{"id":"https://openalex.org/W2031183291","doi":"https://doi.org/10.1109/icnc.2010.5583250","title":"A novel model of IDS based on automatic clustering number determination","display_name":"A novel model of IDS based on automatic clustering number determination","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2031183291","doi":"https://doi.org/10.1109/icnc.2010.5583250","mag":"2031183291"},"language":"en","primary_location":{"id":"doi:10.1109/icnc.2010.5583250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc.2010.5583250","pdf_url":null,"source":{"id":"https://openalex.org/S4363608012","display_name":"2010 Sixth International Conference on Natural Computation","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Natural Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084494795","display_name":"Jing Zhong","orcid":"https://orcid.org/0000-0003-4593-4897"},"institutions":[{"id":"https://openalex.org/I50180762","display_name":"Chongqing Three Gorges University","ror":"https://ror.org/05rs3pv16","country_code":"CN","type":"education","lineage":["https://openalex.org/I50180762"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Zhong","raw_affiliation_strings":["College of Mathematics and Computer Science, Chongqing Three Gorges University, Chongqing, China","College of Mathematics and Computer Science, Chongqing Three Gorges University, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Chongqing Three Gorges University, Chongqing, China","institution_ids":["https://openalex.org/I50180762"]},{"raw_affiliation_string":"College of Mathematics and Computer Science, Chongqing Three Gorges University, China","institution_ids":["https://openalex.org/I50180762"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101990706","display_name":"Jiang Xiong","orcid":"https://orcid.org/0000-0002-3836-6396"},"institutions":[{"id":"https://openalex.org/I50180762","display_name":"Chongqing Three Gorges University","ror":"https://ror.org/05rs3pv16","country_code":"CN","type":"education","lineage":["https://openalex.org/I50180762"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiang Xiong","raw_affiliation_strings":["College of Mathematics and Computer Science, Chongqing Three Gorges University, Chongqing, China","College of Mathematics and Computer Science, Chongqing Three Gorges University, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Chongqing Three Gorges University, Chongqing, China","institution_ids":["https://openalex.org/I50180762"]},{"raw_affiliation_string":"College of Mathematics and Computer Science, Chongqing Three Gorges University, China","institution_ids":["https://openalex.org/I50180762"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047378133","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0000-0001-5858-5070"},"institutions":[{"id":"https://openalex.org/I50180762","display_name":"Chongqing Three Gorges University","ror":"https://ror.org/05rs3pv16","country_code":"CN","type":"education","lineage":["https://openalex.org/I50180762"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["College of Mathematics and Computer Science, Chongqing Three Gorges University, Chongqing, China","College of Mathematics and Computer Science, Chongqing Three Gorges University, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Chongqing Three Gorges University, Chongqing, China","institution_ids":["https://openalex.org/I50180762"]},{"raw_affiliation_string":"College of Mathematics and Computer Science, Chongqing Three Gorges University, China","institution_ids":["https://openalex.org/I50180762"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009507546","display_name":"Hongjuan Wu","orcid":"https://orcid.org/0000-0002-0938-7606"},"institutions":[{"id":"https://openalex.org/I50180762","display_name":"Chongqing Three Gorges University","ror":"https://ror.org/05rs3pv16","country_code":"CN","type":"education","lineage":["https://openalex.org/I50180762"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongjuan Wu","raw_affiliation_strings":["College of Mathematics and Computer Science, Chongqing Three Gorges University, Chongqing, China","College of Mathematics and Computer Science, Chongqing Three Gorges University, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Chongqing Three Gorges University, Chongqing, China","institution_ids":["https://openalex.org/I50180762"]},{"raw_affiliation_string":"College of Mathematics and Computer Science, Chongqing Three Gorges University, China","institution_ids":["https://openalex.org/I50180762"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084494795"],"corresponding_institution_ids":["https://openalex.org/I50180762"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.1930981,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"832","last_page":"836"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7890480756759644},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6429335474967957},{"id":"https://openalex.org/keywords/fuzzy-clustering","display_name":"Fuzzy clustering","score":0.6229430437088013},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5812833309173584},{"id":"https://openalex.org/keywords/correlation-clustering","display_name":"Correlation