{"id":"https://openalex.org/W7133341044","doi":"https://doi.org/10.1109/tps-isa67132.2025.00041","title":"Leveraging Transformer Models and eXplainable Reinforcement Learning Methods for Advanced Intrusion Detection and Response System","display_name":"Leveraging Transformer Models and eXplainable Reinforcement Learning Methods for Advanced Intrusion Detection and Response System","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7133341044","doi":"https://doi.org/10.1109/tps-isa67132.2025.00041"},"language":null,"primary_location":{"id":"doi:10.1109/tps-isa67132.2025.00041","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tps-isa67132.2025.00041","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056801967","display_name":"Mohammad GhasemiGol","orcid":"https://orcid.org/0000-0001-6661-0942"},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohammad Ghasemigol","raw_affiliation_strings":["School of Cybersecurity, Old Dominion University,Department of Computer Science,Norfolk,VA,USA"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Old Dominion University,Department of Computer Science,Norfolk,VA,USA","institution_ids":["https://openalex.org/I81365321"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002423453","display_name":"Daniel Takabi","orcid":"https://orcid.org/0000-0003-0447-3641"},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Takabi","raw_affiliation_strings":["School of Cybersecurity, Old Dominion University,Norfolk,VA,USA"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Old Dominion University,Norfolk,VA,USA","institution_ids":["https://openalex.org/I81365321"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056801967"],"corresponding_institution_ids":["https://openalex.org/I81365321"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8019802,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"325","last_page":"333"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3686000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3686000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.09279999881982803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0681999996304512,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7473999857902527},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.7408999800682068},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6310999989509583},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6155999898910522},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.512499988079071},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.48510000109672546},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.43529999256134033}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7473999857902527},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.7408999800682068},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6830000281333923},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6310999989509583},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6155999898910522},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.512499988079071},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.48510000109672546},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44350001215934753},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.43529999256134033},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42879998683929443},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.34689998626708984},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2752000093460083},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27390000224113464},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2718000113964081},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2621000111103058},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.25360000133514404},{"id":"https://openalex.org/C107327155","wikidata":"https://www.wikidata.org/wiki/Q330268","display_name":"Decision support system","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tps-isa67132.2025.00041","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tps-isa67132.2025.00041","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":85,"referenced_works":["https://openalex.org/W344488431","https://openalex.org/W433644524","https://openalex.org/W1553647866","https://openalex.org/W1724034377","https://openalex.org/W1965850056","https://openalex.org/W1972716161","https://openalex.org/W1985451433","https://openalex.org/W1989429174","https://openalex.org/W1990282869","https://openalex.org/W1991181258","https://openalex.org/W1991510770","https://openalex.org/W1996342777","https://openalex.org/W1996836193","https://openalex.org/W2001540531","https://openalex.org/W2025760771","https://openalex.org/W2027320593","https://openalex.org/W2032868181","https://openalex.org/W2040926552","https://openalex.org/W2044777538","https://openalex.org/W2049531742","https://openalex.org/W2096063294","https://openalex.org/W2106722747","https://openalex.org/W2110086918","https://openalex.org/W2138536023","https://openalex.org/W2140576100","https://openalex.org/W2142663125","https