{"id":"https://openalex.org/W2750772055","doi":"https://doi.org/10.1109/ifsa-scis.2017.8023360","title":"A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring","display_name":"A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2750772055","doi":"https://doi.org/10.1109/ifsa-scis.2017.8023360","mag":"2750772055"},"language":"en","primary_location":{"id":"doi:10.1109/ifsa-scis.2017.8023360","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ifsa-scis.2017.8023360","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems (IFSA-SCIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research-information.bris.ac.uk/files/113238963/PID4781015.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037333179","display_name":"Iv\u00e1n Palomares","orcid":"https://orcid.org/0000-0003-4335-9139"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ivan Palomares","raw_affiliation_strings":["Department of Computer Science, University of Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005926383","display_name":"Harsha Kalutarage","orcid":"https://orcid.org/0000-0001-6430-9558"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Harsha Kalutarage","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen's University, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100764456","display_name":"Yan Huang","orcid":"https://orcid.org/0000-0002-0575-0156"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yan Huang","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen's University, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016552462","display_name":"Paul Miller Robert McCausland","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Miller Robert McCausland","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen's University, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029106535","display_name":"Gavin McWilliams","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gavin McWilliams","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen's University, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5037333179"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":1.6142,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.85442897,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10050","display_name":"Multi-Criteria Decision Making","score":0.9588000178337097,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10050","display_name":"Multi-Criteria Decision Making","score":0.9588000178337097,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10820","display_name":"Fuzzy Logic and Control Systems","score":0.9519000053405762,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9196000099182129,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.7765858769416809},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7034611701965332},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5685901045799255},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4922563135623932},{"id":"https://openalex.org/keywords/data-analysis","display_name":"Data analysis","score":0.4814433455467224},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.47061851620674133},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45705366134643555},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.41137319803237915},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20825612545013428}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.7765858769416809},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7034611701965332},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5685901045799255},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4922563135623932},{"id":"https://openalex.org/C175801342","wikidata":"https://www.wikidata.org/wiki/Q1988917","display_name":"Data analysis","level":2,"score":0.4814433455467224},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.47061851620674133},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45705366134643555},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.41137319803237915},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20825612545013428},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/ifsa-scis.2017.8023360","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ifsa-scis.2017.8023360","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems (IFSA-SCIS)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/2b448e6d-a7a6-4eaa-b0ce-117c349cfa44","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/2b448e6d-a7a6-4eaa-b0ce-117c349cfa44","pdf_url":"https://research-information.bris.ac.uk/files/113238963/PID4781015.pdf","source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Palomares Carrascosa, I, Kalutarage, H, Huang, Y, McCausland, R, Miller, P & McWilliams, G 2017, A fuzzy multicriteria aggregation method for data analytics : application to insider threat monitoring. in 2017 Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems (IFSA-SCIS 2017) : Proceedings of a meeting held 27-30 June 2017, Otsu, Japan. Institute of Electrical and Electronics Engineers (IEEE), pp. 329-334. https://doi.org/10.1109/IFSA-SCIS.2017.8023360","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/d905962c-6aa9-448a-87cc-3799ef726596","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85030852790&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Palomares, I, Kalutarage, H, Huang, Y, Miller, P, McCausland, R & McWilliams, G 2017, A fuzzy multicriteria aggregation method for data analytics: application to insider threat monitoring. in IFSA-SCIS 2017 - Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems: Proceedings., 8023360, Institute of Electrical and Electronics Engineers Inc., 17th Joint World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems, IFSA-SCIS 2017, Otsu, Japan, 27/06/2017. https://doi.org/10.1109/IFSA-SCIS.2017.8023360","raw_type":"info:eu-repo/semantics/bookPart"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/2b448e6d-a7a6-4eaa-b0ce-117c349cfa44","is_oa":false,"landing_page_url":"https://hdl.handle.net/1983/2b448e6d-a7a6-4eaa-b0ce-117c349cfa44","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:research-information.bris.ac.uk:publications/2b448e6d-a7a6-4eaa-b0ce-117c349cfa44","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/2b448e6d-a7a6-4eaa-b0ce-117c349cfa44","pdf_url":"https://research-information.bris.ac.uk/files/113238963/PID4781015.pdf","source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Palomares Carrascosa, I, Kalutarage, H, Huang, Y, McCausland, R, Miller, P & McWilliams, G 2017, A fuzzy multicriteria aggregation method for data analytics : application to insider threat monitoring. in 2017 Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems (IFSA-SCIS 2017) : Proceedings of a meeting held 27-30 June 2017, Otsu, Japan. Institute of Electrical and Electronics Engineers (IEEE), pp. 329-334. https://doi.org/10.1109/IFSA-SCIS.2017.8023360","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2177115845","display_name":null,"funder_award_id":"N508664","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3083000804","display_name":"CSIT 2","funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4804264507","display_name":null,"funder_award_id":"EP/N508664","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2750772055.pdf","grobid_xml":"https://content.openalex.org/works/W2750772055.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W823913476","https://openalex.org/W1482499876","https://openalex.org/W1492667596","https://openalex.org/W1969795119","https://openalex.org/W1986566755","https://openalex.org/W1991210879","https://openalex.org/W2026923435","https://openalex.org/W2038383195","https://openalex.org/W2060878354","https://openalex.org/W2114065574","https://openalex.org/W2310541422","https://openalex.org/W2316771551","https://openalex.org/W2361317469","https://openalex.org/W2487775320","https://openalex.org/W2518974982","https://openalex.org/W2530959290","https://openalex.org/W3043771091","https://openalex.org/W3107684491","https://openalex.org/W4292926131","https://openalex.org/W6628614853","https://openalex.org/W6629711124","https://openalex.org/W6706979621"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W2018332730","https://openalex.org/W4387194049","https://openalex.org/W2286217954"],"abstract_inverted_index":{"With":[0],"the":[1,24,34,93,96,104],"increase":[2],"in":[3,8,17,55,92],"volume,":[4],"heterogeneity":[5],"and":[6,26,71,82],"uncertainty":[7],"data,":[9,77],"conventional":[10],"analytics":[11,67],"approaches":[12],"for":[13,23,36],"monitoring":[14,81],"users":[15],"behavior":[16],"organisations":[18],"are":[19],"no":[20],"longer":[21],"sufficient":[22],"effective":[25,80],"reliable":[27],"detection":[28],"of":[29,90,106],"malicious":[30],"activities.":[31],"This":[32,41],"motivates":[33],"need":[35],"introducing":[37],"additional":[38],"analysis":[39],"techniques.":[40],"paper":[42],"introduces":[43],"an":[44],"intelligent":[45],"fusion":[46,73],"method":[47],"based":[48],"on":[49,75],"fuzzy":[50],"aggregation":[51],"functions":[52],"typically":[53],"utilized":[54],"multi-criteria":[56,72],"decision":[57],"making.":[58],"The":[59],"proposed":[60],"method,":[61],"which":[62],"can":[63],"be":[64],"integrated":[65],"with":[66],"systems,":[68],"undertakes":[69],"temporal":[70],"processes":[74],"pre-analyzed":[76],"to":[78,86,102],"enhance":[79],"decision-making.":[83],"An":[84],"application":[85],"a":[87],"prominent":[88],"area":[89],"research":[91],"cyber-security":[94],"domain,":[95],"insider":[97],"threat":[98],"problem,":[99],"is":[100],"shown":[101],"validate":[103],"usefulness":[105],"our":[107],"method.":[108]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2017-09-15T00:00:00"}
