{"id":"https://openalex.org/W4407248056","doi":"https://doi.org/10.1109/wpmc63271.2024.10863532","title":"Enhancing Network Security: A Modular Neural Network Approach to Detect Suspicious Patterns","display_name":"Enhancing Network Security: A Modular Neural Network Approach to Detect Suspicious Patterns","publication_year":2024,"publication_date":"2024-11-17","ids":{"openalex":"https://openalex.org/W4407248056","doi":"https://doi.org/10.1109/wpmc63271.2024.10863532"},"language":"en","primary_location":{"id":"doi:10.1109/wpmc63271.2024.10863532","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc63271.2024.10863532","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040026272","display_name":"Sotir Sotirov","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108077","display_name":"Prof. Assen Zlatarov University","ror":"https://ror.org/020ak9w19","country_code":"BG","type":"education","lineage":["https://openalex.org/I4210108077"]}],"countries":["BG"],"is_corresponding":true,"raw_author_name":"Sotir Sotirov","raw_affiliation_strings":["Assen Zlatarov University Burgas,Bulgaria"],"affiliations":[{"raw_affiliation_string":"Assen Zlatarov University Burgas,Bulgaria","institution_ids":["https://openalex.org/I4210108077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078409807","display_name":"Vladimir Poulkov","orcid":"https://orcid.org/0000-0003-3226-5639"},"institutions":[{"id":"https://openalex.org/I31151848","display_name":"Technical University of Sofia","ror":"https://ror.org/052prhs50","country_code":"BG","type":"education","lineage":["https://openalex.org/I31151848"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Vladimir Poulkov","raw_affiliation_strings":["Technical University of Sofia,Sofia,Bulgaria"],"affiliations":[{"raw_affiliation_string":"Technical University of Sofia,Sofia,Bulgaria","institution_ids":["https://openalex.org/I31151848"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054696693","display_name":"Agata Manolova","orcid":"https://orcid.org/0000-0002-8120-363X"},"institutions":[{"id":"https://openalex.org/I31151848","display_name":"Technical University of Sofia","ror":"https://ror.org/052prhs50","country_code":"BG","type":"education","lineage":["https://openalex.org/I31151848"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Agata Manolova","raw_affiliation_strings":["Technical University of Sofia,Sofia,Bulgaria"],"affiliations":[{"raw_affiliation_string":"Technical University of Sofia,Sofia,Bulgaria","institution_ids":["https://openalex.org/I31151848"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040026272"],"corresponding_institution_ids":["https://openalex.org/I4210108077"],"apc_list":null,"apc_paid":null,"fwci":0.3653,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66561459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8058645725250244},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.7279136776924133},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5687821507453918},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5295059680938721},{"id":"https://openalex.org/keywords/modular-neural-network","display_name":"Modular neural network","score":0.47515246272087097},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3869165778160095},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3538574278354645},{"id":"https://openalex.org/keywords/time-delay-neural-network","display_name":"Time delay neural network","score":0.2813605070114136},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18220090866088867}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8058645725250244},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.7279136776924133},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5687821507453918},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5295059680938721},{"id":"https://openalex.org/C2781121602","wikidata":"https://www.wikidata.org/wiki/Q3504403","display_name":"Modular neural network","level":4,"score":0.47515246272087097},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3869165778160095},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3538574278354645},{"id":"https://openalex.org/C175202392","wikidata":"https://www.wikidata.org/wiki/Q2434543","display_name":"Time delay neural network","level":3,"score":0.2813605070114136},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18220090866088867}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wpmc63271.2024.10863532","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc63271.2024.10863532","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1598796236","https://openalex.org/W2024760831","https://openalex.org/W2124776405","https://openalex.org/W2278186031","https://openalex.org/W2294886990","https://openalex.org/W2762776925","https://openalex.org/W2802174584","https://openalex.org/W6635679246"],"related_works":["https://openalex.org/W1558201422","https://openalex.org/W2281615551","https://openalex.org/W2317332738","https://openalex.org/W2022575851","https://openalex.org/W2367028704","https://openalex.org/W794512309","https://openalex.org/W14051135","https://openalex.org/W575330181","https://openalex.org/W2789838507","https://openalex.org/W2166879558"],"abstract_inverted_index":{"The":[0,64,79],"increasing":[1],"complexity":[2],"and":[3,25,34,53,77,96,113,121,147],"sophistication":[4],"of":[5,144,152],"cyber":[6],"threats":[7],"pose":[8],"significant":[9],"challenges":[10],"to":[11,59,82,92,132,141],"network":[12,18,36,46,108,123],"security.":[13],"Detecting":[14],"suspicious":[15],"patterns":[16],"in":[17,105],"traffic-such":[19],"as":[20],"unusual":[21],"activity,":[22],"unexpected":[23],"communications,":[24],"atypical":[26,122],"data":[27],"patterns\u2014is":[28],"critical":[29],"for":[30,74],"identifying":[31],"potential":[32],"cyber-attacks":[33],"unauthorized":[35],"use.":[37],"In":[38],"this":[39,100],"study,":[40],"we":[41],"propose":[42],"a":[43,127],"modular":[44,65],"neural":[45],"approach,":[47],"integrating":[48],"Recurrent":[49],"Neural":[50],"Networks":[51],"(RNN)":[52],"Nonlinear":[54],"AutoRegressive":[55],"eXogenous":[56],"(NARX)":[57],"models,":[58],"effectively":[60],"detect":[61],"these":[62],"anomalies.":[63],"structure":[66],"divides":[67],"the":[68,88,115,135,142],"problem":[69],"into":[70],"manageable":[71],"subproblems,":[72],"allowing":[73],"enhanced":[75],"accuracy":[76],"flexibility.":[78],"RNN\u2019s":[80],"ability":[81],"process":[83],"sequential":[84],"data,":[85,125],"combined":[86],"with":[87],"NARX":[89],"model\u2019s":[90],"capacity":[91],"capture":[93],"both":[94,119],"internal":[95],"external":[97],"dependencies,":[98],"makes":[99],"hybrid":[101],"approach":[102],"particularly":[103],"effective":[104],"analyzing":[106],"complex":[107],"traffic":[109,124],"patterns.":[110],"We":[111],"trained":[112],"tested":[114],"proposed":[116],"model":[117],"using":[118],"typical":[120],"achieving":[126],"mean":[128],"squared":[129],"error":[130],"close":[131],"zero":[133],"during":[134],"training":[136],"phase.":[137],"This":[138],"research":[139],"contributes":[140],"development":[143],"more":[145],"resilient":[146],"adaptive":[148],"cybersecurity":[149],"solutions,":[150],"capable":[151],"safeguarding":[153],"networks":[154],"against":[155],"evolving":[156],"threats.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
