{"id":"https://openalex.org/W4386896616","doi":"https://doi.org/10.1142/s0218843023500168","title":"Deep Belief Network-Based User and Entity Behavior Analytics (UEBA) for Web Applications","display_name":"Deep Belief Network-Based User and Entity Behavior Analytics (UEBA) for Web Applications","publication_year":2023,"publication_date":"2023-09-20","ids":{"openalex":"https://openalex.org/W4386896616","doi":"https://doi.org/10.1142/s0218843023500168"},"language":"en","primary_location":{"id":"doi:10.1142/s0218843023500168","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218843023500168","pdf_url":null,"source":{"id":"https://openalex.org/S17147961","display_name":"International Journal of Cooperative Information Systems","issn_l":"0218-8430","issn":["0218-8430","1793-6365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cooperative Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"S. Deepa","orcid":"https://orcid.org/0000-0003-0207-6802"},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Deepa","raw_affiliation_strings":["Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu, India"],"raw_orcid":"https://orcid.org/0000-0003-0207-6802","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu, India","institution_ids":["https://openalex.org/I145286018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008933982","display_name":"A. Umamageswari","orcid":null},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"A. Umamageswari","raw_affiliation_strings":["Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu, India","institution_ids":["https://openalex.org/I145286018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033711346","display_name":"S. Neelakandan","orcid":"https://orcid.org/0000-0001-8583-0019"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Neelakandan","raw_affiliation_strings":["Department of Computer Science and Engineering, R.M.K Engineering College, Kavaraipettai, Chennai, Tamil Nadu, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, R.M.K Engineering College, Kavaraipettai, Chennai, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010727010","display_name":"Hanumanthu Bhukya","orcid":"https://orcid.org/0000-0001-7132-3024"},"institutions":[{"id":"https://openalex.org/I28210344","display_name":"Kakatiya University","ror":"https://ror.org/012zpbg81","country_code":"IN","type":"education","lineage":["https://openalex.org/I28210344"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hanumanthu Bhukya","raw_affiliation_strings":["Department of Computer Science and Engineering (Networks), Kakatiya Institute of Technology and Science, Warangal Telangana, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering (Networks), Kakatiya Institute of Technology and Science, Warangal Telangana, India","institution_ids":["https://openalex.org/I28210344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081261800","display_name":"I. V. Sai Lakshmi Haritha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"I. V. Sai Lakshmi Haritha","raw_affiliation_strings":["Department of Information Technology, MLR Institute of Technology, Hyderabad, Telangana, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, MLR Institute of Technology, Hyderabad, Telangana, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026077901","display_name":"Manjula Shanbhog","orcid":null},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manjula Shanbhog","raw_affiliation_strings":["Department of Sciences, CHRIST (Deemed to be University), Delhi NCR, Ghaziabad, Uttar Pradesh 201003, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Sciences, CHRIST (Deemed to be University), Delhi NCR, Ghaziabad, Uttar Pradesh 201003, India","institution_ids":["https://openalex.org/I48018076"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I145286018"],"apc_list":null,"apc_paid":null,"fwci":0.9604,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77052362,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"33","issue":"02","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8383769989013672},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7457956075668335},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.6661494374275208},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6364691853523254},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5522881150245667},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5269433259963989},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5106707215309143},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.508775532245636},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.47393661737442017},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4601391851902008},{"id":"https://openalex.org/keywords/deep-belief-network","display_name":"Deep belief