{"id":"https://openalex.org/W4407248100","doi":"https://doi.org/10.1109/wpmc63271.2024.10863195","title":"Mitigating Advanced Persistent Threats using a Combinational Algorithm of Semi-Supervised Support Vector Machines and Graph Convolutional Networks","display_name":"Mitigating Advanced Persistent Threats using a Combinational Algorithm of Semi-Supervised Support Vector Machines and Graph Convolutional Networks","publication_year":2024,"publication_date":"2024-11-17","ids":{"openalex":"https://openalex.org/W4407248100","doi":"https://doi.org/10.1109/wpmc63271.2024.10863195"},"language":"en","primary_location":{"id":"doi:10.1109/wpmc63271.2024.10863195","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc63271.2024.10863195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Anita Priyadarshini Durai Pandian","orcid":null},"institutions":[{"id":"https://openalex.org/I4210123630","display_name":"Regionshospitalet Herning","ror":"https://ror.org/02ckh3s34","country_code":"DK","type":"healthcare","lineage":["https://openalex.org/I4210123630","https://openalex.org/I4210150083"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Anita Priyadarshini Durai Pandian","raw_affiliation_strings":["Birk Centerpark,Herning,Denmark"],"affiliations":[{"raw_affiliation_string":"Birk Centerpark,Herning,Denmark","institution_ids":["https://openalex.org/I4210123630"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210123630"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30930594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7067837119102478},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6767473816871643},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5355007648468018},{"id":"https://openalex.org/keywords/combinational-logic","display_name":"Combinational logic","score":0.49440598487854004},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.45706242322921753},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34623685479164124},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3460741341114044},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.2005445659160614}],"concepts":[{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7067837119102478},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6767473816871643},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5355007648468018},{"id":"https://openalex.org/C81409106","wikidata":"https://www.wikidata.org/wiki/Q76505","display_name":"Combinational logic","level":3,"score":0.49440598487854004},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.45706242322921753},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34623685479164124},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3460741341114044},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.2005445659160614}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wpmc63271.2024.10863195","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc63271.2024.10863195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2105734873","https://openalex.org/W2964051675","https://openalex.org/W3015246755","https://openalex.org/W3015471529","https://openalex.org/W3035366542","https://openalex.org/W3161594686","https://openalex.org/W4220685868","https://openalex.org/W4244721330","https://openalex.org/W4309673367","https://openalex.org/W4384834994","https://openalex.org/W4395467152","https://openalex.org/W4396675456","https://openalex.org/W6748141922","https://openalex.org/W6755175852"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2090763504","https://openalex.org/W3167886223","https://openalex.org/W2098694303","https://openalex.org/W148178222","https://openalex.org/W2104657898","https://openalex.org/W1948992892","https://openalex.org/W1886884218","https://openalex.org/W1910826599"],"abstract_inverted_index":{"The":[0,42,117],"S3VM-GCN":[1],"model":[2,219],"is":[3,56,81,157,204],"crucial":[4],"for":[5,85,104,146,198,250],"6G":[6,24,67,75,101],"networks":[7,25,140],"due":[8],"to":[9,12,39,114,137,206,227],"its":[10],"ability":[11],"efficiently":[13],"detect":[14],"and":[15,33,52,111,123,141,151,179,195,225,234,252],"mitigate":[16],"security":[17,125,244],"threats":[18],"in":[19,65,74,100,148,159,230],"highly":[20],"complex,":[21],"dynamic":[22],"environments.":[23],"will":[26],"rely":[27],"heavily":[28],"on":[29,128],"vast":[30],"IoT":[31,78,86,156,168,243],"ecosystems":[32],"edge":[34],"computing,":[35],"making":[36],"them":[37],"vulnerable":[38],"coordinated":[40,164],"attacks.":[41,255],"semi-supervised":[43,142],"S3VM":[44,203],"component":[45,92],"enhances":[46],"detection":[47,107,150],"by":[48,245],"leveraging":[49],"both":[50],"labeled":[51,62],"un-labeled":[53],"data,":[54,187,209],"which":[55],"essential":[57],"given":[58],"the":[59,71,90,95,129,149,186,193,214,217],"scarcity":[60],"of":[61,108,132,153,192],"attack":[63,165],"data":[64,178],"real-world":[66,176],"scenarios.":[68],"To":[69],"identify":[70],"malicious":[72],"nodes":[73,110],"network":[76,87,172,180,235],"TON":[77],"standard":[79,223],"database":[80],"used":[82],"as":[83],"reference":[84],"intrusions.":[88],"Meanwhile,":[89],"GCN":[91,197],"effectively":[93],"models":[94],"intricate":[96],"relationships":[97],"between":[98],"devices":[99,169],"networks,":[102],"allowing":[103],"more":[105],"accurate":[106],"compromised":[109,231],"real-time":[112],"adaptation":[113],"evolving":[115],"threats.":[116],"combination":[118],"can":[119],"provide":[120],"a":[121,171,189,247],"powerful":[122],"scalable":[124],"solution":[126],"based":[127],"demanding":[130],"needs":[131],"6G.":[133],"An":[134],"integrated":[135],"approach":[136,183],"graph":[138,173],"convolutional":[139],"support":[143],"vector":[144],"machines":[145],"enhancement":[147],"analysis":[152],"attacks":[154],"against":[155,167,222],"proposed":[158,218],"this":[160],"paper.":[161],"Simulating":[162],"different":[163],"scenarios":[166],"through":[170],"built":[174],"from":[175],"telemetry":[177],"traffic.":[181],"This":[182,238],"involves":[184],"preprocessing":[185],"building":[188],"graph-based":[190],"representation":[191],"network,":[194],"using":[196],"deep":[199],"learning-based":[200],"classification.":[201],"Simultaneously,":[202],"employed":[205],"leverage":[207],"unlabeled":[208],"improving":[210],"classification":[211],"accuracy.":[212],"In":[213],"testing":[215],"process,":[216],"was":[220],"run":[221],"metrics":[224],"proved":[226],"be":[228],"effective":[229],"node":[232],"identification":[233],"vulnerability":[236],"visualization.":[237],"work":[239],"thus":[240],"contributes":[241],"toward":[242],"providing":[246],"robust":[248],"method":[249],"detecting":[251],"mitigating":[253],"network-based":[254]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
