{"id":"https://openalex.org/W4402262347","doi":"https://doi.org/10.1109/wincom62286.2024.10658099","title":"Efficient Intrusion Detection: Combining X<sup>2</sup> Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset","display_name":"Efficient Intrusion Detection: Combining X<sup>2</sup> Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset","publication_year":2024,"publication_date":"2024-07-23","ids":{"openalex":"https://openalex.org/W4402262347","doi":"https://doi.org/10.1109/wincom62286.2024.10658099"},"language":"en","primary_location":{"id":"doi:10.1109/wincom62286.2024.10658099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom62286.2024.10658099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065165118","display_name":"Mohammed Jouhari","orcid":"https://orcid.org/0000-0001-5406-8594"},"institutions":[{"id":"https://openalex.org/I4210121440","display_name":"Moroccan Foundation for Advanced Science, Innovation and Research","ror":"https://ror.org/02gjqpv16","country_code":"MA","type":"nonprofit","lineage":["https://openalex.org/I4210121440"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Mohammed Jouhari","raw_affiliation_strings":["Moroccan School of Engineering Sciences (EMSI),LSIA Laboratory,Tanger,Morocco"],"affiliations":[{"raw_affiliation_string":"Moroccan School of Engineering Sciences (EMSI),LSIA Laboratory,Tanger,Morocco","institution_ids":["https://openalex.org/I4210121440"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050123066","display_name":"Hafsa Benaddi","orcid":"https://orcid.org/0000-0003-2489-0637"},"institutions":[{"id":"https://openalex.org/I4210121440","display_name":"Moroccan Foundation for Advanced Science, Innovation and Research","ror":"https://ror.org/02gjqpv16","country_code":"MA","type":"nonprofit","lineage":["https://openalex.org/I4210121440"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Hafsa Benaddi","raw_affiliation_strings":["Moroccan School of Engineering Sciences (EMSI),LSIA Laboratory,Tanger,Morocco"],"affiliations":[{"raw_affiliation_string":"Moroccan School of Engineering Sciences (EMSI),LSIA Laboratory,Tanger,Morocco","institution_ids":["https://openalex.org/I4210121440"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036440733","display_name":"Khalil Ibrahimi","orcid":"https://orcid.org/0000-0002-9682-9555"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalil Ibrahimi","raw_affiliation_strings":["Ibn Tofail University,Faculty of Sciences, Laboratory of Research in Informatics (LaRI),Kenitra,Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,Faculty of Sciences, Laboratory of Research in Informatics (LaRI),Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065165118"],"corresponding_institution_ids":["https://openalex.org/I4210121440"],"apc_list":null,"apc_paid":null,"fwci":7.0638,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.97440336,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14413","display_name":"Advanced Technologies in Various Fields","score":0.9379000067710876,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7392588257789612},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6832231879234314},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6320137977600098},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5156201720237732},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5066157579421997},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4906703233718872},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.41314437985420227}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7392588257789612},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6832231879234314},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6320137977600098},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5156201720237732},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5066157579421997},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4906703233718872},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.41314437985420227},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom62286.2024.10658099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom62286.2024.10658099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2942411529","https://openalex.org/W2953211829","https://openalex.org/W4210739309","https://openalex.org/W4229010634","https://openalex.org/W4285138763","https://openalex.org/W4320559971","https://openalex.org/W4362566222","https://openalex.org/W4376455422","https://openalex.org/W4384917381","https://openalex.org/W4387870457","https://openalex.org/W4389477519","https://openalex.org/W4400728141","https://openalex.org/W6810964969"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2361044160","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDSs)":[3],"have":[4],"played":[5],"a":[6,51,87,97,115,167,181,196,203,221],"significant":[7,83],"role":[8],"in":[9,16,76,191],"the":[10,42,77,135,141,150,171,192],"detection":[11,74],"and":[12,68,93,176],"prevention":[13],"of":[14,34,79,137,173,200,206,218,224],"cyber-attacks":[15],"traditional":[17],"computing":[18],"systems.":[19],"It":[20],"is":[21,27,180],"not":[22],"surprising":[23],"that":[24,109,169],"this":[25,101,111],"technology":[26],"now":[28],"being":[29],"applied":[30],"to":[31,133],"secure":[32],"Internet":[33],"Things":[35],"(IoT)":[36],"networks":[37],"against":[38],"cyber":[39],"threats.":[40],"However,":[41,85,184],"limited":[43],"computational":[44],"resources":[45],"available":[46],"on":[47],"IoT":[48,61,80,157,174],"devices":[49,175],"pose":[50],"challenge":[52],"for":[53,60,155,209,227],"deploying":[54],"conventional":[55],"computing-based":[56],"IDSs.":[57],"IDSs":[58],"designed":[59],"environments":[62],"must":[63],"demonstrate":[64],"high":[65,90],"classification":[66,91],"performance,":[67],"utilize":[69],"low-complexity":[70],"models.":[71],"Developing":[72],"intrusion":[73],"models":[75],"field":[78],"has":[81],"seen":[82],"advancements.":[84],"achieving":[86],"balance":[88],"between":[89],"performance":[92],"reduced":[94],"complexity":[95],"remains":[96],"challenging":[98,182],"endeavor.":[99],"In":[100],"research,":[102],"we":[103,128],"present":[104],"an":[105,215],"effective":[106],"IDS":[107],"model":[108,152,168,187],"addresses":[110],"issue":[112],"by":[113,194],"combining":[114],"lightweight":[116],"Convolutional":[117],"Neural":[118],"Network":[119],"(CNN)":[120],"with":[121],"bidirectional":[122],"Long":[123],"Short-Term":[124],"Memory":[125],"(BiLSTM).":[126],"Additionally,":[127],"employ":[129],"feature":[130],"selection":[131],"techniques":[132],"minimize":[134],"number":[136],"features":[138],"inputted":[139],"into":[140],"model,":[142],"thereby":[143],"reducing":[144],"its":[145],"complexity.":[146],"This":[147],"approach":[148],"renders":[149],"proposed":[151],"highly":[153],"suitable":[154],"resource-constrained":[156],"devices,":[158],"ensuring":[159],"it":[160,213],"meets":[161,170],"their":[162],"computation":[163],"capability":[164],"requirements.":[165],"Creating":[166],"demands":[172],"attains":[177],"enhanced":[178],"precision":[179],"task.":[183],"our":[185],"suggested":[186],"outperforms":[188],"previous":[189],"works":[190],"literature":[193],"attaining":[195],"remarkable":[197],"accuracy":[198,216],"rate":[199,217],"97.90%":[201],"within":[202,220],"prediction":[204,222],"time":[205,223],"1.1":[207],"seconds":[208,226],"binary":[210],"classification.":[211],"Furthermore,":[212],"achieves":[214],"97.09%":[219],"2.10":[225],"multiclassification.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
