{"id":"https://openalex.org/W4400978080","doi":"https://doi.org/10.1145/3664476.3670445","title":"Comparing Hyperbolic Graph Embedding models on Anomaly Detection for Cybersecurity","display_name":"Comparing Hyperbolic Graph Embedding models on Anomaly Detection for Cybersecurity","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400978080","doi":"https://doi.org/10.1145/3664476.3670445"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670445","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105094382","display_name":"Mohamed Yacine Touahria Miliani","orcid":"https://orcid.org/0009-0003-9837-6435"},"institutions":[{"id":"https://openalex.org/I4210149016","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique","ror":"https://ror.org/04dj1dn66","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210149016"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Mohamed Yacine Touahria Miliani","raw_affiliation_strings":["\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria","institution_ids":["https://openalex.org/I4210149016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105049342","display_name":"Souhail Abdelmouaiz Sadat","orcid":null},"institutions":[{"id":"https://openalex.org/I4210149016","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique","ror":"https://ror.org/04dj1dn66","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210149016"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Souhail Abdelmouaiz Sadat","raw_affiliation_strings":["\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria","institution_ids":["https://openalex.org/I4210149016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056964260","display_name":"Mohammed Haddad","orcid":"https://orcid.org/0000-0002-8699-7520"},"institutions":[{"id":"https://openalex.org/I100532134","display_name":"Universit\u00e9 Claude Bernard Lyon 1","ror":"https://ror.org/029brtt94","country_code":"FR","type":"education","lineage":["https://openalex.org/I100532134","https://openalex.org/I203339264"]},{"id":"https://openalex.org/I4210137744","display_name":"LabEx PERSYVAL-Lab","ror":"https://ror.org/03eqm6y13","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I2738703131","https://openalex.org/I4210137744","https://openalex.org/I4210139971","https://openalex.org/I4210150872","https://openalex.org/I899635006","https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohammed Haddad","raw_affiliation_strings":["Universit\u00e9 Claude Bernard Lyon-1, France","GOAL - Graphes, AlgOrithmes et AppLications (France)"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Claude Bernard Lyon-1, France","institution_ids":["https://openalex.org/I100532134"]},{"raw_affiliation_string":"GOAL - Graphes, AlgOrithmes et AppLications (France)","institution_ids":["https://openalex.org/I4210137744"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005723915","display_name":"Hamida Seba","orcid":"https://orcid.org/0000-0003-0670-815X"},"institutions":[{"id":"https://openalex.org/I100532134","display_name":"Universit\u00e9 Claude Bernard Lyon 1","ror":"https://ror.org/029brtt94","country_code":"FR","type":"education","lineage":["https://openalex.org/I100532134","https://openalex.org/I203339264"]},{"id":"https://openalex.org/I4210137744","display_name":"LabEx PERSYVAL-Lab","ror":"https://ror.org/03eqm6y13","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I2738703131","https://openalex.org/I4210137744","https://openalex.org/I4210139971","https://openalex.org/I4210150872","https://openalex.org/I899635006","https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Hamida Seba","raw_affiliation_strings":["University Claude Bernard Lyon 1, France","GOAL - Graphes, AlgOrithmes et AppLications (France)"],"affiliations":[{"raw_affiliation_string":"University Claude Bernard Lyon 1, France","institution_ids":["https://openalex.org/I100532134"]},{"raw_affiliation_string":"GOAL - Graphes, AlgOrithmes et AppLications (France)","institution_ids":["https://openalex.org/I4210137744"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015511374","display_name":"Karima Amrouche","orcid":"https://orcid.org/0009-0002-6785-7394"},"institutions":[{"id":"https://openalex.org/I4210149016","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique","ror":"https://ror.org/04dj1dn66","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210149016"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Karima Amrouche","raw_affiliation_strings":["\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria","institution_ids":["https://openalex.org/I4210149016"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5105094382"],"corresponding_institution_ids":["https://openalex.org/I4210149016"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12232785,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6703141331672668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5997399687767029},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5884981751441956},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5594891309738159},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.46669748425483704},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.43053334951400757},