{"id":"https://openalex.org/W4231251036","doi":"https://doi.org/10.1145/3098593","title":"Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks","display_name":"Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks","publication_year":2017,"publication_date":"2017-08-02","ids":{"openalex":"https://openalex.org/W4231251036","doi":"https://doi.org/10.1145/3098593"},"language":"en","primary_location":{"id":"doi:10.1145/3098593","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3098593","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9585999846458435,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9585999846458435,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7604160308837891},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.7046023607254028},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5964473485946655},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5126537680625916},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4926939308643341},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4608139395713806},{"id":"https://openalex.org/keywords/silver-bullet","display_name":"Silver bullet","score":0.46041518449783325},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45664259791374207},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24155646562576294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7604160308837891},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.7046023607254028},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5964473485946655},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5126537680625916},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4926939308643341},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4608139395713806},{"id":"https://openalex.org/C2776088982","wikidata":"https://www.wikidata.org/wiki/Q841402","display_name":"Silver bullet","level":2,"score":0.46041518449783325},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45664259791374207},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24155646562576294},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3098593","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3098593","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W2539773025","https://openalex.org/W4206777497","https://openalex.org/W4233347783","https://openalex.org/W2910064364","https://openalex.org/W3086242709"],"abstract_inverted_index":{"The":[0],"application":[1],"of":[2],"machine":[3],"learning":[4],"models":[5],"to":[6,31],"network":[7],"security":[8],"and":[9],"anomaly":[10],"detection":[11],"problems":[12,34],"has":[13],"largely":[14],"increased":[15],"in":[16,35],"the":[17],"last":[18],"decade;":[19],"however,":[20],"there":[21],"is":[22],"still":[23],"no":[24],"clear":[25],"best-practice":[26],"or":[27],"silver":[28],"bullet":[29],"approach":[30],"address":[32],"these":[33],"a":[36],"general":[37],"...":[38]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
