{"id":"https://openalex.org/W3088647798","doi":"https://doi.org/10.1155/2020/8875404","title":"Feature Selection Based on Cross-Correlation for the Intrusion Detection System","display_name":"Feature Selection Based on Cross-Correlation for the Intrusion Detection System","publication_year":2020,"publication_date":"2020-09-22","ids":{"openalex":"https://openalex.org/W3088647798","doi":"https://doi.org/10.1155/2020/8875404","mag":"3088647798"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8875404","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8875404","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8875404.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8875404.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017274750","display_name":"Gholamreza Farahani","orcid":"https://orcid.org/0000-0003-3545-6027"},"institutions":[{"id":"https://openalex.org/I2802500176","display_name":"Iranian Research Organization for Science and Technology","ror":"https://ror.org/017zx9g19","country_code":"IR","type":"facility","lineage":["https://openalex.org/I2802500176"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Gholamreza Farahani","raw_affiliation_strings":["Department of Electrical Engineering and Information Technology, Iranian Research Organization for Science and Technology (IROST), Sh. Ehsani Rad St., Enqelab St., Parsa Sq., Ahmadabad Mostoufi Rd., Azadegan Highway, Tehran 3353136846, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Information Technology, Iranian Research Organization for Science and Technology (IROST), Sh. Ehsani Rad St., Enqelab St., Parsa Sq., Ahmadabad Mostoufi Rd., Azadegan Highway, Tehran 3353136846, Iran","institution_ids":["https://openalex.org/I2802500176"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5017274750"],"corresponding_institution_ids":["https://openalex.org/I2802500176"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":4.0086,"has_fulltext":true,"cited_by_count":47,"citation_normalized_percentile":{"value":0.94170667,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8718100190162659},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7505684494972229},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7115699052810669},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6896163821220398},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6684938073158264},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6065972447395325},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5541377663612366},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5455800890922546},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5050442814826965},{"id":"https://openalex.org/keywords/mutual-information","display_name":"Mutual information","score":0.48391324281692505},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.48050105571746826},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.44477084279060364},{"id":"https://openalex.org/keywords/correlation","display_name":"Correlation","score":0.4383547604084015},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.43004193902015686}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8718100190162659},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7505684494972229},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7115699052810669},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6896163821220398},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6684938073158264},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6065972447395325},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5541377663612366},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5455800890922546},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5050442814826965},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.48391324281692505},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48050105571746826},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.44477084279060364},{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.4383547604084015},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.43004193902015686},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8875404","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8875404","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8875404.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1aad4cd847ff4e6a9db27e65354ee33f","is_oa":true,"landing_page_url":"https://doaj.org/article/1aad4cd847ff4e6a9db27e65354ee33f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8875404","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8875404","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8875404.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/14","display_name":"Life below water"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320329635","display_name":"Iranian Research Organization for Science and Technology","ror":"https://ror.org/017zx9g19"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3088647798.pdf","grobid_xml":"https://content.openalex.org/works/W3088647798.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1905787686","https://openalex.org/W1993943803","https://openalex.org/W2015401767","https://openalex.org/W2024217857","https://openalex.org/W2028070713","https://openalex.org/W2032620230","https://openalex.org/W2067361528","https://openalex.org/W2076384720","https://openalex.org/W2084496302","https://openalex.org/W2086540457","https://openalex.org/W2105779206","https://openalex.org/W2140543436","https://openalex.org/W2149454242","https://openalex.org/W2160598920","https://openalex.org/W2165909565","https://openalex.org/W2801080689","https://openalex.org/W2908750435","https://openalex.org/W2928016897","https://openalex.org/W2952078967","https://openalex.org/W2954144630","https://openalex.org/W2963771018","https://openalex.org/W2981887211","https://openalex.org/W3023702284","https://openalex.org/W3097993951","https://openalex.org/W3101397573"],"related_works":["https://openalex.org/W4389954502","https://openalex.org/W2771255398","https://openalex.org/W2930428186","https://openalex.org/W3200027047","https://openalex.org/W4385770464","https://openalex.org/W2122022187","https://openalex.org/W2115529843","https://openalex.org/W4224262160","https://openalex.org/W3120363735","https://openalex.org/W4214820172"],"abstract_inverted_index":{"One":[0],"of":[1,14,54,88,156],"the":[2,6,35,75,110,121,139,147,154,157,161,165],"important":[3],"issues":[4],"in":[5,16,32,128,136,143],"computer":[7,17],"networks":[8,18],"is":[9,19,29,57,70,164],"security.":[10],"Therefore,":[11],"trusted":[12],"communication":[13],"information":[15],"a":[20,25,63,125],"critical":[21],"point.":[22],"To":[23],"have":[24],"safe":[26],"communication,":[27],"it":[28],"necessary":[30],"that,":[31],"addition":[33],"to":[34,48],"prevention":[36],"mechanisms,":[37],"intrusion":[38,50],"detection":[39],"systems":[40,56],"(IDSs)":[41],"are":[42,45],"used.":[43],"There":[44],"various":[46],"approaches":[47],"utilize":[49],"detection,":[51],"but":[52],"any":[53],"these":[55],"not":[58],"complete.":[59],"In":[60],"this":[61],"paper,":[62],"new":[64],"cross-correlation-based":[65],"feature":[66,82],"selection":[67,83],"(CCFS)":[68],"method":[69,123,163],"proposed":[71,122,162],"and":[72,79,102,116,132],"compared":[73],"with":[74,86,138],"cuttlefish":[76],"algorithm":[77],"(CFA)":[78],"mutual":[80],"information-based":[81],"(MIFS)":[84],"features":[85],"use":[87],"four":[89],"different":[90,144,150],"classifiers:":[91],"support":[92],"vector":[93],"machine":[94],"(SVM),":[95],"naive":[96],"Bayes":[97],"(NB),":[98],"decision":[99],"tree":[100],"(DT),":[101],"K-nearest":[103],"neighbor":[104],"(KNN).":[105],"The":[106],"experimental":[107],"results":[108,148],"on":[109,149],"KDD":[111],"Cup":[112],"99,":[113],"NSL-KDD,":[114],"AWID,":[115],"CIC-IDS2017":[117],"datasets":[118],"show":[119,152],"that":[120,153],"has":[124],"better":[126],"performance":[127],"accuracy,":[129],"precision,":[130],"recall,":[131],"F":[133],"1-score":[134],"criteria":[135],"comparison":[137],"other":[140],"two":[141],"methods":[142],"classifiers.":[145],"Also,":[146],"classifiers":[151],"usage":[155],"DT":[158],"classifier":[159],"for":[160],"best.":[166]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