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36715972423553467},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.30498671531677246},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2267809808254242},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06479409337043762}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6703141331672668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5997399687767029},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5884981751441956},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5594891309738159},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.46669748425483704},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.43053334951400757},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36715972423553467},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30498671531677246},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2267809808254242},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06479409337043762},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3664476.3670445","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-04688906v1","is_oa":false,"landing_page_url":"https://hal.science/hal-04688906","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security (GRASEC Workshop), Jul 2024, Vienna Austria, France. pp.1-11, &#x27E8;10.1145/3664476.3670445&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":67,"referenced_works":["https://openalex.org/W638895084","https://openalex.org/W1890754837","https://openalex.org/W1971215074","https://openalex.org/W1982803213","https://openalex.org/W1999418377","https://openalex.org/W2018049970","https://openalex.org/W2020141201","https://openalex.org/W2040333627","https://openalex.org/W2058600246","https://openalex.org/W2090891622","https://openalex.org/W2099940443","https://openalex.org/W2110324540","https://openalex.org/W2116778777","https://openalex.org/W2118347867","https://openalex.org/W2122646361","https://openalex.org/W2138674039","https://openalex.org/W2142420687","https://openalex.org/W2142535891","https://openalex.org/W2152948207","https://openalex.org/W2154851992","https://openalex.org/W2168891622","https://openalex.org/W2176446742","https://openalex.org/W2199357291","https://openalex.org/W2284900416","https://openalex.org/W2387462954","https://openalex.org/W2500138264","https://openalex.org/W2553530424","https://openalex.org/W2555618718","https://openalex.org/W2558748708","https://openalex.org/W2732560875","https://openalex.org/W2770942607","https://openalex.org/W2789828921","https://openalex.org/W2792249286","https://openalex.org/W2904510605","https://openalex.org/W2947116889","https://openalex.org/W2962756421","https://openalex.org/W2963224980","https://openalex.org/W2963748489","https://openalex.org/W2964015378","https://openalex.org/W2981025625","https://openalex.org/W2982682021","https://openalex.org/W3016757214","https://openalex.org/W3099667794","https://openalex.org/W3102317997","https://openalex.org/W3102359135","https://openalex.org/W3104097132","https://openalex.org/W3124525317","https://openalex.org/W3127824945","https://openalex.org/W3152663991","https://openalex.org/W3163629447","https://openalex.org/W3164410012","https://openalex.org/W3168619736","https://openalex.org/W3177377177","https://openalex.org/W3206604724","https://openalex.org/W4205175531","https://openalex.org/W4226044115","https://openalex.org/W4235484205","https://openalex.org/W4288641231","https://openalex.org/W4297087274","https://openalex.org/W4297731700","https://openalex.org/W4297733535","https://openalex.org/W4299279015","https://openalex.org/W4311415873","https://openalex.org/W4322614756","https://openalex.org/W4385568361","https://openalex.org/W4385688300","https://openalex.org/W6963643661"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Graph-based":[0],"anomaly":[1,67],"detection":[2,68,92],"has":[3],"emerged":[4],"as":[5],"a":[6,39,76,89],"powerful":[7],"tool":[8],"in":[9,28,52,69],"cybersecurity":[10],"for":[11,43,66,111],"identifying":[12],"malicious":[13],"activities":[14],"within":[15],"computer":[16],"systems":[17],"and":[18,48,99],"networks.":[19],"While":[20],"existing":[21],"approaches":[22],"often":[23],"rely":[24],"on":[25,88],"embedding":[26,65,83,110],"graphs":[27],"Euclidean":[29],"space,":[30],"recent":[31],"studies":[32],"have":[33],"suggested":[34],"that":[35],"hyperbolic":[36,63,81,108],"space":[37],"provides":[38],"more":[40],"suitable":[41],"geometry":[42],"capturing":[44],"the":[45,60,70,97,105],"inherent":[46],"hierarchical":[47],"complex":[49],"relationships":[50],"present":[51],"graph":[53,64,82,109],"data.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"explore":[59],"efficacy":[61],"of":[62,72,78,101,107],"context":[71],"cybersecurity.":[73],"We":[74],"conduct":[75],"comparison":[77],"six":[79],"state-of-the-art":[80],"methods,":[84],"evaluating":[85],"their":[86],"performance":[87],"well-known":[90],"intrusion":[91],"dataset.":[93],"Our":[94],"analysis":[95],"reveals":[96],"strengths":[98],"limitations":[100],"each":[102],"method,":[103],"demonstrating":[104],"potential":[106],"enhancing":[112],"security.":[113]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2024-07-26T00:00:00"}
