{"id":"https://openalex.org/W3115814693","doi":"https://doi.org/10.1109/idaacs-sws50031.2020.9297080","title":"Development of Intrusion Monitoring System in Wireless Sensor Networks Based on Neural Networks","display_name":"Development of Intrusion Monitoring System in Wireless Sensor Networks Based on Neural Networks","publication_year":2020,"publication_date":"2020-09-17","ids":{"openalex":"https://openalex.org/W3115814693","doi":"https://doi.org/10.1109/idaacs-sws50031.2020.9297080","mag":"3115814693"},"language":"en","primary_location":{"id":"doi:10.1109/idaacs-sws50031.2020.9297080","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs-sws50031.2020.9297080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031472542","display_name":"Olexander Belej","orcid":"https://orcid.org/0000-0003-4150-7425"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Olexander Belej","raw_affiliation_strings":["Lviv Polytechnic, National University, Lviv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic, National University, Lviv, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040752096","display_name":"Miko\u0142aj Karpi\u0144ski","orcid":"https://orcid.org/0000-0002-8846-332X"},"institutions":[{"id":"https://openalex.org/I62088572","display_name":"University of Bielsko-Bia\u0142a","ror":"https://ror.org/01ew38b77","country_code":"PL","type":"education","lineage":["https://openalex.org/I62088572"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Mikolaj Karpinski","raw_affiliation_strings":["University of Bielsko-Biala, Bielsko-Biala, Poland"],"affiliations":[{"raw_affiliation_string":"University of Bielsko-Biala, Bielsko-Biala, Poland","institution_ids":["https://openalex.org/I62088572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090262067","display_name":"Aigul Shaikhanova","orcid":"https://orcid.org/0000-0001-6006-4813"},"institutions":[{"id":"https://openalex.org/I4210159258","display_name":"Shakarim State University Of Semey","ror":"https://ror.org/052q3p191","country_code":"KZ","type":"education","lineage":["https://openalex.org/I4210159258"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Aigul Shaikhanova","raw_affiliation_strings":["Shakarim State University of Semey, Semey city, Republic of Kazakhstan"],"affiliations":[{"raw_affiliation_string":"Shakarim State University of Semey, Semey city, Republic of Kazakhstan","institution_ids":["https://openalex.org/I4210159258"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075857411","display_name":"Olga Veselska","orcid":"https://orcid.org/0000-0002-4914-2187"},"institutions":[{"id":"https://openalex.org/I62088572","display_name":"University of Bielsko-Bia\u0142a","ror":"https://ror.org/01ew38b77","country_code":"PL","type":"education","lineage":["https://openalex.org/I62088572"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Olga Veselska","raw_affiliation_strings":["University of Bielsko-Biala, Bielsko-Biala, Poland"],"affiliations":[{"raw_affiliation_string":"University of Bielsko-Biala, Bielsko-Biala, Poland","institution_ids":["https://openalex.org/I62088572"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054118156","display_name":"Azamat Azatov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Azamat Azatov","raw_affiliation_strings":["Kazakh Humanitarian Law Innovative University, Semey, EKR, Kazakhstan"],"affiliations":[{"raw_affiliation_string":"Kazakh Humanitarian Law Innovative University, Semey, EKR, Kazakhstan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5031472542"],"corresponding_institution_ids":["https://openalex.org/I98435010"],"apc_list":null,"apc_paid":null,"fwci":0.3084,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62831918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9611999988555908,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8916833400726318},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7368547916412354},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.6593929529190063},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6065316796302795},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5971534848213196},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5804802179336548},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5619969367980957},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4366389513015747},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.4176541566848755},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3819415271282196},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37995001673698425},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.3342553377151489},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3125962018966675},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22150969505310059}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8916833400726318},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7368547916412354},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.6593929529190063},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6065316796302795},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5971534848213196},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5804802179336548},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5619969367980957},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4366389513015747},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.4176541566848755},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3819415271282196},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37995001673698425},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.3342553377151489},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3125962018966675},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22150969505310059},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idaacs-sws50031.2020.9297080","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs-sws50031.2020.9297080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1984380191","https://openalex.org/W2023441504","https://openalex.org/W2043139445","https://openalex.org/W2507641887","https://openalex.org/W2557714628","https://openalex.org/W2667176594","https://openalex.org/W2770549600","https://openalex.org/W2896648461","https://openalex.org/W2911702988","https://openalex.org/W2979029564","https://openalex.org/W6755347272"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W3148526535","https://openalex.org/W2374614522","https://openalex.org/W2359460876","https://openalex.org/W2350900992","https://openalex.org/W2394461323","https://openalex.org/W3140688961","https://openalex.org/W2355007334","https://openalex.org/W1807418813","https://openalex.org/W2228468079"],"abstract_inverted_index":{"Network":[0],"attack":[1,18],"detection":[2,24,45,79,98,108,116],"is":[3,47,100],"currently":[4],"one":[5],"of":[6,42,51,56,74,95,106,113,123],"the":[7,48,67,72,81,96,104,114,120,124],"most":[8],"important":[9],"problems":[10],"in":[11,77],"network":[12,22,29,43],"technologies.":[13],"In":[14],"addition":[15],"to":[16,84,102],"proactive":[17],"mitigation,":[19],"they":[20],"use":[21,85],"intrusion":[23,44,78,97,107,115],"systems":[25,46],"that":[26],"scan":[27],"all":[28],"traffic":[30],"and":[31,64,118],"signal":[32],"it":[33],"if":[34],"any":[35],"anomalies":[36],"are":[37],"found.":[38],"The":[39,93],"main":[40],"problem":[41,73],"low":[49],"efficiency":[50],"detecting":[52],"fundamentally":[53],"new":[54],"types":[55],"intrusions,":[57],"which":[58],"have":[59],"not":[60],"yet":[61],"been":[62],"studied":[63],"entered":[65],"into":[66],"signature":[68],"database.":[69],"To":[70],"solve":[71],"false":[75],"positives":[76],"systems,":[80],"authors":[82],"propose":[83],"heuristic":[86,111],"methods":[87],"for":[88],"making":[89],"decisions":[90],"about":[91],"intrusions.":[92],"method":[94],"system":[99,117],"proposed":[101],"increase":[103,119],"reliability":[105],"using":[109],"a":[110],"model":[112],"battery":[121],"life":[122],"system.":[125]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
