{"id":"https://openalex.org/W2087030102","doi":"https://doi.org/10.1145/1278460.1278463","title":"Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems","display_name":"Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems","publication_year":2007,"publication_date":"2007-09-01","ids":{"openalex":"https://openalex.org/W2087030102","doi":"https://doi.org/10.1145/1278460.1278463","mag":"2087030102"},"language":"en","primary_location":{"id":"doi:10.1145/1278460.1278463","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1278460.1278463","pdf_url":null,"source":{"id":"https://openalex.org/S16632050","display_name":"ACM Transactions on Autonomous and Adaptive Systems","issn_l":"1556-4665","issn":["1556-4665","1556-4703"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Autonomous and Adaptive Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036221136","display_name":"Mei\u2010Ling Shyu","orcid":"https://orcid.org/0000-0003-0902-0844"},"institutions":[{"id":"https://openalex.org/I145608581","display_name":"University of Miami","ror":"https://ror.org/02dgjyy92","country_code":"US","type":"education","lineage":["https://openalex.org/I145608581"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mei-Ling Shyu","raw_affiliation_strings":["University of Miami, Coral Gables, FL"],"affiliations":[{"raw_affiliation_string":"University of Miami, Coral Gables, FL","institution_ids":["https://openalex.org/I145608581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037159530","display_name":"Thiago Quirino","orcid":"https://orcid.org/0000-0001-8966-2542"},"institutions":[{"id":"https://openalex.org/I145608581","display_name":"University of Miami","ror":"https://ror.org/02dgjyy92","country_code":"US","type":"education","lineage":["https://openalex.org/I145608581"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thiago Quirino","raw_affiliation_strings":["University of Miami, Coral Gables, FL"],"affiliations":[{"raw_affiliation_string":"University of Miami, Coral Gables, FL","institution_ids":["https://openalex.org/I145608581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074125109","display_name":"Zongxing Xie","orcid":"https://orcid.org/0000-0002-3464-1610"},"institutions":[{"id":"https://openalex.org/I145608581","display_name":"University of Miami","ror":"https://ror.org/02dgjyy92","country_code":"US","type":"education","lineage":["https://openalex.org/I145608581"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zongxing Xie","raw_affiliation_strings":["University of Miami, Coral Gables, FL"],"affiliations":[{"raw_affiliation_string":"University of Miami, Coral Gables, FL","institution_ids":["https://openalex.org/I145608581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049219173","display_name":"Shu\u2010Ching Chen","orcid":"https://orcid.org/0000-0001-9209-390X"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shu-Ching Chen","raw_affiliation_strings":["Florida International University, Miami, FL"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111905403","display_name":"LiWu Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liwu Chang","raw_affiliation_strings":["Naval Research Laboratory, Washington, DC","[Naval Research Laboratory, Washington, DC]"],"affiliations":[{"raw_affiliation_string":"Naval Research Laboratory, Washington, DC","institution_ids":["https://openalex.org/I1288214837"]},{"raw_affiliation_string":"[Naval Research Laboratory, Washington, DC]","institution_ids":["https://openalex.org/I1288214837"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036221136"],"corresponding_institution_ids":["https://openalex.org/I145608581"],"apc_list":null,"apc_paid":null,"fwci":3.5297,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.93111338,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2","issue":"3","first_page":"9","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8763977289199829},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6992928981781006},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6965474486351013},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6371297836303711},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5819264054298401},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5006158351898193},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4627494812011719},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.41335874795913696},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4022352695465088},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37492769956588745},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3408729135990143},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2885657548904419}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8763977289199829},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6992928981781006},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6965474486351013},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6371297836303711},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5819264054298401},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5006158351898193},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4627494812011719},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.41335874795913696},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4022352695465088},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37492769956588745},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3408729135990143},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2885657548904419},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1278460.1278463","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1278460.1278463","pdf_url":null,"source":{"id":"https://openalex.org/S16632050","display_name":"ACM