{"id":"https://openalex.org/W4413060438","doi":"https://doi.org/10.1145/3749374","title":"Generalizable Multi-Model Fusion for Multi-Class DoS Detection Using Cognitive Diversity and Rank-Score Analysis","display_name":"Generalizable Multi-Model Fusion for Multi-Class DoS Detection Using Cognitive Diversity and Rank-Score Analysis","publication_year":2025,"publication_date":"2025-07-18","ids":{"openalex":"https://openalex.org/W4413060438","doi":"https://doi.org/10.1145/3749374"},"language":"en","primary_location":{"id":"doi:10.1145/3749374","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3749374","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1145/3749374","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119250353","display_name":"Evans Owusu","orcid":"https://orcid.org/0000-0003-2495-264X"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Evans Owusu","raw_affiliation_strings":["Computer and Information Science, Fordham University"],"affiliations":[{"raw_affiliation_string":"Computer and Information Science, Fordham University","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017529726","display_name":"Mohamed Rahouti","orcid":"https://orcid.org/0000-0001-9701-5505"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]},{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Rahouti","raw_affiliation_strings":["Computer and Information Science, Fordham University","IBM TJ Watson Research Center"],"affiliations":[{"raw_affiliation_string":"Computer and Information Science, Fordham University","institution_ids":["https://openalex.org/I164389053"]},{"raw_affiliation_string":"IBM TJ Watson Research Center","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077318302","display_name":"Dinesh Verma","orcid":"https://orcid.org/0000-0003-1933-7343"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]},{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinesh Verma","raw_affiliation_strings":["IBM TJ Watson Research Center","Computer and Information Science, Fordham University"],"affiliations":[{"raw_affiliation_string":"IBM TJ Watson Research Center","institution_ids":["https://openalex.org/I1341412227"]},{"raw_affiliation_string":"Computer and Information Science, Fordham University","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012385538","display_name":"Yufeng Xin","orcid":"https://orcid.org/0000-0002-1648-3575"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]},{"id":"https://openalex.org/I69048370","display_name":"Renaissance Computing Institute","ror":"https://ror.org/01s91ey96","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I170897317","https://openalex.org/I69048370"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yufeng Xin","raw_affiliation_strings":["RENCI, The University of North Carolina at Chapel Hill"],"affiliations":[{"raw_affiliation_string":"RENCI, The University of North Carolina at Chapel Hill","institution_ids":["https://openalex.org/I69048370","https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067069179","display_name":"D. Frank Hsu","orcid":null},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Frank Hsu","raw_affiliation_strings":["Computer and Information Science, Fordham University"],"affiliations":[{"raw_affiliation_string":"Computer and Information Science, Fordham University","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036063517","display_name":"Christina Schweikert","orcid":null},"institutions":[{"id":"https://openalex.org/I142823887","display_name":"St. John's University","ror":"https://ror.org/00bgtad15","country_code":"US","type":"education","lineage":["https://openalex.org/I142823887"]},{"id":"https://openalex.org/I4210097625","display_name":"St. John's University","ror":"https://ror.org/00wyq5s37","country_code":"TW","type":"education","lineage":["https://openalex.org/I4210097625"]}],"countries":["TW","US"],"is_corresponding":false,"raw_author_name":"Christina Schweikert","raw_affiliation_strings":["CSMS Division, St John's University"],"affiliations":[{"raw_affiliation_string":"CSMS Division, St John's University","institution_ids":["https://openalex.org/I4210097625","https://openalex.org/I142823887"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5119250353"],"corresponding_institution_ids":["https://openalex.org/I164389053"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22096947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"3","first_page":"1","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7349622249603271},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7208154797554016},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6203060746192932},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5666071176528931},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5036572813987732},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4579630494117737},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3539193570613861}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7349622249603271},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7208154797554016},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6203060746192932},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5666071176528931},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