{"id":"https://openalex.org/W2110128755","doi":"https://doi.org/10.1109/icmlc.2011.6016820","title":"Intrusion detection analysis by integrating roulette wheel and pseudo-random into back propagation networks","display_name":"Intrusion detection analysis by integrating roulette wheel and pseudo-random into back propagation networks","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2110128755","doi":"https://doi.org/10.1109/icmlc.2011.6016820","mag":"2110128755"},"language":"en","primary_location":{"id":"doi:10.1109/icmlc.2011.6016820","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmlc.2011.6016820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Machine Learning and Cybernetics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050234405","display_name":"Ruey\u2010Maw Chen","orcid":"https://orcid.org/0000-0003-0738-6340"},"institutions":[{"id":"https://openalex.org/I65446980","display_name":"National Chin-Yi University of Technology","ror":"https://ror.org/040bs6h16","country_code":"TW","type":"education","lineage":["https://openalex.org/I65446980"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ruey-Maw Chen","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung, Taiwan","Department of Computer Science and Information Engineering, National Chinyi University of Technology, Taiping, Taichung, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I65446980"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chinyi University of Technology, Taiping, Taichung, Taiwan, ROC","institution_ids":["https://openalex.org/I65446980"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047921638","display_name":"Chun-Han Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I65446980","display_name":"National Chin-Yi University of Technology","ror":"https://ror.org/040bs6h16","country_code":"TW","type":"education","lineage":["https://openalex.org/I65446980"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chun-Han Feng","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung, Taiwan","Department of Computer Science and Information Engineering, National Chinyi University of Technology, Taiping, Taichung, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I65446980"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chinyi University of Technology, Taiping, Taichung, Taiwan, ROC","institution_ids":["https://openalex.org/I65446980"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050234405"],"corresponding_institution_ids":["https://openalex.org/I65446980"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.17759717,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"751","last_page":"756"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7554062604904175},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7384626865386963},{"id":"https://openalex.org/keywords/roulette","display_name":"Roulette","score":0.7006832361221313},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6729177832603455},{"id":"https://openalex.org/keywords/fitness-proportionate-selection","display_name":"Fitness proportionate selection","score":0.6404944658279419},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4503912627696991},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.397394061088562},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38339507579803467},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3545251488685608},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.22042009234428406},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13583040237426758}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7554062604904175},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7384626865386963},{"id":"https://openalex.org/C195502155","wikidata":"https://www.wikidata.org/wiki/Q2810237","display_name":"Roulette","level":2,"score":0.7006832361221313},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6729177832603455},{"id":"https://openalex.org/C99701942","wikidata":"https://www.wikidata.org/wiki/Q5455479","display_name":"Fitness proportionate selection","level":4,"score":0.6404944658279419},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4503912627696991},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.397394061088562},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38339507579803467},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3545251488685608},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.22042009234428406},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13583040237426758},{"id":"https://openalex.org/C176066374","wikidata":"https://www.wikidata.org/wiki/Q629118","display_name":"Fitness function","level":3,"score":0.0},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icmlc.2011.6016820","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmlc.2011.6016820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Machine Learning and Cybernetics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321040","display_name":"National Science Council","ror":"https://ror.org/02kv4zf79"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W192309743","https://openalex.org/W199536678","https://openalex.org/W622660848","https://openalex.org/W1545453017","https://openalex.org/W1624921370","https://openalex.org/W1754973314","https://openalex.org/W1978845641","https://openalex.org/W1995064042","https://openalex.org/W2100215068","https://openalex.org/W2129429132","https://openalex.org/W2141254179","https://openalex.org/W2154929945","https://openalex.org/W4246599888","https://openalex.org/W4285719527","https://openalex.org/W6608020875","https://openalex.org/W6637979372","https://openalex.org/W6675021112"],"related_works":["https://openalex.org/W2352457515","https://openalex.org/W10353878","https://openalex.org/W1551685641","https://openalex.org/W2444625575","https://openalex.org/W2019155878","https://openalex.org/W1571753398","https://openalex.org/W2350426988","https://openalex.org/W1480497081","https://openalex.org/W2367853453","https://openalex.org/W2380104038"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,9,112,126],"is":[2,33,42],"a":[3,20,28,47,58],"critical":[4],"component":[5],"of":[6,16,46,49,96],"network":[7,17,62,78],"security;":[8],"schemes":[10],"fundamentally":[11],"use":[12],"the":[13,65,82,92],"observed":[14],"characteristics":[15,45],"packets":[18],"as":[19,91],"basis":[21],"for":[22,114,128],"such":[23],"determinations.":[24],"In":[25],"this":[26,97],"study,":[27],"cluster":[29,40],"center":[30,41],"distance":[31],"method":[32,69],"applied":[34],"to":[35,55,80],"classify":[36],"packet":[37,51,84,94],"type.":[38,85],"The":[39],"determined":[43],"using":[44],"portion":[48],"selected":[50],"data":[52,87],"samples":[53,95],"prior":[54],"detecting.":[56],"Meanwhile,":[57],"well-known":[59],"back-propagation":[60],"neural":[61],"combined":[63,74,106],"with":[64,75,107,120],"roulette":[66,103],"wheel":[67,104],"selection":[68,105],"and":[70,116],"pseudo-random":[71,121],"rule":[72,122],"are":[73],"back":[76],"propagation":[77],"(BPN)":[79],"determine":[81],"intrusion":[83],"KDDCUP99":[86],"sets":[88],"were":[89],"used":[90],"evaluation":[93],"experiment.":[98],"Simulation":[99],"results":[100],"demonstrate":[101],"that":[102],"BPN":[108,119],"scheme":[109],"provides":[110],"higher":[111,125],"rate":[113,127],"DoS":[115],"R2Lattack":[117],"packets;":[118],"can":[123],"yield":[124],"U2R":[129],"attack":[130],"packets.":[131]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
