{"id":"https://openalex.org/W3008365266","doi":"https://doi.org/10.1109/bigdata47090.2019.9005668","title":"IEEE BigData 2019 Cup: Suspicious Network Event Recognition","display_name":"IEEE BigData 2019 Cup: Suspicious Network Event Recognition","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3008365266","doi":"https://doi.org/10.1109/bigdata47090.2019.9005668","mag":"3008365266"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata47090.2019.9005668","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9005668","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006523416","display_name":"Andrzej Janusz","orcid":"https://orcid.org/0000-0002-9763-1399"},"institutions":[{"id":"https://openalex.org/I4654613","display_name":"University of Warsaw","ror":"https://ror.org/039bjqg32","country_code":"PL","type":"education","lineage":["https://openalex.org/I4654613"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Andrzej Janusz","raw_affiliation_strings":["Institute of Informatics, University of Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Informatics, University of Warsaw, Poland","institution_ids":["https://openalex.org/I4654613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074979041","display_name":"Daniel Ka\u0142u\u017ca","orcid":"https://orcid.org/0000-0002-2544-5052"},"institutions":[{"id":"https://openalex.org/I4654613","display_name":"University of Warsaw","ror":"https://ror.org/039bjqg32","country_code":"PL","type":"education","lineage":["https://openalex.org/I4654613"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Daniel Kaluza","raw_affiliation_strings":["Institute of Informatics, University of Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Informatics, University of Warsaw, Poland","institution_ids":["https://openalex.org/I4654613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002098274","display_name":"Agnieszka Ch\u0105dzy\u0144ska-Krasowska","orcid":"https://orcid.org/0000-0002-1768-9620"},"institutions":[{"id":"https://openalex.org/I3017851245","display_name":"Polish-Japanese Academy of Information Technology","ror":"https://ror.org/01v542j61","country_code":"PL","type":"education","lineage":["https://openalex.org/I3017851245"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Agnieszka Chadzynska-Krasowska","raw_affiliation_strings":["Polish-Japanese Academy of Information Technology, Poland"],"affiliations":[{"raw_affiliation_string":"Polish-Japanese Academy of Information Technology, Poland","institution_ids":["https://openalex.org/I3017851245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062725000","display_name":"Bartek Konarski","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bartek Konarski","raw_affiliation_strings":["Security On-Demand, USA"],"affiliations":[{"raw_affiliation_string":"Security On-Demand, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028695838","display_name":"Joel Holland","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Joel Holland","raw_affiliation_strings":["Security On-Demand, USA"],"affiliations":[{"raw_affiliation_string":"Security On-Demand, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057541763","display_name":"Dominik \u015al\u0229zak","orcid":"https://orcid.org/0000-0003-2453-4974"},"institutions":[{"id":"https://openalex.org/I4654613","display_name":"University of Warsaw","ror":"https://ror.org/039bjqg32","country_code":"PL","type":"education","lineage":["https://openalex.org/I4654613"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Dominik Slezak","raw_affiliation_strings":["Institute of Informatics, University of Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Informatics, University of Warsaw, Poland","institution_ids":["https://openalex.org/I4654613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5006523416"],"corresponding_institution_ids":["https://openalex.org/I4654613"],"apc_list":null,"apc_paid":null,"fwci":4.2441,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.94882404,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"5881","last_page":"5887"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.8443522453308105},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7646721601486206},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.6670366525650024},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6301003098487854},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.5746598243713379},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.5697289705276489},{"id":"https://openalex.org/keywords/competition","display_name":"Competition (biology)","score":0.563970685005188},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5226409435272217},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5032162070274353},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5006208419799805},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.49247393012046814},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.445313036441803},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4208420217037201},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.401167631149292},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36946213245391846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.325701504945755}],"concepts":[{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.8443522453308105},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7646721601486206},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.6670366525650024},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6301003098487854},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.5746598243713379},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.5697289705276489},{"id":"https://openalex.org/C91306197","wikidata":"https://www.wikidata.org/wiki/Q45767","display_name":"Competition (biology)","level":2,"score":0.563970685005188},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5226409435272217},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5032162070274353},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5006208419799805},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.49247393012046814},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.445313036441803},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4208420217037201},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.401167631149292},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36946213245391846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.325701504945755},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata47090.2019.9005668","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9005668","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1519427456","https://openalex.org/W2064675550","https://openalex.org/W2265846598","https://openalex.org/W2295598076","https://openalex.org/W2523973299","https://openalex.org/W2544804866","https://openalex.org/W2734006851","https://openalex.org/W2768348081","https://openalex.org/W2783287794","https://openalex.org/W2913542514","https://openalex.org/W3007351103","https://openalex.org/W3008066310","https://openalex.org/W3008731154","https://openalex.org/W3102476541","https://openalex.org/W4298132949","https://openalex.org/W6693505360","https://openalex.org/W6729147614","https://openalex.org/W6745609711"],"related_works":["https://openalex.org/W4380075502","https://openalex.org/W4223943233","https://openalex.org/W4312200629","https://openalex.org/W4360585206","https://openalex.org/W2551093110","https://openalex.org/W4364306694","https://openalex.org/W3014300295","https://openalex.org/W2968586400","https://openalex.org/W2942650110","https://openalex.org/W4281986673"],"abstract_inverted_index":{"\u201cIEEE":[0],"BigData":[1,32],"2019":[2,33],"Cup:":[3],"Suspicious":[4],"Network":[5],"Event":[6],"Recognition\u201d":[7],"was":[8,71,102],"a":[9,90],"data":[10,64,151],"mining":[11],"competition":[12,78],"organized":[13],"jointly":[14],"by":[15],"companies":[16],"Security":[17],"On-Demand":[18],"and":[19,47,94],"QED":[20],"Software":[21],"at":[22],"the":[23,30,42,56,82,103,112,119],"KnowledgePit":[24],"online":[25],"platform,":[26],"in":[27,126],"association":[28],"with":[29],"IEEE":[31],"conference.":[34],"The":[35],"scope":[36],"of":[37,44,58,105,114,121],"this":[38,52,127],"challenge":[39],"referred":[40],"to":[41,73,77,117,149],"notions":[43],"cybersecurity":[45],"analytics":[46],"network":[48],"alert":[49],"evaluation.":[50],"In":[51,130],"paper,":[53],"we":[54,87,95,133],"summarize":[55],"results":[57,113],"our":[59],"competition.":[60],"We":[61,80,109],"explain":[62],"how":[63,97],"sets":[65],"had":[66],"been":[67],"prepared":[68],"before":[69],"it":[70],"possible":[72],"make":[74],"them":[75],"available":[76],"participants.":[79],"describe":[81],"baseline":[83],"scoring":[84],"models":[85],"that":[86,135,143],"designed":[88],"as":[89],"reference":[91],"for":[92,99],"participants,":[93],"demonstrate":[96],"critical":[98],"their":[100],"performance":[101],"aspect":[104],"appropriate":[106],"feature":[107],"engineering.":[108],"also":[110],"discuss":[111],"experiments":[115],"conducted":[116],"verify":[118],"(un)suitability":[120],"deep":[122],"recurrent":[123],"neural":[124],"networks":[125],"particular":[128],"case.":[129],"some":[131],"sense,":[132],"show":[134],"there":[136],"are":[137],"no":[138],"\u201cperfect\u201d":[139],"machine":[140],"learning":[141],"approaches":[142],"could":[144],"be":[145],"applied":[146],"equally":[147],"successfully":[148],"every":[150],"science":[152],"undertaking.":[153]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":10}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
