{"id":"https://openalex.org/W4405102691","doi":"https://doi.org/10.1109/milcom61039.2024.10773707","title":"varMax: Towards Confidence-Based Zero-Day Attack Recognition","display_name":"varMax: Towards Confidence-Based Zero-Day Attack Recognition","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4405102691","doi":"https://doi.org/10.1109/milcom61039.2024.10773707"},"language":"en","primary_location":{"id":"doi:10.1109/milcom61039.2024.10773707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom61039.2024.10773707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039997921","display_name":"Gaspard Baye","orcid":null},"institutions":[{"id":"https://openalex.org/I100633361","display_name":"University of Massachusetts Dartmouth","ror":"https://ror.org/00fzmm222","country_code":"US","type":"education","lineage":["https://openalex.org/I100633361"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gaspard Baye","raw_affiliation_strings":["University of Massachusetts Dartmouth,Computer and Information Science,Dartmouth,USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Dartmouth,Computer and Information Science,Dartmouth,USA","institution_ids":["https://openalex.org/I100633361"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026359071","display_name":"Priscila Silva","orcid":"https://orcid.org/0000-0002-1416-2719"},"institutions":[{"id":"https://openalex.org/I100633361","display_name":"University of Massachusetts Dartmouth","ror":"https://ror.org/00fzmm222","country_code":"US","type":"education","lineage":["https://openalex.org/I100633361"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Priscila Silva","raw_affiliation_strings":["University of Massachusetts Dartmouth,Electrical and Computer Engineering,Dartmouth,MA,USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Dartmouth,Electrical and Computer Engineering,Dartmouth,MA,USA","institution_ids":["https://openalex.org/I100633361"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104133813","display_name":"Alexandre Broggi","orcid":null},"institutions":[{"id":"https://openalex.org/I100633361","display_name":"University of Massachusetts Dartmouth","ror":"https://ror.org/00fzmm222","country_code":"US","type":"education","lineage":["https://openalex.org/I100633361"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alexandre Broggi","raw_affiliation_strings":["University of Massachusetts Dartmouth,Computer and Information Science,Dartmouth,MA,USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Dartmouth,Computer and Information Science,Dartmouth,MA,USA","institution_ids":["https://openalex.org/I100633361"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032194186","display_name":"Nathaniel D. Bastian","orcid":"https://orcid.org/0000-0001-9957-2778"},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nathaniel D. Bastian","raw_affiliation_strings":["United States Military Academy,Army Cyber Institute,West Point,NY,USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy,Army Cyber Institute,West Point,NY,USA","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032820782","display_name":"Lance Fiondella","orcid":"https://orcid.org/0000-0002-4572-6599"},"institutions":[{"id":"https://openalex.org/I100633361","display_name":"University of Massachusetts Dartmouth","ror":"https://ror.org/00fzmm222","country_code":"US","type":"education","lineage":["https://openalex.org/I100633361"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lance Fiondella","raw_affiliation_strings":["University of Massachusetts Dartmouth,Electrical and Computer Engineering,Dartmouth,MA,USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Dartmouth,Electrical and Computer Engineering,Dartmouth,MA,USA","institution_ids":["https://openalex.org/I100633361"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039228531","display_name":"G\u00f6khan Kul","orcid":"https://orcid.org/0000-0001-6467-1979"},"institutions":[{"id":"https://openalex.org/I100633361","display_name":"University of Massachusetts Dartmouth","ror":"https://ror.org/00fzmm222","country_code":"US","type":"education","lineage":["https://openalex.org/I100633361"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gokhan Kul","raw_affiliation_strings":["University of Massachusetts Dartmouth,Computer and Information Science,Dartmouth,MA,USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Dartmouth,Computer and Information Science,Dartmouth,MA,USA","institution_ids":["https://openalex.org/I100633361"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5039997921"],"corresponding_institution_ids":["https://openalex.org/I100633361"],"apc_list":null,"apc_paid":null,"fwci":1.8263,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86967486,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"863","last_page":"868"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5995826721191406},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5829024314880371},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3348657488822937},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27572888135910034}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5995826721191406},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5829024314880371},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3348657488822937},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27572888135910034},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom61039.2024.10773707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom61039.2024.10773707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337632","display_name":"U.S. Military Academy","ror":"https://ror.org/01jepya76"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2119880843","https://openalex.org/W2137820733","https://openalex.org/W2150355110","https://openalex.org/W2296509296","https://openalex.org/W2787720882","https://openalex.org/W2789828921","https://openalex.org/W2999309192","https://openalex.org/W3080622597","https://openalex.org/W3093410479","https://openalex.org/W3188049289","https://openalex.org/W3217504530","https://openalex.org/W4285257445","https://openalex.org/W4295122555","https://openalex.org/W4310206563","https://openalex.org/W4381744990","https://openalex.org/W6730579315","https://openalex.org/W6784323503","https://openalex.org/W6857518959"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Detecting":[0],"zero-day":[1],"attacks,":[2],"which":[3],"exploit":[4],"unknown":[5,20,43,81,129,142],"vulnerabilities,":[6],"is":[7,38],"vital":[8],"in":[9,127,137,151],"mission-critical":[10],"systems.":[11],"Deep":[12],"Neural":[13],"Networks":[14],"(DNNs)":[15],"often":[16],"fails":[17],"to":[18,29,41,54,77,96],"identify":[19,42],"activity,":[21],"as":[22,57],"they":[23],"make":[24],"overly":[25],"confident":[26],"predictions":[27],"due":[28],"SoftMax":[30],"function,":[31],"effective":[32],"at":[33],"identifying":[34,128],"known":[35,79,140],"attacks":[36],"but":[37],"not":[39],"structured":[40],"activity":[44],"patterns.":[45],"Open-Set":[46],"recognition":[47],"(OSR)":[48],"algorithms":[49],"designed":[50],"for":[51,161],"DNNs":[52],"tend":[53],"flag":[55],"inputs":[56],"unknown,":[58],"needing":[59],"a":[60,69,88,97,100,147],"balanced":[61],"approach.":[62],"To":[63],"address":[64],"this,":[65],"we":[66],"introduce":[67],"varMax,":[68],"bias-neutral":[70],"OSR":[71],"technique":[72],"using":[73],"DNN":[74,133],"logit":[75,107],"variance":[76],"distinguish":[78],"from":[80],"inputs.":[82,143],"It":[83],"has":[84],"three":[85],"components:":[86],"(1)":[87],"top-difference":[89],"algorithm":[90],"comparing":[91],"top":[92],"two":[93],"softmax":[94],"scores":[95],"threshold,":[98],"(2)":[99],"method":[101],"classifying":[102],"ambiguous":[103],"samples":[104],"based":[105],"on":[106],"variance,":[108],"and":[109,118,131,135,141,156],"(3)":[110],"an":[111],"energy-based":[112],"out-of-distribution":[113],"function":[114],"enhancing":[115],"classification":[116],"accuracy":[117],"trustworthiness.":[119],"Our":[120],"evaluation":[121],"shows":[122],"varMax":[123],"outperforms":[124],"leading":[125],"methods":[126],"activities":[130],"improves":[132],"confidence":[134],"robustness":[136],"distinguishing":[138],"between":[139],"This":[144],"research":[145],"marks":[146],"significant":[148],"step":[149],"forward":[150],"the":[152],"development":[153],"of":[154],"reliable":[155],"unbiased":[157],"intrusion":[158],"detection":[159],"systems":[160],"cybersecurity":[162],"threats.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
