{"id":"https://openalex.org/W1970378920","doi":"https://doi.org/10.1109/ijcnn.2008.4633931","title":"Signature based intrusion detection using latent semantic analysis","display_name":"Signature based intrusion detection using latent semantic analysis","publication_year":2008,"publication_date":"2008-06-01","ids":{"openalex":"https://openalex.org/W1970378920","doi":"https://doi.org/10.1109/ijcnn.2008.4633931","mag":"1970378920"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2008.4633931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2008.4633931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108188284","display_name":"Jean-Louis Lassez","orcid":null},"institutions":[{"id":"https://openalex.org/I208081647","display_name":"Coastal Carolina University","ror":"https://ror.org/01621q256","country_code":"US","type":"education","lineage":["https://openalex.org/I208081647"]},{"id":"https://openalex.org/I4210114115","display_name":"IBM Research - Thomas J. Watson Research Center","ror":"https://ror.org/0265w5591","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jean-Louis Lassez","raw_affiliation_strings":["IBM Thomas J. Watson Research Center, Coastal Carolina University, Conway, SC, USA","Coastal Carolina University  Conway, SC"],"affiliations":[{"raw_affiliation_string":"IBM Thomas J. Watson Research Center, Coastal Carolina University, Conway, SC, USA","institution_ids":["https://openalex.org/I208081647","https://openalex.org/I4210114115"]},{"raw_affiliation_string":"Coastal Carolina University  Conway, SC","institution_ids":["https://openalex.org/I208081647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009957887","display_name":"Ryan A. Rossi","orcid":"https://orcid.org/0000-0001-9758-0635"},"institutions":[{"id":"https://openalex.org/I4210152127","display_name":"Conway School of Landscape Design","ror":"https://ror.org/04q7y8a54","country_code":"US","type":"education","lineage":["https://openalex.org/I4210152127"]},{"id":"https://openalex.org/I208081647","display_name":"Coastal Carolina University","ror":"https://ror.org/01621q256","country_code":"US","type":"education","lineage":["https://openalex.org/I208081647"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan Rossi","raw_affiliation_strings":["Coastal Carolina University, Conway, SC, USA","Coastal Carolina University  Conway, SC"],"affiliations":[{"raw_affiliation_string":"Coastal Carolina University, Conway, SC, USA","institution_ids":["https://openalex.org/I208081647","https://openalex.org/I4210152127"]},{"raw_affiliation_string":"Coastal Carolina University  Conway, SC","institution_ids":["https://openalex.org/I208081647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023045757","display_name":"Stephen Sheel","orcid":null},"institutions":[{"id":"https://openalex.org/I208081647","display_name":"Coastal Carolina University","ror":"https://ror.org/01621q256","country_code":"US","type":"education","lineage":["https://openalex.org/I208081647"]},{"id":"https://openalex.org/I4210152127","display_name":"Conway School of Landscape Design","ror":"https://ror.org/04q7y8a54","country_code":"US","type":"education","lineage":["https://openalex.org/I4210152127"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephen Sheel","raw_affiliation_strings":["Coastal Carolina University, Conway, SC, USA","Coastal Carolina University  Conway, SC"],"affiliations":[{"raw_affiliation_string":"Coastal Carolina University, Conway, SC, USA","institution_ids":["https://openalex.org/I208081647","https://openalex.org/I4210152127"]},{"raw_affiliation_string":"Coastal Carolina University  Conway, SC","institution_ids":["https://openalex.org/I208081647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113707271","display_name":"Srinivas Mukkamala","orcid":null},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]},{"id":"https://openalex.org/I4210126902","display_name":"Illinois Coalition Against Sexual Assault","ror":"https://ror.org/031kn1t70","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210126902"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srinivas Mukkamala","raw_affiliation_strings":["ICASA a Researchi Division, New Mexico Technology, Socorro, NM, USA","ICASA Res. Div., New Mexico Tech, Socorro, NM"],"affiliations":[{"raw_affiliation_string":"ICASA a Researchi Division, New Mexico Technology, Socorro, NM, USA","institution_ids":["https://openalex.org/I4210126902","https://openalex.org/I207123951"]},{"raw_affiliation_string":"ICASA Res. Div., New Mexico Tech, Socorro, NM","institution_ids":["https://openalex.org/I207123951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5108188284"],"corresponding_institution_ids":["https://openalex.org/I208081647","https://openalex.org/I4210114115"],"apc_list":null,"apc_paid":null,"fwci":1.1732,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.83583659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1068","last_page":"1074"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7892749309539795},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6489968299865723},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6360275149345398},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5514380931854248},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5471795797348022},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5310526490211487},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.5002591609954834},{"id":"https://openalex.org/keywords/probabilistic-latent-semantic-analysis","display_name":"Probabilistic