{"id":"https://openalex.org/W2157157987","doi":"https://doi.org/10.1109/ftdcs.2004.1316613","title":"A fuzzy data mining based intrusion detection model","display_name":"A fuzzy data mining based intrusion detection model","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2157157987","doi":"https://doi.org/10.1109/ftdcs.2004.1316613","mag":"2157157987"},"language":"en","primary_location":{"id":"doi:10.1109/ftdcs.2004.1316613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ftdcs.2004.1316613","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100885802","display_name":"Jianhua Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Sun","raw_affiliation_strings":["Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353550","display_name":"Hao Chen","orcid":"https://orcid.org/0000-0002-4072-0710"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Chen","raw_affiliation_strings":["Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102155841","display_name":"Zongfen Han","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongfen Han","raw_affiliation_strings":["Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022262922"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":4.5401,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.95183897,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"191","last_page":"197"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.8392852544784546},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7135745286941528},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.65409916639328},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.609434962272644},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.5190235376358032},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4929923713207245},{"id":"https://openalex.org/keywords/data-warehouse","display_name":"Data warehouse","score":0.48578977584838867},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.44245627522468567},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4349867105484009},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.41719844937324524},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2377808392047882},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20338332653045654}],"concepts":[{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.8392852544784546},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7135745286941528},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.65409916639328},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.609434962272644},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.5190235376358032},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4929923713207245},{"id":"https://openalex.org/C135572916","wikidata":"https://www.wikidata.org/wiki/Q193351","display_name":"Data warehouse","level":2,"score":0.48578977584838867},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44245627522468567},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4349867105484009},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.41719844937324524},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2377808392047882},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20338332653045654},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ftdcs.2004.1316613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ftdcs.2004.1316613","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W15574608","https://openalex.org/W26711432","https://openalex.org/W163339721","https://openalex.org/W1485268022","https://openalex.org/W1513222348","https://openalex.org/W1521082990","https://openalex.org/W1566095837","https://openalex.org/W1583975142","https://openalex.org/W1587265799","https://openalex.org/W1687244664","https://openalex.org/W1884606608","https://openalex.org/W1941427975","https://openalex.org/W1979877030","https://openalex.org/W1994997349","https://openalex.org/W2096768134","https://openalex.org/W2129860818","https://openalex.org/W2130676130","https://openalex.org/W2136995341","https://openalex.org/W2149799448","https://openalex.org/W2163277533","https://openalex.org/W2168931007","https://openalex.org/W2799002609","https://openalex.org/W2803279381","https://openalex.org/W4233704167","https://openalex.org/W4248151413","https://openalex.org/W6601051852","https://openalex.org/W6606601333","https://openalex.org/W6634829514","https://openalex.org/W6635224074"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W1724519426","https://openalex.org/W2351051591","https://openalex.org/W2369534771","https://openalex.org/W2357468538","https://openalex.org/W1548126107","https://openalex.org/W2209997499"],"abstract_inverted_index":{"With":[0],"explosively":[1],"increasing":[2],"information,":[3],"data":[4,28,39,48,62],"mining":[5,29,40],"techniques":[6,30],"are":[7,66],"frequently":[8],"employed":[9],"to":[10,31],"identify":[11],"trends":[12],"in":[13,60],"the":[14,47,57,61],"warehouse":[15],"that":[16],"may":[17],"not":[18],"be":[19],"readily":[20],"apparent.":[21],"In":[22],"this":[23],"paper":[24],"we":[25],"apply":[26],"fuzzy":[27,38,53],"a":[32,37,52],"security":[33],"system":[34],"and":[35,50],"build":[36],"based":[41],"intrusion":[42],"detection":[43],"model.":[44],"Through":[45],"normalizing":[46],"set":[49],"building":[51],"similar":[54],"matrix":[55],"of":[56],"network":[58,64],"connections":[59,65],"set,":[63],"clustered":[67],"into":[68],"different":[69],"classes.":[70]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
