{"id":"https://openalex.org/W2113224047","doi":"https://doi.org/10.1145/1866480.1866487","title":"NeuDetect","display_name":"NeuDetect","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2113224047","doi":"https://doi.org/10.1145/1866480.1866487","mag":"2113224047"},"language":"en","primary_location":{"id":"doi:10.1145/1866480.1866487","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866480.1866487","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourteenth International Database Engineering &amp; Applications Symposium on - IDEAS '10","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041251316","display_name":"C. I. Ezeife","orcid":"https://orcid.org/0000-0002-9424-9223"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"C. I. Ezeife","raw_affiliation_strings":["University of Windsor, Windsor, Ontario","University of Windsor, Windsor Ontario,"],"affiliations":[{"raw_affiliation_string":"University of Windsor, Windsor, Ontario","institution_ids":["https://openalex.org/I74413500"]},{"raw_affiliation_string":"University of Windsor, Windsor Ontario,","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101765601","display_name":"Md Zillur Rahman","orcid":"https://orcid.org/0000-0003-0109-4582"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Md. Zillur Rahman","raw_affiliation_strings":["University of Windsor, Windsor, Ontario","University of Windsor, Windsor Ontario,"],"affiliations":[{"raw_affiliation_string":"University of Windsor, Windsor, Ontario","institution_ids":["https://openalex.org/I74413500"]},{"raw_affiliation_string":"University of Windsor, Windsor Ontario,","institution_ids":["https://openalex.org/I74413500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041251316"],"corresponding_institution_ids":["https://openalex.org/I74413500"],"apc_list":null,"apc_paid":null,"fwci":0.3766,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6691209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"38","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.958299994468689,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7960237860679626},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7585160732269287},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.6814243793487549},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.657936692237854},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5664834976196289},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5635137557983398},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.530817985534668},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43422722816467285},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4250737726688385},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.41553983092308044},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3996228575706482},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3853425979614258},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3699806332588196},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12628605961799622}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7960237860679626},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7585160732269287},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.6814243793487549},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.657936692237854},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5664834976196289},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5635137557983398},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.530817985534668},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43422722816467285},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4250737726688385},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.41553983092308044},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3996228575706482},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3853425979614258},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3699806332588196},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12628605961799622}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1866480.1866487","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866480.1866487","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourteenth International Database Engineering &amp; Applications Symposium on - IDEAS '10","raw_type":"proceedings-article"},{"id":"pmh:oai:scholar.uwindsor.ca:computersciencepub-1028","is_oa":false,"landing_page_url":"https://dl.acm.org/citation.cfm?doid=1866480.1866487","pdf_url":null,"source":{"id":"https://openalex.org/S4306400430","display_name":"Scholarship at UWindsor (University of Windsor)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I74413500","host_organization_name":"University of Windsor","host_organization_lineage":["https://openalex.org/I74413500"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1508989754","https://openalex.org/W1974232565","https://openalex.org/W2137522355","https://openalex.org/W2140190241"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W1724519426","https://openalex.org/W2351051591","https://openalex.org/W2369534771","https://openalex.org/W2357468538","https://openalex.org/W1548126107","https://openalex.org/W2209997499"],"abstract_inverted_index":{"This":[0],"paper":[1,47],"proposes":[2],"NeuDetect,":[3,68],"which":[4],"applies":[5],"a":[6,49],"classification":[7,57],"rule":[8],"mining":[9,56],"Neural":[10],"Network":[11],"technique":[12,58],"to":[13,59,72],"wireless":[14,42,60,80],"network":[15,61],"packets":[16],"captured":[17],"through":[18],"hardware":[19],"sensors":[20],"for":[21],"purposes":[22],"of":[23,27,34,51],"real":[24],"time":[25],"detection":[26,44,63],"anomalous":[28,76],"packets.":[29],"To":[30],"address":[31],"the":[32],"problem":[33],"high":[35],"false":[36],"alarm":[37],"rate":[38],"confronted":[39],"by":[40,83],"current":[41],"intrusion":[43,62],"systems,":[45],"this":[46],"presents":[48],"method":[50],"applying":[52],"artificial":[53],"neural":[54],"networks":[55],"system.":[64],"The":[65],"proposed":[66],"system,":[67],"solution":[69],"approach":[70],"is":[71],"find":[73],"normal":[74],"and":[75],"patterns":[77],"on":[78],"pre-processed":[79],"packet":[81],"records":[82],"comparing":[84],"them":[85],"with":[86],"training":[87],"data":[88],"using":[89],"Back-propagation":[90],"algorithm.":[91]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2016-06-24T00:00:00"}