Transactions on Autonomous and Adaptive Systems","issn_l":"1556-4665","issn":["1556-4665","1556-4703"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Autonomous and Adaptive Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W34688585","https://openalex.org/W42722137","https://openalex.org/W56921715","https://openalex.org/W71531219","https://openalex.org/W1124708747","https://openalex.org/W1511785468","https://openalex.org/W1541939527","https://openalex.org/W1563061804","https://openalex.org/W1597626025","https://openalex.org/W1605985922","https://openalex.org/W1623080549","https://openalex.org/W1975600918","https://openalex.org/W1977838479","https://openalex.org/W1989344766","https://openalex.org/W2002286749","https://openalex.org/W2003882201","https://openalex.org/W2011283335","https://openalex.org/W2012701999","https://openalex.org/W2039521146","https://openalex.org/W2052696562","https://openalex.org/W2065001763","https://openalex.org/W2085305295","https://openalex.org/W2093973064","https://openalex.org/W2098947662","https://openalex.org/W2106339443","https://openalex.org/W2124365372","https://openalex.org/W2124904909","https://openalex.org/W2125055259","https://openalex.org/W2144182447","https://openalex.org/W2155170312","https://openalex.org/W2168371457","https://openalex.org/W2319576313","https://openalex.org/W2501948295","https://openalex.org/W2504658994","https://openalex.org/W4254182148","https://openalex.org/W6666859543"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Recently,":[0],"network":[1,23,55,104,132,230,282],"security":[2,133],"has":[3],"become":[4],"an":[5,49],"extremely":[6],"vital":[7],"issue":[8],"that":[9,99,165],"beckons":[10],"the":[11,26,63,76,92,112,124,137,147,150,169,184,209,215,221,248,252,259,262],"development":[12],"of":[13,19,65,78,90,149,251,261,274],"accurate":[14,50],"and":[15,25,51,75,82,110,130,157,171,178,188,204,228,239,267,278],"efficient":[16],"solutions":[17],"capable":[18],"effectively":[20],"defending":[21],"our":[22],"systems":[24],"valuable":[27],"information":[28,135],"journeying":[29],"through":[30,146,258],"them.":[31],"In":[32],"this":[33],"article,":[34],"a":[35,66,218,243],"distributed":[36,67,128],"multiagent":[37,68],"intrusion":[38,56,141],"detection":[39,57,102,122,142,159,176,186,211],"system":[40,73,275],"(IDS)":[41],"architecture":[42,88,255],"is":[43,144,256],"proposed,":[44],"which":[45],"attempts":[46],"to":[47,54,106,119,136,236],"provide":[48],"lightweight":[52,96,151],"solution":[53],"by":[58],"tackling":[59],"issues":[60],"associated":[61],"with":[62,95,174],"design":[64],"system,":[69],"such":[70,195],"as":[71,196],"poor":[72],"scalability":[74,249],"requirements":[77],"excessive":[79],"processing":[80],"power":[81],"memory":[83],"storage.":[84],"The":[85,140],"proposed":[86,253,263],"IDS":[87,254],"consists":[89],"(i)":[91],"Host":[93],"layer":[94,114],"host":[97,125],"agents":[98],"perform":[100,120],"anomaly":[101,156,185],"in":[103,183,208,217,242],"connections":[105],"their":[107],"respective":[108],"hosts,":[109],"(ii)":[111],"Classification":[113],"whose":[115],"main":[116],"functions":[117],"are":[118,234,285],"misuse":[121,158,210],"for":[123,271],"agents,":[126],"detect":[127],"attacks,":[129],"disseminate":[131],"status":[134],"whole":[138],"network.":[139],"task":[143],"achieved":[145],"employment":[148],"Adaptive":[152],"Sub-Eigenspace":[153],"Modeling":[154],"(ASEM)-based":[155],"schemes.":[160],"Promising":[161],"experimental":[162],"results":[163],"indicate":[164],"ASEM-based":[166],"schemes":[167],"outperform":[168,189],"KNN":[170],"LOF":[172],"algorithms,":[173],"high":[175],"rates":[177,182],"low":[179],"false":[180],"alarm":[181],"task,":[187],"several":[190],"well-known":[191],"supervised":[192],"classification":[193],"methods":[194],"C4.5":[197],"Decision":[198,205],"Tree,":[199],"SVM,":[200],"NN,":[201],"KNN,":[202],"Logistic,":[203],"Table":[206],"(DT)":[207],"task.":[212],"To":[213],"assess":[214],"performance":[216,250],"real-world":[219],"scenario,":[220],"Relative":[222],"Assumption":[223],"Model,":[224],"feature":[225],"extraction":[226],"techniques,":[227],"common":[229],"attack":[231],"generation":[232],"tools":[233],"employed":[235],"generate":[237],"normal":[238],"anomalous":[240],"traffic":[241,283],"private":[244],"LAN":[245],"testbed.":[246],"Furthermore,":[247],"investigated":[257],"simulation":[260],"agent":[264,279],"communication":[265,280],"scheme,":[266],"satisfactory":[268],"linear":[269],"relationships":[270],"both":[272],"degradation":[273],"response":[276],"time":[277],"generated":[281],"overhead":[284],"achieved.":[286]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
