{"id":"https://openalex.org/W4402957950","doi":"https://doi.org/10.1145/3678890.3678901","title":"Mateen: Adaptive Ensemble Learning for Network Anomaly Detection","display_name":"Mateen: Adaptive Ensemble Learning for Network Anomaly Detection","publication_year":2024,"publication_date":"2024-09-29","ids":{"openalex":"https://openalex.org/W4402957950","doi":"https://doi.org/10.1145/3678890.3678901"},"language":"en","primary_location":{"id":"doi:10.1145/3678890.3678901","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678901","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3678890.3678901","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049738030","display_name":"Fahad Alotaibi","orcid":"https://orcid.org/0000-0003-2901-5313"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Fahad Alotaibi","raw_affiliation_strings":["Department of Computing, Imperial College London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Imperial College London, United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043151499","display_name":"Sergio Maffeis","orcid":"https://orcid.org/0000-0003-1514-6857"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sergio Maffeis","raw_affiliation_strings":["Department of Computing, Imperial College London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Imperial College London, United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049738030"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":2.9026,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.92121697,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"215","last_page":"234"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7414321899414062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7241691946983337},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.6061840653419495},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5348758697509766},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.533335268497467},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3822475075721741},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06619471311569214}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7414321899414062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7241691946983337},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.6061840653419495},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5348758697509766},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.533335268497467},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3822475075721741},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06619471311569214},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3678890.3678901","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678901","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},{"id":"pmh:oai:spiral.imperial.ac.uk:10044/1/113763","is_oa":true,"landing_page_url":"http://hdl.handle.net/10044/1/113763","pdf_url":null,"source":{"id":"https://openalex.org/S4306401396","display_name":"Spiral (Imperial College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I47508984","host_organization_name":"Imperial College London","host_organization_lineage":["https://openalex.org/I47508984"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","raw_type":"Conference Paper"}],"best_oa_location":{"id":"doi:10.1145/3678890.3678901","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678901","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5916870008","display_name":null,"funder_award_id":"443-16-1171","funder_id":"https://openalex.org/F4320323502","funder_display_name":"Najran University"}],"funders":[{"id":"https://openalex.org/F4320323502","display_name":"Najran University","ror":"https://ror.org/05edw4a90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W1985987493","https://openalex.org/W2088220893","https://openalex.org/W2099085654","https://openalex.org/W2134125037","https://openalex.org/W2138550913","https://openalex.org/W2138621090","https://openalex.org/W2143821562","https://openalex.org/W2143991132","https://openalex.org/W2160512933","https://openalex.org/W2285233685","https://openalex.org/W2343828539","https://openalex.org/W2584099312","https://openalex.org/W2591712613","https://openalex.org/W2623257591","https://openalex.org/W2740428142","https://openalex.org/W2789828921","https://openalex.org/W2897104255","https://openalex.org/W2957754705","https://openalex.org/W2963197901","https://openalex.org/W2968455244","https://openalex.org/W2969244304","https://openalex.org/W2969495950","https://openalex.org/W2970971581","https://openalex.org/W2977584137","https://openalex.org/W2988337058","https://openalex.org/W2991408690","https://openalex.org/W2992362249","https://openalex.org/W3047608117","https://openalex.org/W3093151833","https://openalex.org/W3097730806","https://openalex.org/W3097911904","https://openalex.org/W3102015031","https://openalex.org/W3111088413","https://openalex.org/W3113682753","https://openalex.org/W3180062783","https://openalex.org/W3181333984","https://openalex.org/W3184127157","https://openalex.org/W3188458904","https://openalex.org/W3200583622","https://openalex.org/W3204639595","https://openalex.org/W3205604077","https://openalex.org/W3208097639","https://openalex.org/W4281398200","https://openalex.org/W4282813397","https://openalex.org/W4287644588","https://openalex.org/W4288758078","https://openalex.org/W4309346044","https://openalex.org/W4311165866","https://openalex.org/W4312239358","https://openalex.org/W4313045788","https://openalex.org/W4324007053","https://openalex.org/W4384129390","https://openalex.org/W4384948606","https://openalex.org/W4384948718","https://openalex.org/W4385412194","https://openalex.org/W4385412220","https://openalex.org/W4386470164","https://openalex.org/W4387298163","https://openalex.org/W4387298311","https://openalex.org/W4388867311","https://openalex.org/W4402916131"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W2806741695","https://openalex.org/W4306674287","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W4394896187"],"abstract_inverted_index":{"Anomaly-based":[0],"intrusion":[1],"detection":[2],"systems":[3,32],"are":[4],"tasked":[5],"with":[6,42],"identifying":[7],"deviations":[8,16],"from":[9,81],"established":[10],"benign":[11,40,53,79,106],"network":[12,69],"behaviors,":[13],"assuming":[14],"such":[15],"to":[17,34,38,58,74,96],"be":[18],"indicators":[19],"of":[20],"malicious":[21],"intent.":[22],"Deep":[23],"AutoEncoders":[24],"(DAEs)":[25],"have":[26],"become":[27],"increasingly":[28],"popular":[29],"in":[30,46,76],"these":[31],"due":[33],"their":[35],"exceptional":[36],"ability":[37],"model":[39],"behavior":[41,70,107],"high":[43],"accuracy,":[44],"particularly":[45],"static,":[47],"offline":[48,94],"settings":[49],"where":[50],"the":[51],"network\u2019s":[52],"activity":[54],"pattern":[55],"is":[56],"presumed":[57],"remain":[59],"constant.":[60],"However,":[61],"this":[62],"static":[63],"approach":[64],"becomes":[65],"less":[66],"effective":[67],"as":[68],"naturally":[71],"evolves,":[72],"leading":[73],"challenges":[75],"distinguishing":[77],"new,":[78],"activities":[80],"genuine":[82],"threats.":[83],"This":[84],"evolution":[85],"raises":[86],"a":[87],"critical":[88],"question:":[89],"How":[90],"can":[91],"we":[92],"enhance":[93],"DAEs":[95],"accurately":[97],"identify":[98],"threats":[99],"while":[100],"avoiding":[101],"false":[102],"alarms":[103],"caused":[104],"by":[105],"changes?":[108]},"counts_by_year":[{"year":2025,"cited_by_count":8}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
