{"id":"https://openalex.org/W3013380446","doi":"https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00143","title":"Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction","display_name":"Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3013380446","doi":"https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00143","mag":"3013380446"},"language":"en","primary_location":{"id":"doi:10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Intl Conf on Parallel &amp; Distributed Processing with Applications, Big Data &amp; Cloud Computing, Sustainable Computing &amp; Communications, Social Computing &amp; Networking (ISPA/BDCloud/SocialCom/SustainCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044896484","display_name":"Yacine Djemaiel","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Yacine Djemaiel","raw_affiliation_strings":["Communications Networks and Security Research Lab (CN&S), University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communications Networks and Security Research Lab (CN&S), University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040464000","display_name":"Boutheina A. Fessi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Boutheina A. Fessi","raw_affiliation_strings":["Faculty of Economic Sciences and Management, Nabeul"],"affiliations":[{"raw_affiliation_string":"Faculty of Economic Sciences and Management, Nabeul","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113487171","display_name":"Noureddine Boudriga","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Noureddine Boudriga","raw_affiliation_strings":["Sup\u2018COM, University of Carthage, Tunisia","Sup'COM, University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Sup\u2018COM, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Sup'COM, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044896484"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.1775,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57954326,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":null,"first_page":"991","last_page":"998"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7502821683883667},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6565019488334656},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4616265594959259},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44945305585861206},{"id":"https://openalex.org/keywords/temporal-database","display_name":"Temporal database","score":0.4378197491168976},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.42479270696640015},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.39891377091407776},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39068150520324707},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.0887441635131836}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7502821683883667},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6565019488334656},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4616265594959259},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44945305585861206},{"id":"https://openalex.org/C77277458","wikidata":"https://www.wikidata.org/wiki/Q1969246","display_name":"Temporal database","level":2,"score":0.4378197491168976},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.42479270696640015},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.39891377091407776},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39068150520324707},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0887441635131836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Intl Conf on Parallel &amp; Distributed Processing with Applications, Big Data &amp; Cloud Computing, Sustainable Computing &amp; Communications, Social Computing &amp; Networking (ISPA/BDCloud/SocialCom/SustainCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","score":0.75,"id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W197478222","https://openalex.org/W846300948","https://openalex.org/W2551683225","https://openalex.org/W2806057024","https://openalex.org/W2900839594","https://openalex.org/W2962874122","https://openalex.org/W2963556271","https://openalex.org/W2979539300","https://openalex.org/W6729507676","https://openalex.org/W6751629095","https://openalex.org/W6768699259"],"related_works":["https://openalex.org/W2547829566","https://openalex.org/W2050347474","https://openalex.org/W2541259009","https://openalex.org/W638142098","https://openalex.org/W1975124777","https://openalex.org/W2019425806","https://openalex.org/W2991945580","https://openalex.org/W2039116363","https://openalex.org/W146849528","https://openalex.org/W2770969759"],"abstract_inverted_index":{"The":[0,126,176],"emergence":[1,31],"of":[2,14,17,32,35,88,96,121,128,152,172,178,198],"novel":[3],"technologies":[4],"and":[5,23,46,67,110,160],"high":[6],"speed":[7],"networks":[8,159],"has":[9,182],"enabled":[10],"a":[11,41,73,101,137,192,196],"continually":[12],"generation":[13],"huge":[15,94],"volumes":[16],"data":[18,27,109],"that":[19,84,146],"should":[20],"be":[21],"stored":[22],"processed.":[24],"These":[25],"big":[26,42,108],"have":[28],"allowed":[29],"the":[30,86,107,111,118,122,129,148,153,161,164,170,179,186],"new":[33],"forms":[34],"complex":[36,89],"attacks":[37],"whose":[38],"resolution":[39],"represents":[40],"challenge.":[43],"Different":[44],"methods":[45],"tools":[47],"are":[48,64,201],"developed":[49,138],"to":[50,105,117,163],"deal":[51],"with":[52],"this":[53,77],"issue":[54],"but":[55],"definite":[56],"detection":[57],"is":[58,134],"still":[59],"needed":[60],"since":[61],"various":[62],"features":[63],"not":[65],"considered":[66],"tracing":[68,119],"back":[69,120],"an":[70,81,173],"attack":[71,90,124,132,155,167,188],"remains":[72],"timely":[74],"activity.":[75],"In":[76],"context,":[78],"we":[79],"propose":[80],"investigation":[82],"framework":[83,99,181],"allows":[85],"reconstruction":[87,189],"scenarios":[91,156],"based":[92,141],"on":[93,142],"volume":[95],"data.":[97],"This":[98],"used":[100],"temporal":[102],"conceptual":[103],"graph":[104],"represent":[106],"dependency":[112],"between":[113],"them":[114],"in":[115],"addition":[116],"whole":[123],"scenario.":[125],"selection":[127],"most":[130,165],"probable":[131],"scenario":[133,168],"assisted":[135],"by":[136],"decision":[139],"model":[140],"hybrid":[143],"neural":[144],"network":[145],"enables":[147],"real":[149],"time":[150],"classification":[151],"possible":[154],"using":[157],"RBF":[158],"convergence":[162],"potential":[166],"within":[169],"support":[171],"Elman":[174],"network.":[175],"efficiency":[177],"proposed":[180],"been":[183],"illustrated":[184],"for":[185],"global":[187],"process":[190],"targeting":[191],"smart":[193],"city":[194],"where":[195],"set":[197],"available":[199],"services":[200],"involved.":[202]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
