{"id":"https://openalex.org/W2944100362","doi":"https://doi.org/10.1109/is.2018.8710536","title":"Node-Based System for Optimizing the Process of Creation ff Intelligent Agents for Intrusion Detection and Analysis","display_name":"Node-Based System for Optimizing the Process of Creation ff Intelligent Agents for Intrusion Detection and Analysis","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2944100362","doi":"https://doi.org/10.1109/is.2018.8710536","mag":"2944100362"},"language":"en","primary_location":{"id":"doi:10.1109/is.2018.8710536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/is.2018.8710536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Intelligent Systems (IS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049633320","display_name":"Iva Marinova","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Iva Marinova","raw_affiliation_strings":["Identrics, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Identrics, Sofia, Bulgaria","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074143529","display_name":"Vladimir Jotsov","orcid":"https://orcid.org/0000-0002-2860-7918"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vladimir Jotsov","raw_affiliation_strings":["Faculty of Information Sciences, Univ. Lib. Studies and IT, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Sciences, Univ. Lib. Studies and IT, Sofia, Bulgaria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049633320"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1845,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59674746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"13","issue":null,"first_page":"557","last_page":"563"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7535626292228699},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7191629409790039},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6496793031692505},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6461011171340942},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.46099570393562317},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40082013607025146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2760392427444458},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1339293122291565},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11209943890571594}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7535626292228699},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7191629409790039},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6496793031692505},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6461011171340942},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.46099570393562317},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40082013607025146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2760392427444458},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1339293122291565},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11209943890571594},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/is.2018.8710536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/is.2018.8710536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Intelligent Systems (IS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1601795611","https://openalex.org/W2002096058","https://openalex.org/W2012595795","https://openalex.org/W2028087718","https://openalex.org/W2040870580","https://openalex.org/W2106411961","https://openalex.org/W2172000360","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2553629210","https://openalex.org/W2570296101","https://openalex.org/W6631190155"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W1513478798","https://openalex.org/W2388497169","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W4300599821","https://openalex.org/W3120393658"],"abstract_inverted_index":{"In":[0],"recent":[1],"days":[2,79],"Intrusion":[3],"Detection":[4],"Systems":[5],"(IDS)":[6],"become":[7],"more":[8,11],"popular":[9],"and":[10,21,34,43,77,89,112,154,183,190,209,218,231],"sophisticated":[12],"solutions":[13],"are":[14,162],"used":[15],"to":[16,50,58,98,105,115,119,126,137,203,237],"process":[17,206],"raw":[18],"network":[19,33,45,177,215],"traffic":[20],"prevent":[22],"attacks":[23,111],"of":[24,30,75,87,108,133,143,160,185,207],"all":[25],"types.":[26],"With":[27],"the":[28,31,35,62,85,93,99,131,166,181,186,205],"growth":[29],"global":[32],"dark":[36],"web,":[37],"known":[38,97],"attack":[39,144],"types":[40],"increase":[41],"too":[42],"common":[44],"intrusion":[46,216],"detection":[47,217],"systems":[48,103],"have":[49,233],"update":[51],"their":[52],"signatures":[53],"on":[54,165,224],"a":[55,73,109,175,197,211],"daily":[56],"basis":[57],"keep":[59],"up":[60],"with":[61],"current":[63],"threats.":[64],"But":[65,148],"what":[66],"about":[67],"Zero-day":[68,110],"attacks.":[69],"There":[70],"is":[71,95,118,142,152,171,202],"always":[72],"period":[74],"hours":[76],"sometimes":[78],"or":[80,123,146],"even":[81],"years":[82],"like":[83],"in":[84,130,174],"case":[86],"\"Meltdown\"":[88],"\"Spectre\"":[90],"vulnerabilities,":[91],"when":[92],"hack":[94],"not":[96,172],"public.":[100],"Contemporary":[101],"IDS":[102],"need":[104],"be":[106],"aware":[107],"one":[113],"way":[114],"accomplish":[116],"this":[117,239],"use":[120],"machine":[121],"learning":[122,125],"deep":[124],"create":[127],"intelligent":[128],"agents":[129,161],"form":[132],"predictive":[134,169,187,212],"models":[135,188],"capable":[136],"predict":[138],"whether":[139],"unseen":[140],"data":[141],"type":[145],"not.":[147],"every":[149],"corporate":[150],"environment":[151],"different":[153],"we":[155,195],"know":[156],"that":[157],"these":[158],"kinds":[159],"very":[163],"dependent":[164],"environment.":[167],"One":[168],"model":[170,213],"usable":[173],"new":[176],"system,":[178],"which":[179,199],"makes":[180],"development":[182],"design":[184],"expensive":[189],"client":[191],"specific.":[192],"That's":[193],"why":[194],"propose":[196],"system":[198],"main":[200],"goal":[201],"automate":[204,238],"designing":[208],"training":[210],"for":[214],"classification/analysis.":[219],"The":[220],"agent's":[221],"autonomy":[222],"depends":[223],"its":[225],"modeling":[226],"capabilities.":[227],"Puzzle":[228],"method":[229],"standards":[230],"constraints":[232],"been":[234],"proposed":[235],"aiming":[236],"process.":[240]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
