{"id":"https://openalex.org/W2550694155","doi":"https://doi.org/10.1109/is.2016.7737389","title":"Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment","display_name":"Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2550694155","doi":"https://doi.org/10.1109/is.2016.7737389","mag":"2550694155"},"language":"en","primary_location":{"id":"doi:10.1109/is.2016.7737389","is_oa":false,"landing_page_url":"https://doi.org/10.1109/is.2016.7737389","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 8th International Conference on Intelligent Systems (IS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087397127","display_name":"Samaneh Berenjian","orcid":null},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Samaneh Berenjian","raw_affiliation_strings":["Department of Computer and IT Engineering, Amirkabir University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer and IT Engineering, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053531964","display_name":"Mehdi Shajari","orcid":"https://orcid.org/0000-0003-3961-4168"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mehdi Shajari","raw_affiliation_strings":["Department of Computer and IT Engineering, Amirkabir University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer and IT Engineering, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062811536","display_name":"Nadieh Farshid","orcid":null},"institutions":[{"id":"https://openalex.org/I189748745","display_name":"Islamic Azad University Mahshahr","ror":"https://ror.org/01y361889","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I189748745"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Nadieh Farshid","raw_affiliation_strings":["Department of Computer Engineering, Islamic Azad University, Mahshahr, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Islamic Azad University, Mahshahr, Iran","institution_ids":["https://openalex.org/I189748745"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042002527","display_name":"Majid Hatamian","orcid":"https://orcid.org/0000-0003-1280-5570"},"institutions":[{"id":"https://openalex.org/I4210155764","display_name":"Islamic Azad University, Dezful Branch","ror":"https://ror.org/05d1wpf45","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I4210155764"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Majid Hatamian","raw_affiliation_strings":["Department of Computer Engineering, Islamic Azad University, Dezful, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Islamic Azad University, Dezful, Iran","institution_ids":["https://openalex.org/I4210155764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5087397127"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":null,"apc_paid":null,"fwci":2.6058,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.90926093,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"709","last_page":"714"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.7452392578125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7035900354385376},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6366567015647888},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.5453006029129028},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5415336489677429},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5216015577316284},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.5089406967163086},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4747757613658905},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45497819781303406},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4543326497077942},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.4430930018424988},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.41803228855133057},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3592495918273926},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21704208850860596},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17138206958770752},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11126703023910522}],"concepts":[{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.7452392578125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7035900354385376},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6366567015647888},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.5453006029129028},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5415336489677429},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5216015577316284},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.5089406967163086},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4747757613658905},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45497819781303406},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4543326497077942},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.4430930018424988},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.41803228855133057},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3592495918273926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21704208850860596},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17138206958770752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11126703023910522},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/is.2016.7737389","is_oa":false,"landing_page_url":"https://doi.org/10.1109/is.2016.7737389","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 8th International Conference on Intelligent Systems (IS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W103440906","https://openalex.org/W344488431","https://openalex.org/W1525848205","https://openalex.org/W1837751038","https://openalex.org/W1972851159","https://openalex.org/W2020974462","https://openalex.org/W2027859047","https://openalex.org/W2032897110","https://openalex.org/W2068036033","https://openalex.org/W2097209984","https://openalex.org/W2098875950","https://openalex.org/W2125109784","https://openalex.org/W2138410641","https://openalex.org/W2139065819","https://openalex.org/W2145223243","https://openalex.org/W2156352116","https://openalex.org/W2341587199","https://openalex.org/W2379726672","https://openalex.org/W6667603143","https://openalex.org/W6674875911"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2133389611","https://openalex.org/W3041075136","https://openalex.org/W2285205992","https://openalex.org/W3006961029","https://openalex.org/W2480445825","https://openalex.org/W2153011985","https://openalex.org/W2483482908","https://openalex.org/W1941743136"],"abstract_inverted_index":{"The":[0,121,164],"most":[1,60],"important":[2],"aim":[3,122],"of":[4,82,94,96,118,123,140,166,173,179],"Automated":[5],"Intrusion":[6],"Response":[7],"Systems":[8],"(AIRSs)":[9],"is":[10,54,70,86,126],"selecting":[11],"responses":[12,162],"that":[13],"impose":[14],"less":[15],"cost":[16],"on":[17,51,132],"the":[18,52,80,92,111,138,170,174],"protected":[19],"system":[20,53],"and":[21,146,181],"which":[22,107],"are":[23,108,114],"able":[24],"to":[25,35,76,127,136,183],"neutralize":[26],"intrusions":[27],"progress":[28],"effectively.":[29],"Cost-sensitive":[30],"AIRSs":[31],"use":[32],"different":[33],"methods":[34,64],"launch":[36],"efficient":[37],"responses.":[38],"In":[39],"this":[40,124],"regard,":[41],"risk":[42,62,83,97,101,105,134,139],"assessment":[43,63,135],"as":[44,72,116],"a":[45,148,158],"component":[46],"for":[47,151,160],"assessing":[48],"intrusion":[49,142],"danger":[50],"introduced":[55],"in":[56,79,143,177],"many":[57],"papers.":[58],"However,":[59],"available":[61],"produce":[65],"ambiguous":[66],"results.":[67],"Fuzzy":[68],"logic":[69],"known":[71],"an":[73,129],"effective":[74,171],"method":[75,159,168,176],"be":[77],"used":[78,115],"process":[81],"assessment.":[84],"This":[85],"mainly":[87],"because":[88],"fuzzy":[89,103,119,133],"approach":[90],"reduces":[91],"level":[93],"uncertainty":[95],"factors.":[98],"To":[99],"assess":[100],"by":[102],"methods,":[104],"parameters":[106],"extracted":[109],"from":[110],"traffic":[112],"patterns":[113],"inputs":[117],"systems.":[120],"paper":[125],"introduce":[128,157],"AIRS":[130],"based":[131],"evaluate":[137],"each":[141],"real":[144],"time":[145,182],"apply":[147],"suitable":[149],"response":[150],"protecting":[152],"web":[153],"applications.":[154],"We":[155],"also":[156],"applying":[161],"retroactively.":[163],"results":[165],"applied":[167],"show":[169],"performance":[172],"proposed":[175],"terms":[178],"cost-sensitivity":[180],"response.":[184]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":6},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