clustering","score":0.551970899105072},{"id":"https://openalex.org/keywords/canopy-clustering-algorithm","display_name":"Canopy clustering algorithm","score":0.5193889737129211},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4922443926334381},{"id":"https://openalex.org/keywords/data-stream-clustering","display_name":"Data stream clustering","score":0.47909238934516907},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4751448631286621},{"id":"https://openalex.org/keywords/cure-data-clustering-algorithm","display_name":"CURE data clustering algorithm","score":0.47512608766555786},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.46093741059303284},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4429626166820526},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.41552847623825073}],"concepts":[{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7890480756759644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6429335474967957},{"id":"https://openalex.org/C17212007","wikidata":"https://www.wikidata.org/wiki/Q5511111","display_name":"Fuzzy clustering","level":3,"score":0.6229430437088013},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5812833309173584},{"id":"https://openalex.org/C94641424","wikidata":"https://www.wikidata.org/wiki/Q5172845","display_name":"Correlation clustering","level":3,"score":0.551970899105072},{"id":"https://openalex.org/C104047586","wikidata":"https://www.wikidata.org/wiki/Q5033439","display_name":"Canopy clustering algorithm","level":4,"score":0.5193889737129211},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4922443926334381},{"id":"https://openalex.org/C193143536","wikidata":"https://www.wikidata.org/wiki/Q5227360","display_name":"Data stream clustering","level":5,"score":0.47909238934516907},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4751448631286621},{"id":"https://openalex.org/C33704608","wikidata":"https://www.wikidata.org/wiki/Q5014717","display_name":"CURE data clustering algorithm","level":4,"score":0.47512608766555786},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.46093741059303284},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4429626166820526},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.41552847623825073}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnc.2010.5583250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc.2010.5583250","pdf_url":null,"source":{"id":"https://openalex.org/S4363608012","display_name":"2010 Sixth International Conference on Natural Computation","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Natural Computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1563088657","https://openalex.org/W1884606608","https://openalex.org/W1887038067","https://openalex.org/W1890867917","https://openalex.org/W1943383135","https://openalex.org/W2158078575","https://openalex.org/W2161995126","https://openalex.org/W2168993425","https://openalex.org/W4213370123","https://openalex.org/W6639223989","https://openalex.org/W6683383647"],"related_works":["https://openalex.org/W2892323093","https://openalex.org/W2117838073","https://openalex.org/W2361242132","https://openalex.org/W3071522575","https://openalex.org/W3140018618","https://openalex.org/W2353443653","https://openalex.org/W2374506950","https://openalex.org/W2556490192","https://openalex.org/W2596632494","https://openalex.org/W4312412183"],"abstract_inverted_index":{"To":[0],"address":[1],"the":[2,32,41,65,73,82,90,100,115],"problem":[3],"of":[4,75,92],"how":[5],"to":[6,30,62,98,131],"pre-define":[7],"a":[8,15,57],"clustering":[9,16,33,138,161],"number":[10,34,162],"in":[11,35,125,160],"Fuzzy":[12],"C-means":[13,20],"algorithm(FCM),":[14],"algorithm,":[17],"F-CMSVM,":[18],"(Fuzzy":[19],"and":[21,114,164],"Support":[22],"Vector":[23],"Machine":[24],"algorithm),":[25],"is":[26,44,61,96,118,121,128],"proposed":[27],"so":[28],"as":[29],"determine":[31],"an":[36,122],"automatic":[37],"way.":[38],"Above":[39],"all,":[40],"data":[42,66,107,134,154],"set":[43,67,135],"classified":[45],"into":[46,94],"two":[47],"clusters":[48,76],"by":[49,80,89],"FCM.":[50],"Then,":[51],"support":[52],"vector":[53],"machine":[54],"(SVM)":[55],"with":[56],"fuzzy":[58,101],"membership":[59,102],"function":[60],"testify":[63],"whether":[64],"can":[68,77,109],"be":[69,78,99],"further":[70],"classified.":[71],"Thus,":[72],"result":[74],"obtained":[79,88],"repeating":[81],"computation":[83],"process.":[84],"Because":[85],"affiliating":[86],"matrix,":[87],"introduction":[91],"SVM":[93],"FCM,":[95],"defined":[97],"function,":[103],"each":[104],"different":[105,111],"input":[106],"sample":[108],"have":[110],"penalty":[112],"value,":[113],"separating":[116],"hyper-plane":[117],"optimized.":[119],"F-CMSVM":[120,156],"unsupervised":[123],"algorithm":[124],"which":[126],"it":[127],"neither":[129],"needed":[130],"label":[132],"training":[133],"nor":[136],"specify":[137],"number.":[139],"As":[140],"shown":[141],"from":[142,150],"our":[143],"simulation":[144],"experiment":[145],"over":[146],"networks":[147],"connection":[148],"records":[149],"KDD":[151],"CUP":[152],"1999":[153],"set,":[155],"has":[157],"efficient":[158],"performance":[159],"optimization":[163],"intrusion":[165],"detection.":[166]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
