{"id":"https://openalex.org/W2010956860","doi":"https://doi.org/10.1109/cit.2008.4594714","title":"An overview of recent advances in intrusion detection","display_name":"An overview of recent advances in intrusion detection","publication_year":2008,"publication_date":"2008-07-01","ids":{"openalex":"https://openalex.org/W2010956860","doi":"https://doi.org/10.1109/cit.2008.4594714","mag":"2010956860"},"language":"en","primary_location":{"id":"doi:10.1109/cit.2008.4594714","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cit.2008.4594714","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 8th IEEE International Conference on Computer and Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006974327","display_name":"Mohd Fadzli Marhusin","orcid":"https://orcid.org/0000-0003-2890-2068"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mohd Fadzli Marhusin","raw_affiliation_strings":["School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia","Sch. of ITEE, Univ. of New South Wales at Australian Defence Force Acad., Canberra, ACT"],"affiliations":[{"raw_affiliation_string":"School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia","institution_ids":["https://openalex.org/I40053085"]},{"raw_affiliation_string":"Sch. of ITEE, Univ. of New South Wales at Australian Defence Force Acad., Canberra, ACT","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072557235","display_name":"David Cornforth","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"David Cornforth","raw_affiliation_strings":["School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia","Sch. of ITEE, Univ. of New South Wales at Australian Defence Force Acad., Canberra, ACT"],"affiliations":[{"raw_affiliation_string":"School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia","institution_ids":["https://openalex.org/I40053085"]},{"raw_affiliation_string":"Sch. of ITEE, Univ. of New South Wales at Australian Defence Force Acad., Canberra, ACT","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007217476","display_name":"Henry Larkin","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Henry Larkin","raw_affiliation_strings":["School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia","Sch. of ITEE, Univ. of New South Wales at Australian Defence Force Acad., Canberra, ACT"],"affiliations":[{"raw_affiliation_string":"School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia","institution_ids":["https://openalex.org/I40053085"]},{"raw_affiliation_string":"Sch. of ITEE, Univ. of New South Wales at Australian Defence Force Acad., Canberra, ACT","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006974327"],"corresponding_institution_ids":["https://openalex.org/I31746571","https://openalex.org/I40053085"],"apc_list":null,"apc_paid":null,"fwci":1.906,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.86948102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"432","last_page":"437"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8914480209350586},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7440823316574097},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.6598618626594543},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6389355659484863},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5811459422111511},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4498519003391266},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41189125180244446},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3918915390968323}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8914480209350586},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7440823316574097},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.6598618626594543},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6389355659484863},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5811459422111511},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4498519003391266},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41189125180244446},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3918915390968323},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/cit.2008.4594714","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cit.2008.4594714","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 8th IEEE International Conference on Computer and Information Technology","raw_type":"proceedings-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30063701","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:uon:16245","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.13/1057717","pdf_url":null,"source":{"id":"https://openalex.org/S4377196471","display_name":"NOVA (University of Newcastle Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78757542","host_organization_name":"University of Newcastle Australia","host_organization_lineage":["https://openalex.org/I78757542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1326468","https://openalex.org/W1481106594","https://openalex.org/W1500318328","https://openalex.org/W1511785468","https://openalex.org/W1591480890","https://openalex.org/W1596403416","https://openalex.org/W1606099259","https://openalex.org/W1724519426","https://openalex.org/W1904065432","https://openalex.org/W1941427975","https://openalex.org/W2007087405","https://openalex.org/W2014712522","https://openalex.org/W2032722706","https://openalex.org/W2071221494","https://openalex.org/W2100903665","https://openalex.org/W2105819382","https://openalex.org/W2107409339","https://openalex.org/W2107676921","https://openalex.org/W2124365372","https://openalex.org/W2133661814","https://openalex.org/W2144870254","https://openalex.org/W2148890532","https://openalex.org/W2158500407","https://openalex.org/W2159546923","https://openalex.org/W2161668489","https://openalex.org/W4232826716","https://openalex.org/W6600061138","https://openalex.org/W6637618070","https://openalex.org/W6683575510"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W2376886931","https://openalex.org/W2351448539","https://openalex.org/W1495178644","https://openalex.org/W2383892082","https://openalex.org/W2185594426","https://openalex.org/W2374845301","https://openalex.org/W2357927603","https://openalex.org/W4200619826","https://openalex.org/W2376791828"],"abstract_inverted_index":{"The":[0],"intrusion":[1,38],"detection":[2,39],"system":[3],"is":[4],"one":[5],"of":[6,36,49],"the":[7,33,43,54,59],"security":[8],"defense":[9],"tools":[10],"for":[11],"computer":[12],"networks.":[13],"In":[14,25],"recent":[15,34],"years":[16],"this":[17,26],"research":[18,61],"has":[19],"lacked":[20],"in":[21,53],"direction":[22],"and":[23,47,63],"focus.":[24],"paper":[27],"we":[28,57],"present":[29,60],"a":[30],"survey":[31,42],"on":[32],"progression":[35],"multiagent":[37],"systems.":[40],"We":[41],"existing":[44],"types,":[45],"techniques":[46],"architectures":[48],"Intrusion":[50],"Detection":[51],"Systems":[52],"literature.":[55],"Finally":[56],"outline":[58],"challenges":[62],"issues.":[64]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
