{"id":"https://openalex.org/W1984925426","doi":"https://doi.org/10.1109/icnc.2010.5583161","title":"IABA: An improved PNN Algorithm for anomaly detection in network security management","display_name":"IABA: An improved PNN Algorithm for anomaly detection in network security management","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W1984925426","doi":"https://doi.org/10.1109/icnc.2010.5583161","mag":"1984925426"},"language":"en","primary_location":{"id":"doi:10.1109/icnc.2010.5583161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc.2010.5583161","pdf_url":null,"source":{"id":"https://openalex.org/S4363608012","display_name":"2010 Sixth International Conference on Natural Computation","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Natural Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100743418","display_name":"Wu Liu","orcid":"https://orcid.org/0000-0001-6259-3049"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wu Liu","raw_affiliation_strings":["Network Research Center of Tsinghua University, Beijing, Beijing, China","[Network Research Center of Tsinghua University, 100084 Beijing, China]"],"affiliations":[{"raw_affiliation_string":"Network Research Center of Tsinghua University, Beijing, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"[Network Research Center of Tsinghua University, 100084 Beijing, China]","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067799841","display_name":"Haixin Duan","orcid":"https://orcid.org/0000-0003-0083-733X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai-xin Duan","raw_affiliation_strings":["Network Research Center of Tsinghua University, Beijing, Beijing, China","[Network Research Center of Tsinghua University, 100084 Beijing, China]"],"affiliations":[{"raw_affiliation_string":"Network Research Center of Tsinghua University, Beijing, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"[Network Research Center of Tsinghua University, 100084 Beijing, China]","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102246689","display_name":"Ping Ren","orcid":"https://orcid.org/0009-0003-3015-5206"},"institutions":[{"id":"https://openalex.org/I126924076","display_name":"Chongqing Normal University","ror":"https://ror.org/01dcw5w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I126924076"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Ren","raw_affiliation_strings":["School of Economics & Management, Chongqing Normal University, Chongqing, P. R. China","[School of Economics & Management, Chongqing Normal University, China]"],"affiliations":[{"raw_affiliation_string":"School of Economics & Management, Chongqing Normal University, Chongqing, P. R. China","institution_ids":["https://openalex.org/I126924076"]},{"raw_affiliation_string":"[School of Economics & Management, Chongqing Normal University, China]","institution_ids":["https://openalex.org/I126924076"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001949272","display_name":"Jianping Wu","orcid":"https://orcid.org/0000-0002-8887-8031"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian-ping Wu","raw_affiliation_strings":["Network Research Center of Tsinghua University, Beijing, Beijing, China","[Network Research Center of Tsinghua University, 100084 Beijing, China]"],"affiliations":[{"raw_affiliation_string":"Network Research Center of Tsinghua University, Beijing, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"[Network Research Center of Tsinghua University, 100084 Beijing, China]","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100743418"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.4342,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68165956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":null,"first_page":"335","last_page":"339"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.785474419593811},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.78114914894104},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.6116166710853577},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6089824438095093},{"id":"https://openalex.org/keywords/probabilistic-neural-network","display_name":"Probabilistic neural network","score":0.5579012632369995},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5361905097961426},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.48009446263313293},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4767245352268219},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4729078710079193},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45336371660232544},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40465033054351807},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35721534490585327},{"id":"https://openalex.org/keywords/time-delay-neural-network","display_name":"Time delay neural network","score":0.15596863627433777},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1147470474243164}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.785474419593811},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78114914894104},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.6116166710853577},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6089824438095093},{"id":"https://openalex.org/C134342201","wikidata":"https://www.wikidata.org/wiki/Q7246859","display_name":"Probabilistic neural network","level":4,"score":0.5579012632369995},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5361905097961426},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.48009446263313293},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4767245352268219},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4729078710079193},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45336371660232544},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40465033054351807},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35721534490585327},{"id":"https://openalex.org/C175202392","wikidata":"https://www.wikidata.org/wiki/Q2434543","display_name":"Time delay neural network","level":3,"score":0.15596863627433777},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1147470474243164},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnc.2010.5583161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc.2010.5583161","pdf_url":null,"source":{"id":"https://openalex.org/S4363608012","display_name":"2010 Sixth International Conference on Natural Computation","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Natural Computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W574174399","https://openalex.org/W1479806302","https://openalex.org/W1554663460","https://openalex.org/W1587265799","https://openalex.org/W1642161394","https://openalex.org/W1717533658","https://openalex.org/W1941427975","https://openalex.org/W1964168965","https://openalex.org/W1988790447","https://openalex.org/W2093488494","https://openalex.org/W2112076978","https://openalex.org/W2134641333","https://openalex.org/W2384220113","https://openalex.org/W6635224074","https://openalex.org/W6636895364","https://openalex.org/W6637611596","https://openalex.org/W6676769703","https://openalex.org/W7070776896"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Anomaly":[0],"Detection":[1],"is":[2],"very":[3],"difficult":[4],"in":[5],"network":[6],"security":[7],"management.":[8],"In":[9],"this":[10],"paper,":[11],"we":[12],"consider":[13],"anomaly":[14],"detection":[15],"using":[16],"an":[17,38],"improved":[18],"probabilistic":[19],"neural":[20],"networks.":[21],"We":[22],"first":[23],"introduce":[24,37],"a":[25],"Basic":[26],"Adaptive":[27,40],"Boost":[28,41],"Algorithm":[29,42],"(BABA)":[30],"and":[31,35],"analysis":[32],"its":[33],"drawbacks":[34],"then":[36],"Improved":[39],"(IABA)":[43],"to":[44],"classify":[45],"the":[46],"detected":[47],"event":[48],"as":[49],"normal":[50],"or":[51],"intrusive.":[52]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
