{"id":"https://openalex.org/W2735716675","doi":"https://doi.org/10.1109/ijcnn.2017.7966020","title":"Multiscale Hebbian neural network for cyber threat detection","display_name":"Multiscale Hebbian neural network for cyber threat detection","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2735716675","doi":"https://doi.org/10.1109/ijcnn.2017.7966020","mag":"2735716675"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2017.7966020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2017.7966020","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024873926","display_name":"Sana Siddiqui","orcid":"https://orcid.org/0000-0002-0096-1958"},"institutions":[{"id":"https://openalex.org/I46247651","display_name":"University of Manitoba","ror":"https://ror.org/02gfys938","country_code":"CA","type":"education","lineage":["https://openalex.org/I46247651"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Sana Siddiqui","raw_affiliation_strings":["Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada","institution_ids":["https://openalex.org/I46247651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101660547","display_name":"Muhammad Asif Khan","orcid":"https://orcid.org/0000-0003-2925-8841"},"institutions":[{"id":"https://openalex.org/I46247651","display_name":"University of Manitoba","ror":"https://ror.org/02gfys938","country_code":"CA","type":"education","lineage":["https://openalex.org/I46247651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Muhammad Salman Khan","raw_affiliation_strings":["Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada","institution_ids":["https://openalex.org/I46247651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078474142","display_name":"Ken Ferens","orcid":"https://orcid.org/0000-0002-1031-0518"},"institutions":[{"id":"https://openalex.org/I46247651","display_name":"University of Manitoba","ror":"https://ror.org/02gfys938","country_code":"CA","type":"education","lineage":["https://openalex.org/I46247651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ken Ferens","raw_affiliation_strings":["Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada","institution_ids":["https://openalex.org/I46247651"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024873926"],"corresponding_institution_ids":["https://openalex.org/I46247651"],"apc_list":null,"apc_paid":null,"fwci":2.072,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.88782011,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"62","issue":null,"first_page":"1427","last_page":"1434"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7883533239364624},{"id":"https://openalex.org/keywords/hebbian-theory","display_name":"Hebbian theory","score":0.659429132938385},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.645874559879303},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6355229020118713},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.530013918876648},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.4834459722042084},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.471155047416687},{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.4401454031467438},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4238916337490082},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.42005980014801025},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07491585612297058}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7883533239364624},{"id":"https://openalex.org/C111437709","wikidata":"https://www.wikidata.org/wiki/Q1277874","display_name":"Hebbian theory","level":3,"score":0.659429132938385},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.645874559879303},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6355229020118713},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.530013918876648},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.4834459722042084},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.471155047416687},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.4401454031467438},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4238916337490082},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.42005980014801025},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07491585612297058},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn.2017.7966020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2017.7966020","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W22297218","https://openalex.org/W228380312","https://openalex.org/W1584505081","https://openalex.org/W1828648156","https://openalex.org/W1981268965","https://openalex.org/W1996576603","https://openalex.org/W1998950365","https://openalex.org/W2008008116","https://openalex.org/W2009236066","https://openalex.org/W2041310429","https://openalex.org/W2093160502","https://openalex.org/W2095578729","https://openalex.org/W2110278466","https://openalex.org/W2132984323","https://openalex.org/W2137522355","https://openalex.org/W2154515358","https://openalex.org/W2167275700","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2414051397","https://openalex.org/W2432567885","https://openalex.org/W2553440513","https://openalex.org/W2589632044","https://openalex.org/W3152188166","https://openalex.org/W4214523560","https://openalex.org/W4251731575","https://openalex.org/W6600908497","https://openalex.org/W6734031702"],"related_works":["https://openalex.org/W2590565095","https://openalex.org/W4321853849","https://openalex.org/W2896927215","https://openalex.org/W3180828476","https://openalex.org/W2945998886","https://openalex.org/W4387853727","https://openalex.org/W1950019275","https://openalex.org/W4285340753","https://openalex.org/W1994470380","https://openalex.org/W1520894008"],"abstract_inverted_index":{"The":[0],"recent":[1],"blaze":[2],"in":[3,18,78,93],"cyber":[4],"espionage":[5],"has":[6],"posed":[7],"unprecedented":[8],"challenges":[9],"to":[10,47,53,98,106,118,153],"the":[11,31,36,54,58,74,79,100,113,155],"cutting":[12],"edge":[13],"network":[14,138],"intrusion":[15],"detection":[16,67],"systems":[17],"terms":[19],"of":[20,25,76,81,102,129],"accurate":[21],"and":[22,38,60,121,146],"precise":[23],"classification":[24,123],"dynamically":[26],"evolving":[27],"threats.":[28],"Along":[29],"with":[30,132],"traditional":[32],"signature":[33],"based":[34,88,136],"detection,":[35],"supervised":[37],"unsupervised":[39],"machine":[40],"learning":[41,91],"algorithms":[42],"are":[43],"also":[44],"being":[45],"deployed":[46],"detect":[48],"advance":[49],"anomalies.":[50],"However,":[51],"due":[52],"class":[55,103],"overlap":[56],"between":[57],"threat":[59],"legitimate":[61],"data":[62],"over":[63],"feature":[64],"space,":[65],"satisfactory":[66],"results":[68,143],"cannot":[69],"be":[70],"obtained.":[71],"This":[72],"necessitates":[73],"introduction":[75],"cognition":[77],"domain":[80],"cyber-security.":[82],"In":[83],"this":[84],"paper,":[85],"a":[86],"wavelet":[87],"multiscale":[89],"Hebbian":[90,111],"approach":[92],"neural":[94,137],"networks":[95],"is":[96,116],"introduced":[97],"address":[99],"challenge":[101],"overlap.":[104],"Contrary":[105],"inherently":[107],"linear":[108],"single":[109],"scale":[110],"learning,":[112],"proposed":[114],"methodology":[115],"able":[117],"distinguish":[119],"non-linear":[120],"overlapping":[122],"boundaries":[124],"sufficiently":[125],"well.":[126],"A":[127],"comparison":[128],"presented":[130,152],"techniques":[131],"fundamental":[133],"gradient":[134],"descent":[135],"shows":[139],"promising":[140],"results.":[141],"Experimental":[142],"on":[144],"simulated":[145],"real-world":[147],"UNSW-NB15":[148],"dataset":[149],"have":[150],"been":[151],"support":[154],"claim.":[156]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
