{"id":"https://openalex.org/W4211115007","doi":"https://doi.org/10.1142/s0219265921410371","title":"Anomaly Detection Using Hybrid Neuro Genetic Model","display_name":"Anomaly Detection Using Hybrid Neuro Genetic Model","publication_year":2022,"publication_date":"2022-02-10","ids":{"openalex":"https://openalex.org/W4211115007","doi":"https://doi.org/10.1142/s0219265921410371"},"language":"en","primary_location":{"id":"doi:10.1142/s0219265921410371","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921410371","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001026192","display_name":"Srinivasa Rao Pokuri","orcid":null},"institutions":[{"id":"https://openalex.org/I177001074","display_name":"Acharya Nagarjuna University","ror":"https://ror.org/02mfapa96","country_code":"IN","type":"education","lineage":["https://openalex.org/I177001074"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Srinivasa Rao Pokuri","raw_affiliation_strings":["Department of CSE, Acharya Nagarjuna University, Nagarjuna Nagar, AP, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Acharya Nagarjuna University, Nagarjuna Nagar, AP, India","institution_ids":["https://openalex.org/I177001074"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012130214","display_name":"Nagaraju Devarakonda","orcid":"https://orcid.org/0000-0003-4864-8482"},"institutions":[{"id":"https://openalex.org/I4401726783","display_name":"VIT-AP University","ror":"https://ror.org/007v4hf75","country_code":null,"type":"education","lineage":["https://openalex.org/I4401726783"]},{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nagaraju Devarakonda","raw_affiliation_strings":["School of Computer Science and Engineering, VIT-AP University, Amaravati, AP, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, VIT-AP University, Amaravati, AP, India","institution_ids":["https://openalex.org/I4210131147","https://openalex.org/I4401726783"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001026192"],"corresponding_institution_ids":["https://openalex.org/I177001074"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6016097,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"22","issue":"Supp01","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7680877447128296},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6159838438034058},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.5932535529136658},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5720677971839905},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5661391615867615},{"id":"https://openalex.org/keywords/phase","display_name":"Phase (matter)","score":0.5480679273605347},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5199338793754578},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4815857410430908},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4702908992767334},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.46972525119781494},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4115801155567169},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4007076919078827},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3140649199485779}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7680877447128296},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6159838438034058},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.5932535529136658},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5720677971839905},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5661391615867615},{"id":"https://openalex.org/C44280652","wikidata":"https://www.wikidata.org/wiki/Q104837","display_name":"Phase (matter)","level":2,"score":0.5480679273605347},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5199338793754578},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4815857410430908},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4702908992767334},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.46972525119781494},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4115801155567169},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4007076919078827},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3140649199485779},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219265921410371","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921410371","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1977165632","https://openalex.org/W2006508099","https://openalex.org/W2050672458","https://openalex.org/W2097205582","https://openalex.org/W2099722721","https://openalex.org/W2120617515","https://openalex.org/W2145722235","https://openalex.org/W2150094583","https://openalex.org/W3040176058","https://openalex.org/W3134836065","https://openalex.org/W3145013517","https://openalex.org/W4213378403","https://openalex.org/W4231598119"],"related_works":["https://openalex.org/W2363105058","https://openalex.org/W1516902003","https://openalex.org/W2383127772","https://openalex.org/W2110365568","https://openalex.org/W2392397575","https://openalex.org/W1521770704","https://openalex.org/W2373484613","https://openalex.org/W2363068348","https://openalex.org/W2377356555","https://openalex.org/W2127961541"],"abstract_inverted_index":{"With":[0],"a":[1,10,43,70],"steady":[2],"increase":[3],"in":[4,28,91,96,147],"the":[5,18,36,61,106,114,138,148,174],"population":[6],"of":[7,12,24,38,46,63,66,129,142],"Internet":[8],"users,":[9],"plethora":[11],"network":[13,29,49,77,92,143],"services":[14,30,93],"have":[15],"emerged":[16],"on":[17,35,48,113],"global":[19],"level.":[20],"As":[21],"an":[22],"offshoot":[23],"this":[25,97],"phenomenal":[26],"rise":[27],"and":[31,56,81,102,119,131,157,165],"their":[32],"capabilities":[33],"riding":[34],"wave":[37],"internet,":[39],"we":[40],"are":[41,54],"witnessing":[42],"massive":[44,64],"risk":[45],"attacks":[47],"security.":[50],"Many":[51],"security":[52],"vulnerabilities":[53],"exposed":[55],"exploited":[57],"by":[58],"attackers,":[59],"endangering":[60],"safety":[62],"amounts":[65],"data.":[67],"To":[68],"improve":[69],"network\u2019s":[71],"effectiveness,":[72],"it\u2019s":[73],"critical":[74],"to":[75],"detect":[76],"traffic":[78],"anomalies":[79,90],"accurately":[80],"quickly.":[82],"A":[83],"new":[84],"hybrid":[85],"model":[86],"that":[87,173],"effectively":[88],"detects":[89],"is":[94,152],"proposed":[95],"work.":[98],"The":[99,121,134,170],"genetic":[100,122],"phase":[101,104,123,136],"NN":[103,135,156],"represent":[105],"2-phased":[107],"approach":[108,176],"making":[109],"each":[110],"one":[111],"dependent":[112],"other":[115,179],"for":[116,127,168],"weight":[117],"assignment":[118],"prediction.":[120],"generates":[124],"optimal":[125],"weights":[126],"classification":[128],"normal":[130,164],"anomaly":[132],"patterns.":[133],"learns":[137],"input":[139],"output":[140],"relationship":[141],"patterns":[144],"employing":[145],"GA":[146],"training":[149],"phase.":[150],"Detection":[151],"accomplished":[153],"using":[154],"trained":[155],"it":[158],"utilizes":[159],"pre-processed":[160],"KDD":[161],"dataset":[162],"containing":[163],"abnormal":[166],"samples":[167],"training.":[169],"outcomes":[171],"demonstrated":[172],"suggested":[175],"outperforms":[177],"all":[178],"algorithms.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
