{"id":"https://openalex.org/W3119203520","doi":"https://doi.org/10.1109/ssci47803.2020.9308206","title":"Intrusion Detection with Interpretable Rules Generated Using the Tsetlin Machine","display_name":"Intrusion Detection with Interpretable Rules Generated Using the Tsetlin Machine","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3119203520","doi":"https://doi.org/10.1109/ssci47803.2020.9308206","mag":"3119203520"},"language":"en","primary_location":{"id":"doi:10.1109/ssci47803.2020.9308206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci47803.2020.9308206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010066090","display_name":"K. Darshana Abeyrathna","orcid":"https://orcid.org/0000-0003-4816-2597"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"K. Darshana Abeyrathna","raw_affiliation_strings":["Centre for Artificial Intelligence Research, University of Agder (UiA), Grimstad, Norway","Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway"],"affiliations":[{"raw_affiliation_string":"Centre for Artificial Intelligence Research, University of Agder (UiA), Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]},{"raw_affiliation_string":"Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054991662","display_name":"Harsha S. Gardiyawasam Pussewalage","orcid":"https://orcid.org/0000-0002-3623-3362"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Harsha S. Gardiyawasam Pussewalage","raw_affiliation_strings":["Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway"],"affiliations":[{"raw_affiliation_string":"Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073658130","display_name":"Sasanka N. Ranasinghe","orcid":"https://orcid.org/0009-0004-8431-0192"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Sasanka N. Ranasinghe","raw_affiliation_strings":["Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway"],"affiliations":[{"raw_affiliation_string":"Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035792662","display_name":"Vladimir Oleshchuk","orcid":"https://orcid.org/0000-0002-7905-1016"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Vladimir A. Oleshchuk","raw_affiliation_strings":["Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway"],"affiliations":[{"raw_affiliation_string":"Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071922620","display_name":"Ole\u2010Christoffer Granmo","orcid":"https://orcid.org/0000-0002-7287-030X"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Ole-Christoffer Granmo","raw_affiliation_strings":["Centre for Artificial Intelligence Research, University of Agder (UiA), Grimstad, Norway","Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway"],"affiliations":[{"raw_affiliation_string":"Centre for Artificial Intelligence Research, University of Agder (UiA), Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]},{"raw_affiliation_string":"Dept. of Information and Communication Technology, University of Agder (UiA), Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010066090"],"corresponding_institution_ids":["https://openalex.org/I200650556"],"apc_list":null,"apc_paid":null,"fwci":0.7709,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.75404525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1121","last_page":"1130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.9029471278190613},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8206204175949097},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7929774522781372},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6793191432952881},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6727032661437988},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6531329154968262},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6401210427284241},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5608347654342651},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5595965385437012},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.49223843216896057},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.48651379346847534},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.46132200956344604},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.4465477466583252},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.43944522738456726}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.9029471278190613},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8206204175949097},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7929774522781372},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6793191432952881},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6727032661437988},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6531329154968262},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6401210427284241},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5608347654342651},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5595965385437012},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.49223843216896057},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.48651379346847534},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.46132200956344604},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.4465477466583252},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.43944522738456726},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ssci47803.2020.9308206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci47803.2020.9308206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1513075375","https://openalex.org/W1679074130","https://openalex.org/W1966809779","https://openalex.org/W1995678176","https://openalex.org/W2047408376","https://openalex.org/W2068613148","https://openalex.org/W2097034581","https://openalex.org/W2100537916","https://openalex.org/W2115529843","https://openalex.org/W2121964040","https://openalex.org/W2152562470","https://openalex.org/W2294463103","https://openalex.org/W2508613954","https://openalex.org/W2512144135","https://openalex.org/W2547629195","https://openalex.org/W2610332124","https://openalex.org/W2757360506","https://openalex.org/W2783291475","https://openalex.org/W2796362437","https://openalex.org/W2799782785","https://openalex.org/W2820900234","https://openalex.org/W2900339177","https://openalex.org/W2903719960","https://openalex.org/W2905224693","https://openalex.org/W2912319700","https://openalex.org/W2945999242","https://openalex.org/W2955399747","https://openalex.org/W2967499091","https://openalex.org/W2974592802","https://openalex.org/W2996012579","https://openalex.org/W2996333969","https://openalex.org/W3119077141","https://openalex.org/W3128452405","https://openalex.org/W4402843978","https://openalex.org/W6667525045","https://openalex.org/W6678468492","https://openalex.org/W6750154454","https://openalex.org/W6762881066","https://openalex.org/W6767904995","https://openalex.org/W6771945890","https://openalex.org/W6776712243","https://openalex.org/W6790587931"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W4293151273","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W1724519426","https://openalex.org/W2351051591","https://openalex.org/W2369534771","https://openalex.org/W2357468538","https://openalex.org/W2115529843"],"abstract_inverted_index":{"The":[0],"rapid":[1],"deployment":[2],"in":[3,115],"information":[4],"and":[5,8,91,97,131],"communication":[6],"technologies":[7],"internet-based":[9],"services":[10],"have":[11,35,82],"made":[12],"anomaly":[13,70],"based":[14,71,75,106],"network":[15],"intrusion":[16,40,72],"detection":[17,41,73],"ever":[18],"so":[19],"important":[20],"for":[21],"safeguarding":[22],"systems":[23],"from":[24],"novel":[25],"attack":[26],"vectors.":[27],"To":[28],"this":[29,64],"date,":[30],"various":[31],"machine":[32,134],"learning":[33,135],"mechanisms":[34],"been":[36,60],"considered":[37],"to":[38,117],"build":[39],"systems.":[42],"However,":[43],"achieving":[44,111],"an":[45,68],"acceptable":[46],"level":[47],"of":[48,55,110],"classification":[49,57,113],"accuracy":[50],"while":[51,137],"preserving":[52,138],"the":[53,56,77,84,88,98,103,139],"interpretability":[54],"has":[58],"always":[59],"a":[61],"challenge.":[62],"In":[63],"paper,":[65],"we":[66],"propose":[67],"efficient":[69],"mechanism":[74,86],"on":[76],"Tsetlin":[78],"Machine":[79],"(TM).":[80],"We":[81],"evaluated":[83],"proposed":[85,104],"over":[87],"Knowledge":[89],"Discovery":[90],"Data":[92],"Mining":[93],"1999":[94],"(KDD'99)":[95],"dataset":[96],"experimental":[99],"results":[100],"demonstrate":[101],"that":[102],"TM":[105],"approach":[107],"is":[108],"capable":[109],"superior":[112],"performance":[114],"comparison":[116],"several":[118],"simple":[119],"Multi-Layered":[120],"Artificial":[121],"Neural":[122],"Networks,":[123],"Support":[124],"Vector":[125],"Machines,":[126],"Decision":[127],"Trees,":[128],"Random":[129],"Forest,":[130],"K-Nearest":[132],"Neighbor":[133],"algorithms":[136],"interpretability.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