network","score":0.4558176100254059},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.4498629868030548},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4172684848308563},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3511902689933777},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32710951566696167},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.31079649925231934},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30813637375831604},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1513475775718689}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8383769989013672},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7457956075668335},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.6661494374275208},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6364691853523254},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5522881150245667},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5269433259963989},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5106707215309143},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.508775532245636},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.47393661737442017},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4601391851902008},{"id":"https://openalex.org/C97385483","wikidata":"https://www.wikidata.org/wiki/Q16954980","display_name":"Deep belief network","level":3,"score":0.4558176100254059},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.4498629868030548},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4172684848308563},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3511902689933777},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32710951566696167},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.31079649925231934},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30813637375831604},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1513475775718689},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218843023500168","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218843023500168","pdf_url":null,"source":{"id":"https://openalex.org/S17147961","display_name":"International Journal of Cooperative Information Systems","issn_l":"0218-8430","issn":["0218-8430","1793-6365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cooperative Information Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2783543293","https://openalex.org/W2909814166","https://openalex.org/W2987177413","https://openalex.org/W3011458709","https://openalex.org/W3015471529","https://openalex.org/W3033639178","https://openalex.org/W3036842656","https://openalex.org/W3045880080","https://openalex.org/W3087325199","https://openalex.org/W3089087381","https://openalex.org/W3102266658","https://openalex.org/W3161550624","https://openalex.org/W3172645453","https://openalex.org/W3173612861","https://openalex.org/W3192230747","https://openalex.org/W4200181556","https://openalex.org/W4213436350","https://openalex.org/W4297983321"],"related_works":["https://openalex.org/W2338899373","https://openalex.org/W199254545","https://openalex.org/W2997836625","https://openalex.org/W4252285266","https://openalex.org/W4244102749","https://openalex.org/W2476504758","https://openalex.org/W111175386","https://openalex.org/W4248464163","https://openalex.org/W1937580673","https://openalex.org/W4361023959"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"(ML)":[2],"is":[3,34,76,88,125],"currently":[4],"a":[5,105,126,177],"crucial":[6],"tool":[7],"in":[8,23,45,97,183,202],"the":[9,15,19,27,59,190],"field":[10,96],"of":[11,17,21,29,108],"cyber":[12,38],"security.":[13],"Through":[14],"identification":[16],"patterns,":[18],"mapping":[20],"cybercrime":[22],"real":[24],"time,":[25],"and":[26,40,51,55,67,91,103,136,149],"execution":[28],"in-depth":[30],"penetration":[31],"tests,":[32],"ML":[33,87],"able":[35],"to":[36,58,80,99,119,180],"counter":[37],"threats":[39],"strengthen":[41],"security":[42,65,102],"infrastructure.":[43],"Security":[44],"any":[46,71],"organization":[47],"depends":[48],"on":[49],"monitoring":[50],"analyzing":[52],"user":[53,101,197],"actions":[54],"behaviors.":[56],"Due":[57],"fact":[60],"that":[61,189,199],"it":[62,75],"frequently":[63],"avoids":[64],"precautions":[66],"does":[68],"not":[69],"trigger":[70],"alerts":[72],"or":[73],"flags,":[74],"much":[77],"more":[78],"challenging":[79],"detect":[81,120,195],"than":[82],"traditional":[83],"malicious":[84],"network":[85,124,160],"activity.":[86],"an":[89],"important":[90],"rapidly":[92],"developing":[93],"anomaly":[94,181,203],"detection":[95,182,204],"order":[98],"protect":[100],"privacy,":[104],"wide":[106],"range":[107],"applications,":[109],"including":[110],"various":[111,129],"social":[112,123,130,159],"media":[113],"platforms,":[114],"have":[115],"incorporated":[116],"cutting-edge":[117],"techniques":[118],"anomalies.":[121],"A":[122],"platform":[127],"where":[128],"groups":[131],"can":[132,193],"interact,":[133],"express":[134],"themselves,":[135],"share":[137],"pertinent":[138],"content.":[139],"By":[140],"spreading":[141],"propaganda,":[142],"unwelcome":[143],"messages,":[144],"false":[145],"information,":[146],"fake":[147],"news,":[148],"rumours,":[150],"as":[151,153],"well":[152],"by":[154],"posting":[155],"harmful":[156],"links,":[157],"this":[158,166],"also":[161],"encourages":[162],"deviant":[163],"behavior.":[164],"In":[165],"research,":[167],"we":[168],"introduce":[169],"Deep":[170],"Belief":[171],"Network":[172],"(DBN)":[173],"with":[174],"Triple":[175],"DES,":[176],"hybrid":[178],"approach":[179],"unbalanced":[184],"classification.":[185],"The":[186],"results":[187],"show":[188],"DBN-TDES":[191],"model":[192],"typically":[194],"anomalous":[196],"behaviors":[198],"other":[200],"models":[201],"cannot.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
