{"id":"https://openalex.org/W1997463703","doi":"https://doi.org/10.1109/ijcnn.2014.6889931","title":"Intrusion detection using a cascade of boosted classifiers (CBC)","display_name":"Intrusion detection using a cascade of boosted classifiers (CBC)","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W1997463703","doi":"https://doi.org/10.1109/ijcnn.2014.6889931","mag":"1997463703"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2014.6889931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2014.6889931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024579476","display_name":"Mubasher Baig","orcid":"https://orcid.org/0000-0003-2863-0736"},"institutions":[{"id":"https://openalex.org/I207789805","display_name":"Lahore University of Management Sciences","ror":"https://ror.org/05b5x4a35","country_code":"PK","type":"education","lineage":["https://openalex.org/I207789805"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Mubasher Baig","raw_affiliation_strings":["Dept. of Computer Science, Lahore University of Management Sciences, Lahore, Pakistan","Dept. of Comput. Sci., Lahore Univ. of Manage. Sci., Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Lahore University of Management Sciences, Lahore, Pakistan","institution_ids":["https://openalex.org/I207789805"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Lahore Univ. of Manage. Sci., Lahore, Pakistan","institution_ids":["https://openalex.org/I207789805"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["College of Computer Sciences King, Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","Coll. of Comput. Sci., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Sciences King, Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Coll. of Comput. Sci., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101946543","display_name":"Mian Muhammad Awais","orcid":"https://orcid.org/0000-0001-8576-7259"},"institutions":[{"id":"https://openalex.org/I207789805","display_name":"Lahore University of Management Sciences","ror":"https://ror.org/05b5x4a35","country_code":"PK","type":"education","lineage":["https://openalex.org/I207789805"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mian M. Awais","raw_affiliation_strings":["Dept. of Computer Science, Lahore University of Management Sciences, Lahore, Pakistan","Dept. of Comput. Sci., Lahore Univ. of Manage. Sci., Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Lahore University of Management Sciences, Lahore, Pakistan","institution_ids":["https://openalex.org/I207789805"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Lahore Univ. of Manage. Sci., Lahore, Pakistan","institution_ids":["https://openalex.org/I207789805"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024579476"],"corresponding_institution_ids":["https://openalex.org/I207789805"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09660048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"97","issue":null,"first_page":"1386","last_page":"1392"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.8739874958992004},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7627189755439758},{"id":"https://openalex.org/keywords/cascade","display_name":"Cascade","score":0.7381864786148071},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7204890847206116},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6366363763809204},{"id":"https://openalex.org/keywords/multiclass-classification","display_name":"Multiclass classification","score":0.625580370426178},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5599800944328308},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5582658648490906},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5566756725311279},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5171070098876953},{"id":"https://openalex.org/keywords/cascading-classifiers","display_name":"Cascading classifiers","score":0.48374390602111816},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38915881514549255},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.2747519612312317},{"id":"https://openalex.org/keywords/random-subspace-method","display_name":"Random subspace method","score":0.17036816477775574},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07556852698326111}],"concepts":[{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.8739874958992004},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7627189755439758},{"id":"https://openalex.org/C34146451","wikidata":"https://www.wikidata.org/wiki/Q5048094","display_name":"Cascade","level":2,"score":0.7381864786148071},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7204890847206116},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6366363763809204},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.625580370426178},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5599800944328308},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5582658648490906},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5566756725311279},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5171070098876953},{"id":"https://openalex.org/C40651066","wikidata":"https://www.wikidata.org/wiki/Q5048220","display_name":"Cascading classifiers","level":4,"score":0.48374390602111816},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38915881514549255},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2747519612312317},{"id":"https://openalex.org/C106135958","wikidata":"https://www.wikidata.org/wiki/Q7291993","display_name":"Random subspace method","level":3,"score":0.17036816477775574},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07556852698326111},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C42360764","wikidata":"https://www.wikidata.org/wiki/Q83588","display_name":"Chemical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn.2014.6889931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2014.6889931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320311820","display_name":"Lahore University of Management Sciences","ror":"https://ror.org/05b5x4a35"},{"id":"https://openalex.org/F4320322997","display_name":"King Abdulaziz City for Science and Technology","ror":"https://ror.org/05tdz6m39"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W60934498","https://openalex.org/W90841950","https://openalex.org/W1534477342","https://openalex.org/W1577117059","https://openalex.org/W1578772208","https://openalex.org/W1676820704","https://openalex.org/W1935357463","https://openalex.org/W1967376128","https://openalex.org/W1977838479","https://openalex.org/W1988790447","https://openalex.org/W1997741525","https://openalex.org/W2012771827","https://openalex.org/W2047350783","https://openalex.org/W2061804201","https://openalex.org/W2076384720","https://openalex.org/W2101109743","https://openalex.org/W2120617515","https://openalex.org/W2146196597","https://openalex.org/W2152761983","https://openalex.org/W2155461860","https://openalex.org/W2158275940","https://openalex.org/W2164598857","https://openalex.org/W2168020168","https://openalex.org/W2412267538","https://openalex.org/W2728509750","https://openalex.org/W3004732066","https://openalex.org/W6634795092","https://openalex.org/W6642051242","https://openalex.org/W6681545543"],"related_works":["https://openalex.org/W2592003259","https://openalex.org/W4300235460","https://openalex.org/W2964269045","https://openalex.org/W2154615742","https://openalex.org/W2035921272","https://openalex.org/W1558422673","https://openalex.org/W2032805221","https://openalex.org/W2358666853","https://openalex.org/W2170597348","https://openalex.org/W2003868635"],"abstract_inverted_index":{"A":[0,57],"boosting-based":[1,64],"cascade":[2,19],"for":[3,46],"automatic":[4],"decomposition":[5],"of":[6,59],"multiclass":[7,65],"learning":[8,66],"problems":[9,14],"into":[10],"several":[11],"binary":[12],"classification":[13],"is":[15,68],"presented.":[16],"The":[17,41],"proposed":[18],"structure":[20],"uses":[21],"a":[22,30,52],"boosted":[23],"classifier":[24],"at":[25,38],"each":[26,39],"level":[27],"and":[28],"use":[29],"filtering":[31],"process":[32],"to":[33],"reduce":[34],"the":[35,60],"problem":[36],"size":[37],"level.":[40],"method":[42],"has":[43],"been":[44],"used":[45],"detecting":[47],"malicious":[48],"traffic":[49],"patterns":[50],"using":[51],"benchmark":[53],"intrusion":[54],"detection":[55],"dataset.":[56,73],"comparison":[58],"approach":[61],"with":[62],"four":[63],"algorithms":[67],"also":[69],"provided":[70],"on":[71],"this":[72]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