://openalex.org/W2143125131","https://openalex.org/W2146692826","https://openalex.org/W2150850146","https://openalex.org/W2152991454","https://openalex.org/W2153570961","https://openalex.org/W2163215442","https://openalex.org/W2165906718","https://openalex.org/W2167710876","https://openalex.org/W2169616563","https://openalex.org/W2191886897","https://openalex.org/W2470530329","https://openalex.org/W2517721298","https://openalex.org/W2520200210","https://openalex.org/W2521674365","https://openalex.org/W2528827134","https://openalex.org/W2535876017","https://openalex.org/W2537702951","https://openalex.org/W2604075165","https://openalex.org/W2625013748","https://openalex.org/W2737306402","https://openalex.org/W2783741806","https://openalex.org/W2789828921","https://openalex.org/W2800521404","https://openalex.org/W2803414046","https://openalex.org/W2837181326","https://openalex.org/W2884245649","https://openalex.org/W2885478531","https://openalex.org/W2885565273","https://openalex.org/W2888279577","https://openalex.org/W2905396420","https://openalex.org/W2914057541","https://openalex.org/W2919785014","https://openalex.org/W2942384225","https://openalex.org/W2955994851","https://openalex.org/W2958285686","https://openalex.org/W2962140879","https://openalex.org/W2968232309","https://openalex.org/W2978937298","https://openalex.org/W3012637289","https://openalex.org/W3013246316","https://openalex.org/W3014059767","https://openalex.org/W3039471640","https://openalex.org/W3045866986","https://openalex.org/W3047809460","https://openalex.org/W3085230347","https://openalex.org/W3139899785","https://openalex.org/W3163895120","https://openalex.org/W3201223398","https://openalex.org/W4200363477","https://openalex.org/W4226333495","https://openalex.org/W4226485672","https://openalex.org/W4309235938","https://openalex.org/W4309283031","https://openalex.org/W4315647204","https://openalex.org/W4377022569","https://openalex.org/W4381550190","https://openalex.org/W4393207482","https://openalex.org/W4399647672","https://openalex.org/W4411232739"],"related_works":[],"abstract_inverted_index":{"As":[0],"cyber":[1],"threats":[2,38],"become":[3],"increasingly":[4],"sophisticated":[5],"and":[6,14,32,39,85,103,126,153,167,173,206,211],"frequent,":[7],"the":[8,52,66,82,140,186,199],"need":[9],"for":[10,27,89,180],"advanced":[11],"Intrusion":[12],"Detection":[13],"Response":[15],"Systems":[16],"(IDRS)":[17],"is":[18,51,71],"more":[19],"critical":[20],"than":[21],"ever.":[22],"These":[23,92],"systems":[24],"are":[25],"essential":[26],"defending":[28],"networks":[29],"against":[30],"external":[31],"internal":[33],"intrusions":[34],"by":[35,48,58,74],"detecting":[36],"potential":[37],"applying":[40],"appropriate":[41],"responses.":[42,91],"However,":[43],"a":[44,117],"significant":[45],"challenge":[46],"faced":[47],"existing":[49],"IDRSs":[50],"overwhelming":[53],"volume":[54],"of":[55,68,194],"alerts":[56],"generated":[57],"IDSs,":[59],"which":[60],"makes":[61],"manual":[62,108],"response":[63,79],"impractical.":[64],"Additionally,":[65],"effectiveness":[67],"automated":[69],"IRS":[70,190],"often":[72,94],"undermined":[73],"difficulties":[75],"in":[76,214],"accurately":[77],"estimating":[78],"costs,":[80],"assessing":[81],"network":[83,101,158,201],"situation,":[84,202],"providing":[86],"clear":[87],"explanations":[88],"chosen":[90],"challenges":[93],"lead":[95],"to":[96,132,169,198],"suboptimal":[97],"responses,":[98],"negatively":[99],"impacting":[100],"performance":[102,145],"pushing":[104],"administrators":[105],"towards":[106],"inefficient":[107],"methods.":[109],"To":[110],"overcome":[111],"these":[112],"challenges,":[113],"this":[114],"paper":[115],"introduces":[116],"novel":[118],"approach":[119],"that":[120,139],"integrates":[121],"transformer":[122],"encoder,":[123],"decision":[124],"transformer,":[125],"eXplainable":[127],"Reinforcement":[128],"Learning":[129],"(XRL)":[130],"methods":[131],"build":[133],"an":[134],"AI-powered":[135],"IDRS.":[136],"Experiments":[137],"show":[138],"proposed":[141,187],"transformer-based":[142],"IDS":[143],"achieves":[144],"on":[146,156],"par":[147],"with":[148],"or":[149],"surpass":[150],"traditional":[151],"treebased":[152],"neural":[154],"models":[155],"tabular":[157],"flows.":[159],"Despite":[160],"similar":[161],"performance,":[162],"transformers":[163],"offer":[164],"greater":[165],"flexibility":[166],"adaptability":[168],"shifting":[170],"feature":[171],"distributions":[172],"evolving":[174],"attack":[175,204],"patterns,":[176],"making":[177],"them":[178],"well-suited":[179],"real-world":[181],"deployment.":[182],"I":[183],"In":[184],"addition,":[185],"Decision":[188],"Transformer-based":[189],"enables":[191],"dynamic":[192],"selection":[193],"optimal":[195],"responses":[196],"tailored":[197],"current":[200],"detected":[203],"type,":[205],"contextual":[207],"constraints,":[208],"offering":[209],"explainable":[210],"adaptive":[212],"defense":[213],"real":[215],"time.":[216]},"counts_by_year":[],"updated_date":"2026-03-05T07:30:30.508283","created_date":"2026-03-04T00:00:00"}
