{"id":"https://openalex.org/W2029979651","doi":"https://doi.org/10.1145/1947940.1948050","title":"NADO","display_name":"NADO","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2029979651","doi":"https://doi.org/10.1145/1947940.1948050","mag":"2029979651"},"language":"en","primary_location":{"id":"doi:10.1145/1947940.1948050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1947940.1948050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Communication, Computing &amp; Security - ICCCS '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044933320","display_name":"Monowar Bhuyan","orcid":"https://orcid.org/0000-0002-9842-7840"},"institutions":[{"id":"https://openalex.org/I126601174","display_name":"Tezpur University","ror":"https://ror.org/005x56091","country_code":"IN","type":"education","lineage":["https://openalex.org/I126601174"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Monowar H. Bhuyan","raw_affiliation_strings":["Tezpur University, Tezpur, Assam, India","[Tezpur University Tezpur, Assam, India]"],"affiliations":[{"raw_affiliation_string":"Tezpur University, Tezpur, Assam, India","institution_ids":["https://openalex.org/I126601174"]},{"raw_affiliation_string":"[Tezpur University Tezpur, Assam, India]","institution_ids":["https://openalex.org/I126601174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071372272","display_name":"Dhruba K. Bhattacharyya","orcid":"https://orcid.org/0000-0002-9506-7640"},"institutions":[{"id":"https://openalex.org/I126601174","display_name":"Tezpur University","ror":"https://ror.org/005x56091","country_code":"IN","type":"education","lineage":["https://openalex.org/I126601174"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. K. Bhattacharyya","raw_affiliation_strings":["Tezpur University, Tezpur, Assam, India","[Tezpur University Tezpur, Assam, India]"],"affiliations":[{"raw_affiliation_string":"Tezpur University, Tezpur, Assam, India","institution_ids":["https://openalex.org/I126601174"]},{"raw_affiliation_string":"[Tezpur University Tezpur, Assam, India]","institution_ids":["https://openalex.org/I126601174"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049180880","display_name":"Jugal Kalita","orcid":"https://orcid.org/0000-0002-8765-7018"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. K. Kalita","raw_affiliation_strings":["University of Colorado, Colorado Springs, CO","University of Colorado, Colorado Springs CO"],"affiliations":[{"raw_affiliation_string":"University of Colorado, Colorado Springs, CO","institution_ids":["https://openalex.org/I888729015"]},{"raw_affiliation_string":"University of Colorado, Colorado Springs CO","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044933320"],"corresponding_institution_ids":["https://openalex.org/I126601174"],"apc_list":null,"apc_paid":null,"fwci":3.5008,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.92621913,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"531","last_page":"531"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8237113356590271},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7195085287094116},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.673381507396698},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.6729268431663513},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6586077213287354},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.656750500202179},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.6558939218521118},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5045133829116821},{"id":"https://openalex.org/keywords/local-outlier-factor","display_name":"Local outlier factor","score":0.47637078166007996},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.45083630084991455},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.44944173097610474},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4330296814441681}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8237113356590271},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7195085287094116},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.673381507396698},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.6729268431663513},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6586077213287354},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.656750500202179},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.6558939218521118},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5045133829116821},{"id":"https://openalex.org/C169029474","wikidata":"https://www.wikidata.org/wiki/Q387942","display_name":"Local outlier factor","level":3,"score":0.47637078166007996},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.45083630084991455},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.44944173097610474},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4330296814441681},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1947940.1948050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1947940.1948050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Communication, Computing &amp; Security - ICCCS '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320331146","display_name":"Agencia Nacional de Investigaci\u00f3n y Desarrollo","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W187043655","https://openalex.org/W200399331","https://openalex.org/W1566480186","https://openalex.org/W1583975142","https://openalex.org/W1908122868","https://openalex.org/W2082860616","https://openalex.org/W2096710126","https://openalex.org/W2101277490","https://openalex.org/W2113076747","https://openalex.org/W2116335710","https://openalex.org/W2124536999","https://openalex.org/W2131389289","https://openalex.org/W2144182447","https://openalex.org/W2144200194","https://openalex.org/W2153919695","https://openalex.org/W2157665255","https://openalex.org/W2170210941","https://openalex.org/W3120740533"],"related_works":["https://openalex.org/W3187538536","https://openalex.org/W4313069709","https://openalex.org/W2899229695","https://openalex.org/W2360936313","https://openalex.org/W3183437131","https://openalex.org/W2541628903","https://openalex.org/W3092395032","https://openalex.org/W3170510247","https://openalex.org/W2377114242","https://openalex.org/W1531205890"],"abstract_inverted_index":{"Anomaly":[0,23,42],"detection,":[1],"which":[2],"is":[3,28],"an":[4,47],"important":[5],"task":[6],"in":[7,56],"any":[8],"Network":[9],"Intrusion":[10],"Detection":[11,43],"System":[12],"(NIDS),":[13],"enables":[14],"discovery":[15],"of":[16,54,67,120],"known":[17],"as":[18,20,106],"well":[19],"unknown":[21],"attacks.":[22],"detection":[24,53,138],"using":[25,44,64],"outlier":[26,49],"approach":[27,51,122],"a":[29,65,111],"successful":[30],"network":[31],"anomaly":[32,107],"identification":[33],"technique.":[34],"In":[35],"this":[36],"paper,":[37],"we":[38],"describe":[39],"NADO":[40,135],"(Network":[41],"Outlier":[45],"approach),":[46],"effective":[48],"based":[50],"for":[52,72,88,96],"anomalies":[55],"networks.":[57],"It":[58],"initially":[59],"clusters":[60],"the":[61,68,79,94,101,118],"normal":[62],"data":[63],"variant":[66],"k-means":[69],"clustering":[70],"technique":[71],"high":[73,137],"dimensional":[74],"data.":[75],"Then":[76],"it":[77,92,109],"calculates":[78,93],"reference":[80,102],"point":[81,99],"from":[82],"each":[83,89,97],"cluster":[84],"and":[85,104,127,140],"builds":[86],"profiles":[87],"cluster.":[90],"Finally,":[91],"score":[95],"candidate":[98],"w.r.t":[100],"points":[103],"reports":[105],"if":[108],"exceeds":[110],"user":[112],"defined":[113],"threshold":[114],"value.":[115],"We":[116,132],"evaluate":[117],"performance":[119],"our":[121],"with":[123],"KDDcup99":[124],"intrusion":[125],"dataset":[126],"other":[128],"real":[129],"life":[130],"datasets.":[131],"show":[133],"that":[134],"has":[136],"rate":[139],"low":[141],"false":[142],"positive":[143],"rate.":[144]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
