{"id":"https://openalex.org/W2064934805","doi":"https://doi.org/10.1145/1456223.1456238","title":"Improving performance of intrusion detection system by applying a new machine learning strategy","display_name":"Improving performance of intrusion detection system by applying a new machine learning strategy","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2064934805","doi":"https://doi.org/10.1145/1456223.1456238","mag":"2064934805"},"language":"en","primary_location":{"id":"doi:10.1145/1456223.1456238","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1456223.1456238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017841792","display_name":"Tao Zou","orcid":"https://orcid.org/0000-0001-7328-5703"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tao Zou","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060859575","display_name":"Yimin Cui","orcid":"https://orcid.org/0000-0003-1100-531X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yimin Cui","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017433539","display_name":"Minhuan Huang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minhuan Huang","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100606176","display_name":"Cui Zhang","orcid":"https://orcid.org/0000-0002-6432-1984"},"institutions":[{"id":"https://openalex.org/I4210100575","display_name":"Beijing Graphene Institute","ror":"https://ror.org/013bkjj52","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210100575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cui Zhang","raw_affiliation_strings":["Beijing Graphics Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Graphics Institute, Beijing, China","institution_ids":["https://openalex.org/I4210100575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017841792"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.11555257,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"51"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.828755795955658},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7576141953468323},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6738908290863037},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6008888483047485},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5902428030967712},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.5438480973243713},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5041724443435669},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3643094301223755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.828755795955658},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7576141953468323},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6738908290863037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6008888483047485},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5902428030967712},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.5438480973243713},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5041724443435669},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3643094301223755},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1456223.1456238","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1456223.1456238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1483817343","https://openalex.org/W1577672332","https://openalex.org/W1670263352","https://openalex.org/W1884606608","https://openalex.org/W2116143800","https://openalex.org/W2140190241","https://openalex.org/W2146196597","https://openalex.org/W2149086123","https://openalex.org/W2156909104","https://openalex.org/W2369636299"],"related_works":["https://openalex.org/W2365264209","https://openalex.org/W962203960","https://openalex.org/W2509431957","https://openalex.org/W2026999166","https://openalex.org/W1599954583","https://openalex.org/W4211007821","https://openalex.org/W2802395037","https://openalex.org/W4389565704","https://openalex.org/W2357468538","https://openalex.org/W1996802783"],"abstract_inverted_index":{"The":[0],"most":[1],"acute":[2],"problem":[3],"for":[4,37],"misuse":[5],"detection":[6,19],"method":[7],"is":[8,27],"its":[9],"inability":[10],"to":[11,29],"detect":[12,65],"new":[13,24,76],"kinds":[14],"of":[15,74],"attacks.":[16],"A":[17,33],"better":[18],"method,":[20],"which":[21],"uses":[22],"a":[23],"learning":[25,50],"strategy,":[26],"proposed":[28],"solve":[30],"this":[31,75],"problem.":[32],"Concept":[34],"Hierarchy":[35],"Generation":[36],"attack":[38,53,67],"Labels":[39],"(CHGL)":[40],"applying":[41],"relevant":[42],"feature":[43],"subset":[44],"codes":[45],"clustering,":[46],"makes":[47],"common":[48],"machine":[49],"algorithms":[51],"learn":[52],"profiles":[54],"on":[55],"high":[56],"concept":[57],"levels.":[58],"And":[59],"that":[60],"will":[61],"enable":[62],"the":[63,72],"system":[64],"more":[66],"instances.":[68],"Experimental":[69],"results":[70],"show":[71],"advantage":[73],"method.":[77]},"counts_by_year":[{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
