140777588},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8046824932098389},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6737576723098755},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6376508474349976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6277098655700684},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6004716157913208},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5831514000892639},{"id":"https://openalex.org/C11731999","wikidata":"https://www.wikidata.org/wiki/Q9067355","display_name":"Spiking neural network","level":3,"score":0.4706793427467346},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3562854528427124},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3134517967700958}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iciinfs.2016.8262948","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iciinfs.2016.8262948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference on Industrial and Information Systems (ICIIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W23949839","https://openalex.org/W101771737","https://openalex.org/W126497481","https://openalex.org/W345956458","https://openalex.org/W963811014","https://openalex.org/W1488961907","https://openalex.org/W1529558230","https://openalex.org/W1599105596","https://openalex.org/W1608034581","https://openalex.org/W1636374184","https://openalex.org/W1926086117","https://openalex.org/W1985125279","https://openalex.org/W1987927386","https://openalex.org/W2006370340","https://openalex.org/W2031783473","https://openalex.org/W2039573396","https://openalex.org/W2042013578","https://openalex.org/W2051137788","https://openalex.org/W2060561757","https://openalex.org/W2076964542","https://openalex.org/W2094192378","https://openalex.org/W2112408199","https://openalex.org/W2114475956","https://openalex.org/W2121863487","https://openalex.org/W2130459697","https://openalex.org/W2130589631","https://openalex.org/W2132067420","https://openalex.org/W2152637387","https://openalex.org/W2162003043","https://openalex.org/W2164653071","https://openalex.org/W2167148127","https://openalex.org/W2569813014","https://openalex.org/W4214717370","https://openalex.org/W4238614602","https://openalex.org/W4285719527","https://openalex.org/W6605144752","https://openalex.org/W6631650193","https://openalex.org/W6674070723","https://openalex.org/W6679428380"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W4200017362","https://openalex.org/W4388020458"],"abstract_inverted_index":{"With":[0],"the":[1,5,9,16,48,65,82,91,105,130,148,156],"rapid":[2],"growth":[3],"of":[4,8,32,47,90],"internet,":[6],"most":[7],"businesses":[10],"are":[11,27],"now":[12],"moving":[13],"online.":[14],"Since":[15],"internet":[17],"is":[18,35,64,88,119],"ubiquitous":[19],"and":[20,50,144],"can":[21],"be":[22],"accessed":[23],"from":[24],"anywhere":[25],"websites":[26],"susceptible":[28],"to":[29,52,58,68,80,110],"attacks.":[30,98],"One":[31],"such":[33,70],"attack":[34],"phishing":[36,71,83,97,113],"website":[37,49],"attack.":[38],"In":[39,99],"which":[40],"an":[41],"attacker":[42],"creates":[43],"a":[44,56],"duplicate":[45],"copy":[46],"tries":[51],"pose":[53],"it":[54,63,137],"as":[55],"legitimate":[57],"steal":[59],"user's":[60],"information.":[61],"So":[62],"utmost":[66],"need":[67],"detect":[69,81,111],"websites.":[72,84,114],"Machine":[73],"learning":[74,142,159],"techniques":[75,143],"have":[76,103,135],"been":[77],"successfully":[78],"applied":[79,104],"The":[85,115],"neural":[86,107,117,127,151],"network":[87,108,118,152],"one":[89],"efficient":[92],"ways":[93],"for":[94,129],"detecting":[95],"these":[96,112],"our":[100],"work,":[101],"we":[102,145],"spiking":[106,116,126,150],"approach":[109],"biologically":[120],"inspired":[121],"by":[122],"neuroscience":[123],"literature,":[124],"evolving":[125,149],"classifier":[128],"pattern":[131],"classification":[132],"problem.":[133],"We":[134],"compared":[136],"with":[138],"various":[139],"other":[140],"machine":[141,158],"show":[146],"that":[147],"performs":[153],"better":[154],"than":[155],"existing":[157],"techniques.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-25T14:43:58.451035","created_date":"2025-10-10T00:00:00"}
