{"id":"https://openalex.org/W2205557629","doi":"https://doi.org/10.1109/tifs.2015.2503269","title":"Detection of Superpoints Using a Vector Bloom Filter","display_name":"Detection of Superpoints Using a Vector Bloom Filter","publication_year":2015,"publication_date":"2015-11-24","ids":{"openalex":"https://openalex.org/W2205557629","doi":"https://doi.org/10.1109/tifs.2015.2503269","mag":"2205557629"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2015.2503269","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2503269","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108087002","display_name":"Weijiang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weijiang Liu","raw_affiliation_strings":["Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","School of Information Technology, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Information Technology, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041346888","display_name":"Wenyu Qu","orcid":"https://orcid.org/0000-0003-4817-5187"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyu Qu","raw_affiliation_strings":["School of Software, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069379086","display_name":"Jian Gong","orcid":"https://orcid.org/0000-0001-5786-713X"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Gong","raw_affiliation_strings":["School of Computer Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101474714","display_name":"Keqiu Li","orcid":"https://orcid.org/0000-0003-3089-7907"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keqiu Li","raw_affiliation_strings":["School of Computer Science and Technology, Dalian University of Technology, Dalian, China","School of Computer Science and Technology, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Computer Science and Technology, Tianjin University, Tianjin, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5108087002"],"corresponding_institution_ids":["https://openalex.org/I43313876","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":5.3251,"has_fulltext":false,"cited_by_count":64,"citation_normalized_percentile":{"value":0.96017353,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"11","issue":"3","first_page":"514","last_page":"527"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.948524534702301},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8694319725036621},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7771353721618652},{"id":"https://openalex.org/keywords/bit-array","display_name":"Bit array","score":0.7495885491371155},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6030062437057495},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5039295554161072},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.4955710172653198},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.490087628364563},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.476521372795105},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4581626057624817},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43701523542404175},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.42968106269836426},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.417961061000824},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30341967940330505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19054055213928223},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.0964689552783966}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.948524534702301},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8694319725036621},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7771353721618652},{"id":"https://openalex.org/C150807984","wikidata":"https://www.wikidata.org/wiki/Q1992074","display_name":"Bit array","level":3,"score":0.7495885491371155},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6030062437057495},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5039295554161072},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.4955710172653198},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.490087628364563},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.476521372795105},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4581626057624817},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43701523542404175},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.42968106269836426},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.417961061000824},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30341967940330505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19054055213928223},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0964689552783966},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2777299769","wikidata":"https://www.wikidata.org/wiki/Q3707858","display_name":"Type (biology)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2015.2503269","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2503269","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3191704008","display_name":null,"funder_award_id":"61300199","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5586372562","display_name":null,"funder_award_id":"61370187","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5594404626","display_name":null,"funder_award_id":"3132014325","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5723616750","display_name":null,"funder_award_id":"61272417","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G705366708","display_name":null,"funder_award_id":"3632010220","funder_id":"https://openalex.org/F4320327799","funder_display_name":"Scientific Research Fund of Liaoning Provincial Education Department"},{"id":"https://openalex.org/G7368584553","display_name":null,"funder_award_id":"61370198","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7728541435","display_name":null,"funder_award_id":"L2013195","funder_id":"https://openalex.org/F4320327799","funder_display_name":"Scientific Research Fund of Liaoning Provincial Education Department"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327799","display_name":"Scientific Research Fund of Liaoning Provincial Education Department","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W61646295","https://openalex.org/W1536325007","https://openalex.org/W1601184934","https://openalex.org/W1968574530","https://openalex.org/W1975658321","https://openalex.org/W1976309217","https://openalex.org/W1977951613","https://openalex.org/W2003496171","https://openalex.org/W2008159385","https://openalex.org/W2008365755","https://openalex.org/W2009776260","https://openalex.org/W2010582541","https://openalex.org/W2015718205","https://openalex.org/W2021681605","https://openalex.org/W2029957751","https://openalex.org/W2031006315","https://openalex.org/W2033251161","https://openalex.org/W2040403168","https://openalex.org/W2058358261","https://openalex.org/W2066220442","https://openalex.org/W2067711584","https://openalex.org/W2074403295","https://openalex.org/W2080649220","https://openalex.org/W2082092804","https://openalex.org/W2086764769","https://openalex.org/W2092660649","https://openalex.org/W2095229829","https://openalex.org/W2102694783","https://openalex.org/W2111678491","https://openalex.org/W2119351095","https://openalex.org/W2131421228","https://openalex.org/W2138326128","https://openalex.org/W2146768275","https://openalex.org/W2150399692","https://openalex.org/W2155372339","https://openalex.org/W2158498225","https://openalex.org/W2161251616","https://openalex.org/W2168305032","https://openalex.org/W2200986102","https://openalex.org/W2320725412","https://openalex.org/W2407340388","https://openalex.org/W4232254113","https://openalex.org/W6602539005","https://openalex.org/W6635935638","https://openalex.org/W6679675628"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2370014100","https://openalex.org/W1979110442","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W2156660460","https://openalex.org/W4287264924","https://openalex.org/W3137108924","https://openalex.org/W1852009617","https://openalex.org/W2352764755"],"abstract_inverted_index":{"Internet":[0],"attacks,":[1,9],"such":[2],"as":[3,128],"distributed":[4],"denial-of-service":[5],"attacks":[6,20],"and":[7,14,17,24,62,76,152,164],"worm":[8],"are":[10,21],"increasing":[11],"in":[12],"severity":[13],"frequency.":[15],"Identifying":[16],"mitigating":[18],"realtime":[19],"an":[22],"important":[23],"challenging":[25],"task":[26],"for":[27,59,73],"network":[28],"administrators.":[29],"An":[30],"infected":[31],"host":[32,49],"can":[33,56,160],"make":[34],"a":[35,44,48,52,68,94,105],"large":[36],"number":[37],"of":[38,89,107,113,118,135,143,147],"connections":[39],"to":[40],"distinct":[41],"destinations":[42],"during":[43],"short":[45],"time.":[46],"Such":[47],"is":[50,104,137],"called":[51,98],"superpoint.":[53],"Detecting":[54],"superpoints":[55,75,136,162],"be":[57],"utilized":[58],"traffic":[60],"engineering":[61],"anomaly":[63],"detection.":[64],"This":[65],"paper":[66],"proposes":[67],"novel":[69],"data":[70,96],"streaming":[71],"method":[72,91,159],"detecting":[74],"proves":[77],"guarantees":[78],"on":[79],"its":[80],"accuracy":[81],"with":[82,168],"low":[83],"memory":[84],"requirements.":[85],"The":[86,110,133],"superior":[87],"performance":[88],"this":[90],"comes":[92],"from":[93,124],"new":[95],"structure,":[97],"vector":[99],"bloom":[100],"filter":[101],"(VBF),":[102],"which":[103,119],"variant":[106],"standard":[108],"BF.":[109],"VBF":[111],"consists":[112],"six":[114],"hash":[115,144],"functions,":[116],"four":[117],"take":[120],"some":[121],"consecutive":[122],"bits":[123],"the":[125,129,141,148,157],"input":[126],"string":[127],"corresponding":[130],"value,":[131],"respectively.":[132],"information":[134],"obtained":[138],"by":[139],"using":[140],"overlapping":[142],"bit":[145],"strings":[146],"VBF.":[149],"Theoretical":[150],"analysis":[151],"experimental":[153],"results":[154],"show":[155],"that":[156],"proposed":[158],"detect":[161],"precisely":[163],"efficiently":[165],"through":[166],"comparison":[167],"other":[169],"existing":[170],"approaches.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