latent semantic analysis","score":0.4994630813598633},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.46343618631362915},{"id":"https://openalex.org/keywords/latent-semantic-analysis","display_name":"Latent semantic analysis","score":0.4325698912143707},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4176926612854004}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7892749309539795},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6489968299865723},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6360275149345398},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5514380931854248},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5471795797348022},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5310526490211487},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.5002591609954834},{"id":"https://openalex.org/C112933361","wikidata":"https://www.wikidata.org/wiki/Q2845258","display_name":"Probabilistic latent semantic analysis","level":2,"score":0.4994630813598633},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.46343618631362915},{"id":"https://openalex.org/C170133592","wikidata":"https://www.wikidata.org/wiki/Q1806883","display_name":"Latent semantic analysis","level":2,"score":0.4325698912143707},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4176926612854004},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn.2008.4633931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2008.4633931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.167.4486","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.4486","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.kibazen.com/rrossi/search/papers/sig_lsa.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W969507161","https://openalex.org/W1479962251","https://openalex.org/W1496874548","https://openalex.org/W1526463029","https://openalex.org/W1526619912","https://openalex.org/W1576520375","https://openalex.org/W1608531776","https://openalex.org/W1674947250","https://openalex.org/W1983578042","https://openalex.org/W2016749013","https://openalex.org/W2100604298","https://openalex.org/W2105638720","https://openalex.org/W2131691213","https://openalex.org/W2147152072","https://openalex.org/W2148541040","https://openalex.org/W2151268483","https://openalex.org/W2156909104","https://openalex.org/W2158997610","https://openalex.org/W2165340924","https://openalex.org/W2166657964","https://openalex.org/W2167287136","https://openalex.org/W2912650281","https://openalex.org/W4252434862","https://openalex.org/W6628613698","https://openalex.org/W6631599220","https://openalex.org/W6636374816","https://openalex.org/W6684679328"],"related_works":["https://openalex.org/W2111020819","https://openalex.org/W2588002110","https://openalex.org/W2775171027","https://openalex.org/W4389358025","https://openalex.org/W2267563544","https://openalex.org/W2303774322","https://openalex.org/W2420905679","https://openalex.org/W1690254038","https://openalex.org/W2890241594","https://openalex.org/W2147688565"],"abstract_inverted_index":{"We":[0,132,165],"address":[1],"the":[2,64,72,82,93,97,120,168],"problem":[3],"of":[4,49,71,81,92,99,119,158,162],"selecting":[5],"and":[6,15,37,110,138,160],"extracting":[7],"key":[8],"features":[9,124],"by":[10,54],"using":[11,55,112],"singular":[12],"value":[13],"decomposition":[14],"latent":[16,27],"semantic":[17],"analysis.":[18],"As":[19],"a":[20,39,146,152],"consequence,":[21],"we":[22,68,78,89],"are":[23],"able":[24],"to":[25,32,116],"discover":[26],"information":[28],"which":[29],"allows":[30],"us":[31,115],"design":[33],"signatures":[34,105],"for":[35,42,142],"forensics":[36],"in":[38,102,129],"dual":[40],"approach":[41],"real-time":[43],"intrusion":[44],"detection":[45],"systems.":[46],"The":[47,104],"validity":[48],"this":[50],"method":[51],"is":[52],"shown":[53],"several":[56],"automated":[57],"classification":[58],"algorithms":[59],"(Maxim,":[60],"SYM,":[61],"LGP).":[62],"Using":[63],"original":[65],"data":[66,148],"set":[67,149],"classify":[69,79,90],"99.86%":[70],"calls":[73,83,94,121],"correctly.":[74],"After":[75],"feature":[76,87,108,143,172],"extraction":[77,111],"99.68%":[80],"correctly,":[84,95],"while":[85],"with":[86,123],"selection":[88,109,144,173],"99.78%":[91],"justifying":[96],"use":[98,133],"these":[100],"techniques":[101],"forensics.":[103],"obtained":[106],"after":[107],"LSA":[113],"allow":[114],"class":[117],"95.69%":[118],"correctly":[122],"that":[125,156,167],"can":[126],"be":[127],"computed":[128],"real":[130,147],"time.":[131],"Support":[134],"Vector":[135],"Decision":[136],"Function":[137],"Linear":[139],"Genetic":[140],"Programming":[141],"on":[145,151],"generated":[150],"live":[153],"performance":[154],"network":[155],"consists":[157],"probe":[159],"denial":[161],"service":[163],"attacks.":[164],"find":[166],"results":[169],"reinforce":[170],"our":[171],"method.":[174]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
