{"id":"https://openalex.org/W2036836321","doi":"https://doi.org/10.1145/1316874.1316881","title":"Hierarchical two-tier ensemble learning","display_name":"Hierarchical two-tier ensemble learning","publication_year":2007,"publication_date":"2007-11-09","ids":{"openalex":"https://openalex.org/W2036836321","doi":"https://doi.org/10.1145/1316874.1316881","mag":"2036836321"},"language":"en","primary_location":{"id":"doi:10.1145/1316874.1316881","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1316874.1316881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM first Ph.D. workshop in CIKM","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039172016","display_name":"Morteza Analoui","orcid":"https://orcid.org/0000-0001-6792-760X"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Morteza Analoui","raw_affiliation_strings":["Iran University of Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057087345","display_name":"Behrouz Minaei\u2010Bidgoli","orcid":"https://orcid.org/0000-0002-9327-7345"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Behrouz Minaei Bidgoli","raw_affiliation_strings":["Iran University of Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010276918","display_name":"Mohammad Hossein Rezvani","orcid":"https://orcid.org/0000-0002-0292-7008"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Hossein Rezvani","raw_affiliation_strings":["Iran University of Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039172016"],"corresponding_institution_ids":["https://openalex.org/I67009956"],"apc_list":null,"apc_paid":null,"fwci":0.3209,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63895839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8155338764190674},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7351095676422119},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6762224435806274},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6410902142524719},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6138074994087219},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.5883353352546692},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.5771933197975159},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5764825940132141},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4820914566516876},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.476669579744339},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.46965256333351135},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4308548867702484},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.42137837409973145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07785439491271973}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8155338764190674},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7351095676422119},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6762224435806274},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6410902142524719},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6138074994087219},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.5883353352546692},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.5771933197975159},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5764825940132141},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4820914566516876},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.476669579744339},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.46965256333351135},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4308548867702484},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.42137837409973145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07785439491271973},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1316874.1316881","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1316874.1316881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM first Ph.D. workshop in CIKM","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W127551141","https://openalex.org/W169997353","https://openalex.org/W1545764953","https://openalex.org/W1999589609","https://openalex.org/W2048288497","https://openalex.org/W2085305295","https://openalex.org/W2095539364","https://openalex.org/W2130802299","https://openalex.org/W2158275940","https://openalex.org/W2164568552","https://openalex.org/W2487087946","https://openalex.org/W2789305555","https://openalex.org/W3100344990","https://openalex.org/W4290890850"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2388326001","https://openalex.org/W1983393909","https://openalex.org/W2040150569","https://openalex.org/W2468095590","https://openalex.org/W2132174924","https://openalex.org/W1911540634","https://openalex.org/W2013909972"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,17],"is":[2,89],"a":[3,21,36,85],"mechanism":[4],"of":[5,13,46,67],"providing":[6],"security":[7],"to":[8,24,91],"computer":[9],"networks.":[10],"Almost":[11],"all":[12],"traditional":[14],"intelligent":[15],"intrusion":[16],"systems":[18,34],"(IDSs)":[19],"use":[20],"single":[22,80],"approach":[23],"distinguish":[25],"normal":[26],"behavior":[27],"patterns":[28],"from":[29],"attack":[30],"signatures.":[31],"Moreover":[32],"these":[33],"have":[35],"high":[37,42],"false":[38,52],"alarm":[39,53],"rate":[40,57],"and":[41,54,98],"cost.":[43],"The":[44,102],"combination":[45,66],"multiple":[47,96],"classifiers":[48,68,127],"usually":[49],"exhibits":[50],"lower":[51],"overall":[55],"error":[56],"than":[58,78],"individual":[59],"decisions.":[60],"On":[61],"the":[62,65,106,112,117,123,126,129],"other":[63],"hand,":[64],"trained":[69],"on":[70],"different":[71,107],"feature":[72,114],"sets":[73],"could":[74],"provide":[75],"better":[76],"performances":[77],"each":[79],"classifier.":[81],"In":[82],"this":[83],"paper,":[84],"hierarchical":[86],"two-level":[87],"combiner":[88,104],"proposed":[90,103],"detect":[92],"network":[93],"intrusions":[94],"using":[95],"well-known":[97],"efficient":[99],"base":[100],"classifiers.":[101],"exploits":[105],"recognition":[108],"capabilities":[109],"provided":[110],"by":[111],"independent":[113],"representations":[115],"in":[116,128],"first":[118],"level":[119],"as":[120,122],"well":[121],"agreement":[124],"among":[125],"second":[130],"level.":[131]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
