{"id":"https://openalex.org/W2148890532","doi":"https://doi.org/10.1109/fuzzy.2005.1452414","title":"A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems","display_name":"A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems","publication_year":2005,"publication_date":"2005-07-28","ids":{"openalex":"https://openalex.org/W2148890532","doi":"https://doi.org/10.1109/fuzzy.2005.1452414","mag":"2148890532"},"language":"en","primary_location":{"id":"doi:10.1109/fuzzy.2005.1452414","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzzy.2005.1452414","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036748485","display_name":"Aly M. El-Semary","orcid":"https://orcid.org/0000-0002-8698-0622"},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"A. El--Semary","raw_affiliation_strings":["Center of Information Security, University of Tulsa, Tulsa, OK, USA"],"affiliations":[{"raw_affiliation_string":"Center of Information Security, University of Tulsa, Tulsa, OK, USA","institution_ids":["https://openalex.org/I87208437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083895785","display_name":"J. Edmonds","orcid":null},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. Edmonds","raw_affiliation_strings":["Center of Information Security, University of Tulsa, Tulsa, OK, USA"],"affiliations":[{"raw_affiliation_string":"Center of Information Security, University of Tulsa, Tulsa, OK, USA","institution_ids":["https://openalex.org/I87208437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070099905","display_name":"Jes\u00fas Gonz\u00e1lez","orcid":"https://orcid.org/0000-0002-0415-1821"},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. Gonzalez","raw_affiliation_strings":["Center of Information Security, University of Tulsa, Tulsa, OK, USA"],"affiliations":[{"raw_affiliation_string":"Center of Information Security, University of Tulsa, Tulsa, OK, USA","institution_ids":["https://openalex.org/I87208437"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022613150","display_name":"Mauricio Papa","orcid":"https://orcid.org/0009-0000-5628-0548"},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Papa","raw_affiliation_strings":["Center of Information Security, University of Tulsa, Tulsa, OK, USA"],"affiliations":[{"raw_affiliation_string":"Center of Information Security, University of Tulsa, Tulsa, OK, USA","institution_ids":["https://openalex.org/I87208437"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036748485"],"corresponding_institution_ids":["https://openalex.org/I87208437"],"apc_list":null,"apc_paid":null,"fwci":0.5191,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.73995549,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"30","issue":null,"first_page":"325","last_page":"330"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10820","display_name":"Fuzzy Logic and Control Systems","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6843266487121582},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6823238730430603},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6798341274261475},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6546021699905396},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6079484820365906},{"id":"https://openalex.org/keywords/inference-engine","display_name":"Inference engine","score":0.6053696870803833},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.577705442905426},{"id":"https://openalex.org/keywords/fuzzy-inference-system","display_name":"Fuzzy inference system","score":0.5480287075042725},{"id":"https://openalex.org/keywords/expert-system","display_name":"Expert system","score":0.5184628367424011},{"id":"https://openalex.org/keywords/fuzzy-electronics","display_name":"Fuzzy electronics","score":0.4607257843017578},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.4553346037864685},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.44962507486343384},{"id":"https://openalex.org/keywords/adaptive-neuro-fuzzy-inference-system","display_name":"Adaptive neuro fuzzy inference system","score":0.35768210887908936},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34514063596725464},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3301897644996643},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.25261661410331726}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6843266487121582},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6823238730430603},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6798341274261475},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6546021699905396},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6079484820365906},{"id":"https://openalex.org/C46743427","wikidata":"https://www.wikidata.org/wiki/Q1341685","display_name":"Inference engine","level":3,"score":0.6053696870803833},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.577705442905426},{"id":"https://openalex.org/C2987376176","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy inference system","level":5,"score":0.5480287075042725},{"id":"https://openalex.org/C58328972","wikidata":"https://www.wikidata.org/wiki/Q184609","display_name":"Expert system","level":2,"score":0.5184628367424011},{"id":"https://openalex.org/C102805184","wikidata":"https://www.wikidata.org/wiki/Q5511117","display_name":"Fuzzy electronics","level":5,"score":0.4607257843017578},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.4553346037864685},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.44962507486343384},{"id":"https://openalex.org/C186108316","wikidata":"https://www.wikidata.org/wiki/Q352530","display_name":"Adaptive neuro fuzzy inference system","level":4,"score":0.35768210887908936},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34514063596725464},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3301897644996643},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.25261661410331726}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fuzzy.2005.1452414","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzzy.2005.1452414","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W7475517","https://openalex.org/W20722260","https://openalex.org/W26711432","https://openalex.org/W58080530","https://openalex.org/W189008923","https://openalex.org/W1484413656","https://openalex.org/W1542522493","https://openalex.org/W1546235996","https://openalex.org/W1687244664","https://openalex.org/W1887038067","https://openalex.org/W2000473687","https://openalex.org/W2036959577","https://openalex.org/W2040470184","https://openalex.org/W2041280856","https://openalex.org/W2045981671","https://openalex.org/W2066298612","https://openalex.org/W2094138658","https://openalex.org/W2136512370","https://openalex.org/W2157041604","https://openalex.org/W2912565176","https://openalex.org/W2997167919","https://openalex.org/W4211007335","https://openalex.org/W4230846333","https://openalex.org/W4234129529","https://openalex.org/W4245152641","https://openalex.org/W6600285267","https://openalex.org/W6600858539","https://openalex.org/W6601051852","https://openalex.org/W6602383291","https://openalex.org/W6607714477","https://openalex.org/W6628750762","https://openalex.org/W6632972538","https://openalex.org/W6639415379","https://openalex.org/W6650563137"],"related_works":["https://openalex.org/W2576952456","https://openalex.org/W2617115970","https://openalex.org/W2030629278","https://openalex.org/W2079976467","https://openalex.org/W2395092600","https://openalex.org/W2018344106","https://openalex.org/W4243396974","https://openalex.org/W2230180865","https://openalex.org/W2181415496","https://openalex.org/W2898887610"],"abstract_inverted_index":{"This":[0],"paper":[1],"describes":[2],"a":[3,59],"framework":[4],"for":[5,23,58],"implementing":[6],"intrusion":[7],"detection":[8],"systems":[9],"using":[10,32,63,70],"fuzzy":[11,14,21,66],"logic.":[12],"A":[13],"data-mining":[15],"algorithm":[16],"is":[17,30],"used":[18],"to":[19],"extract":[20],"rules":[22],"the":[24,33,40,49],"inference":[25],"engine.":[26],"The":[27],"modular":[28],"architecture":[29],"implemented":[31],"Java":[34],"expert":[35],"system":[36,62],"shell":[37],"(Jess)":[38],"and":[39,48,65],"FuzzyJess":[41],"toolkit":[42],"developed":[43],"by":[44],"Sandia":[45],"National":[46,50],"Laboratories":[47],"Research":[51],"Council":[52],"of":[53],"Canada":[54],"respectively.":[55],"Experimental":[56],"results":[57],"hybrid":[60],"prototype":[61],"anomaly-based":[64],"signatures":[67],"are":[68],"provided":[69],"data":[71],"sets":[72],"from":[73],"MIT":[74],"Lincoln":[75],"Laboratory":[76]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
