{"id":"https://openalex.org/W2783664444","doi":"https://doi.org/10.1109/bigdata.2017.8258167","title":"A review on cyber security datasets for machine learning algorithms","display_name":"A review on cyber security datasets for machine learning algorithms","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2783664444","doi":"https://doi.org/10.1109/bigdata.2017.8258167","mag":"2783664444"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata.2017.8258167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2017.8258167","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017573923","display_name":"Yavanoglu Ozlem","orcid":null},"institutions":[{"id":"https://openalex.org/I66514158","display_name":"Hacettepe University","ror":"https://ror.org/04kwvgz42","country_code":"TR","type":"education","lineage":["https://openalex.org/I66514158"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Ozlem Yavanoglu","raw_affiliation_strings":["Department of Computer Engineering, Hacettepe University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Hacettepe University, Ankara, Turkey","institution_ids":["https://openalex.org/I66514158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043630710","display_name":"Murat Aydos","orcid":"https://orcid.org/0000-0002-7570-9204"},"institutions":[{"id":"https://openalex.org/I66514158","display_name":"Hacettepe University","ror":"https://ror.org/04kwvgz42","country_code":"TR","type":"education","lineage":["https://openalex.org/I66514158"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Murat Aydos","raw_affiliation_strings":["Department of Computer Engineering, Hacettepe University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Hacettepe University, Ankara, Turkey","institution_ids":["https://openalex.org/I66514158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017573923"],"corresponding_institution_ids":["https://openalex.org/I66514158"],"apc_list":null,"apc_paid":null,"fwci":8.1131,"has_fulltext":false,"cited_by_count":126,"citation_normalized_percentile":{"value":0.97799029,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2186","last_page":"2193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7811964750289917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5968512892723083},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5855613350868225},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5634148120880127},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5328612327575684},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.47836607694625854},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4390801787376404},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4092002809047699},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40363067388534546}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7811964750289917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5968512892723083},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5855613350868225},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5634148120880127},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5328612327575684},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.47836607694625854},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4390801787376404},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4092002809047699},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40363067388534546},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata.2017.8258167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2017.8258167","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W33933511","https://openalex.org/W45826981","https://openalex.org/W106114845","https://openalex.org/W157193387","https://openalex.org/W186325430","https://openalex.org/W757277879","https://openalex.org/W959081337","https://openalex.org/W1530215515","https://openalex.org/W1952056635","https://openalex.org/W1965836830","https://openalex.org/W1972544015","https://openalex.org/W1988616232","https://openalex.org/W1988918299","https://openalex.org/W1999427165","https://openalex.org/W2002356434","https://openalex.org/W2015401767","https://openalex.org/W2029025881","https://openalex.org/W2050090549","https://openalex.org/W2074553104","https://openalex.org/W2099452399","https://openalex.org/W2115569246","https://openalex.org/W2154874878","https://openalex.org/W2188001659","https://openalex.org/W2308983626","https://openalex.org/W2327762824","https://openalex.org/W2328120369","https://openalex.org/W2342408547","https://openalex.org/W2397851823","https://openalex.org/W2401501243","https://openalex.org/W2479743319","https://openalex.org/W2484286059","https://openalex.org/W2515619687","https://openalex.org/W2557328120","https://openalex.org/W2601682974","https://openalex.org/W2612404666","https://openalex.org/W2613920221","https://openalex.org/W3099682118","https://openalex.org/W4212925010","https://openalex.org/W4238215324","https://openalex.org/W4392582158","https://openalex.org/W6640726002","https://openalex.org/W6654147000","https://openalex.org/W6669165740","https://openalex.org/W6712350746","https://openalex.org/W6713357761","https://openalex.org/W7007630956"],"related_works":["https://openalex.org/W2020340787","https://openalex.org/W1623393394","https://openalex.org/W2378688856","https://openalex.org/W2350820032","https://openalex.org/W2392498762","https://openalex.org/W2498628942","https://openalex.org/W2744631404","https://openalex.org/W3099433986","https://openalex.org/W2388760686","https://openalex.org/W2902858910"],"abstract_inverted_index":{"It":[0],"is":[1,8,22,65,74,94],"an":[2],"undeniable":[3],"fact":[4],"that":[5],"currently":[6],"information":[7],"a":[9,66],"pretty":[10],"significant":[11,67],"presence":[12],"for":[13,123],"all":[14],"companies":[15],"or":[16],"organizations.":[17],"Therefore":[18],"protecting":[19],"its":[20],"security":[21,26,49,64],"crucial":[23],"and":[24,43,50,55,80,87,97,114,127],"the":[25,48,62,70,78,99,108,120],"models":[27],"driven":[28],"by":[29],"real":[30],"datasets":[31,109],"has":[32],"become":[33],"quite":[34],"important.":[35],"The":[36,89],"operations":[37],"based":[38],"on":[39,107],"military,":[40],"government,":[41],"commercial":[42],"civilians":[44],"are":[45,119],"linked":[46],"to":[47,95],"availability":[51],"of":[52,60,72,91],"computer":[53],"systems":[54],"network.":[56],"From":[57],"this":[58,92],"point":[59],"security,":[61],"network":[63,125],"issue":[68],"because":[69],"capacity":[71],"attacks":[73],"unceasingly":[75],"rising":[76],"over":[77],"years":[79],"they":[81],"turn":[82],"into":[83],"be":[84],"more":[85],"sophisticated":[86],"distributed.":[88],"objective":[90],"review":[93],"explain":[96],"compare":[98],"most":[100],"commonly":[101],"used":[102,110],"datasets.":[103],"This":[104],"paper":[105],"focuses":[106],"in":[111],"artificial":[112],"intelligent":[113],"machine":[115],"learning":[116],"techniques,":[117],"which":[118],"primary":[121],"tools":[122],"analyzing":[124],"traffic":[126],"detecting":[128],"abnormalities.":[129]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":19},{"year":2022,"cited_by_count":20},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":6}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