5036572813987732},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4579630494117737},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3539193570613861},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3749374","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3749374","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3749374","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3749374","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1534477342","https://openalex.org/W1678356000","https://openalex.org/W1985987493","https://openalex.org/W2020553602","https://openalex.org/W2030686695","https://openalex.org/W2125887389","https://openalex.org/W2149706766","https://openalex.org/W2477850881","https://openalex.org/W2625013748","https://openalex.org/W2732560875","https://openalex.org/W2789828921","https://openalex.org/W2904539465","https://openalex.org/W2911964244","https://openalex.org/W2937711216","https://openalex.org/W2943421960","https://openalex.org/W2981025625","https://openalex.org/W3007603430","https://openalex.org/W3033403042","https://openalex.org/W3035635653","https://openalex.org/W3042433202","https://openalex.org/W3048053677","https://openalex.org/W3116337822","https://openalex.org/W3123592392","https://openalex.org/W3125202931","https://openalex.org/W3141197450","https://openalex.org/W3208097639","https://openalex.org/W4210779665","https://openalex.org/W4211050110","https://openalex.org/W4213315959","https://openalex.org/W4224315052","https://openalex.org/W4229003780","https://openalex.org/W4290717392","https://openalex.org/W4293732085","https://openalex.org/W4306827119","https://openalex.org/W4321609027","https://openalex.org/W4361023215","https://openalex.org/W4389143327","https://openalex.org/W4390561469","https://openalex.org/W4391582407","https://openalex.org/W4392153113","https://openalex.org/W4395022823","https://openalex.org/W4396505479","https://openalex.org/W4396822685","https://openalex.org/W4400236709","https://openalex.org/W4400737507","https://openalex.org/W4401537029","https://openalex.org/W4401798873","https://openalex.org/W4402040422","https://openalex.org/W4403917490","https://openalex.org/W4404744329","https://openalex.org/W4405022259","https://openalex.org/W4408324826","https://openalex.org/W4408325106","https://openalex.org/W4408356211"],"related_works":["https://openalex.org/W2905433371","https://openalex.org/W2888392564","https://openalex.org/W4310278675","https://openalex.org/W4388422664","https://openalex.org/W4390569940","https://openalex.org/W4361193272","https://openalex.org/W2963326959","https://openalex.org/W4388685194","https://openalex.org/W4312407344","https://openalex.org/W2894289927"],"abstract_inverted_index":{"Detecting":[0],"and":[1,12,90,120,128,171,190],"mitigating":[2],"Denial-of-Service":[3],"(DoS)":[4],"attacks":[5,170],"is":[6,31],"crucial":[7],"for":[8,26,34,42,74,184],"ensuring":[9],"the":[10,43,91,103,106,126,135,179,193],"availability":[11],"security":[13],"of":[14,94,105,130,166,181,195],"online":[15],"services.":[16],"While":[17],"various":[18],"machine":[19],"learning":[20],"(ML)":[21],"models":[22,73,140],"have":[23],"been":[24],"utilized":[25],"DoS":[27,76,186],"attack":[28,77,149,187],"detection,":[29],"there":[30],"a":[32,55,65,162],"need":[33],"innovative":[35],"approaches":[36],"to":[37,69,160,192],"improving":[38],"their":[39],"performance,":[40],"especially":[41],"more":[44,196],"challenging":[45],"multi-class":[46],"detection":[47,117,188],"problem.":[48],"In":[49],"this":[50,153,182],"article,":[51],"we":[52,101],"propose":[53],"adopting":[54],"cutting-edge":[56],"approach":[57,183],"called":[58],"Combinatorial":[59],"Fusion":[60],"Analysis":[61],"(CFA),":[62],"which":[63],"leverages":[64],"recently":[66],"developed":[67],"framework":[68],"combine":[70],"multiple":[71],"ML":[72],"improved":[75],"detection.":[78],"Our":[79,110],"methodology":[80],"involves":[81],"advanced":[82],"score":[83],"combination,":[84,86],"rank":[85],"weighted":[87],"combination":[88],"techniques,":[89],"diversity":[92],"strength":[93],"scoring":[95],"systems.":[96],"Through":[97],"rigorous":[98],"performance":[99],"evaluations,":[100],"showcase":[102],"efficacy":[104],"combinatorial":[107],"fusion":[108,156],"approach.":[109,132],"evaluations":[111],"encompass":[112],"key":[113],"metrics":[114],"such":[115],"as":[116],"precision,":[118],"recall,":[119],"F1-score,":[121],"providing":[122],"comprehensive":[123,163],"insights":[124],"into":[125],"interpretability":[127],"effectiveness":[129],"our":[131,176],"We":[133],"highlight":[134,178],"challenge":[136],"faced":[137],"by":[138],"individual":[139],"in":[141,147],"classifying":[142],"low-profiled":[143,169],"attacks,":[144],"while":[145],"excelling":[146],"other":[148,172],"types.":[150,174],"To":[151],"overcome":[152],"limitation,":[154],"model":[155,164],"techniques":[157],"were":[158],"used":[159],"create":[161],"capable":[165],"addressing":[167],"both":[168],"traffic":[173],"Furthermore,":[175],"findings":[177],"potential":[180],"enhancing":[185],"capabilities":[189],"contributing":[191],"development":[194],"robust":[197],"defense":[198],"mechanisms.":[199]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-08-10T00:00:00"}
