{"id":"https://openalex.org/W3093709505","doi":"https://doi.org/10.1155/2020/8891185","title":"A Mean Convolutional Layer for Intrusion Detection System","display_name":"A Mean Convolutional Layer for Intrusion Detection System","publication_year":2020,"publication_date":"2020-10-24","ids":{"openalex":"https://openalex.org/W3093709505","doi":"https://doi.org/10.1155/2020/8891185","mag":"3093709505"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8891185","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8891185","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8891185.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8891185.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001492743","display_name":"Leila Mohammadpour","orcid":"https://orcid.org/0000-0003-4596-0964"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Leila Mohammadpour","raw_affiliation_strings":["Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070633385","display_name":"Teck Chaw Ling","orcid":"https://orcid.org/0000-0002-1225-7941"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"T.C. Ling","raw_affiliation_strings":["Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009459014","display_name":"Chee Sun Liew","orcid":"https://orcid.org/0000-0003-3217-3523"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"C.S. Liew","raw_affiliation_strings":["Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043756670","display_name":"Alihossein Aryanfar","orcid":"https://orcid.org/0000-0002-8361-8441"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Alihossein Aryanfar","raw_affiliation_strings":["Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001492743"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.4669,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.89885528,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8889309763908386},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7282150387763977},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6919589638710022},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6758122444152832},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6464573740959167},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5438500046730042},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5297143459320068},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4499342739582062},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.42007654905319214},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.41478127241134644},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38370761275291443},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3005450665950775}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8889309763908386},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7282150387763977},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6919589638710022},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6758122444152832},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6464573740959167},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5438500046730042},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5297143459320068},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4499342739582062},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.42007654905319214},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.41478127241134644},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38370761275291443},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3005450665950775},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8891185","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8891185","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8891185.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3fde95d6609d4e05b6ae1e81830bc59e","is_oa":true,"landing_page_url":"https://doaj.org/article/3fde95d6609d4e05b6ae1e81830bc59e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8891185","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8891185","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8891185.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3093709505.pdf","grobid_xml":"https://content.openalex.org/works/W3093709505.grobid-xml"},"referenced_works_count":57,"referenced_works":["https://openalex.org/W6908809","https://openalex.org/W1677182931","https://openalex.org/W1686810756","https://openalex.org/W1836465849","https://openalex.org/W1849277567","https://openalex.org/W1904365287","https://openalex.org/W1977482721","https://openalex.org/W2011301426","https://openalex.org/W2025001960","https://openalex.org/W2031163547","https://openalex.org/W2097117768","https://openalex.org/W2101109743","https://openalex.org/W2101234009","https://openalex.org/W2117539524","https://openalex.org/W2146502635","https://openalex.org/W2150847526","https://openalex.org/W2176412452","https://openalex.org/W2266096763","https://openalex.org/W2271840356","https://openalex.org/W2340896621","https://openalex.org/W2399941526","https://openalex.org/W2461378669","https://openalex.org/W2531448500","https://openalex.org/W2535642622","https://openalex.org/W2560162835","https://openalex.org/W2561675875","https://openalex.org/W2569531558","https://openalex.org/W2584408238","https://openalex.org/W2597441556","https://openalex.org/W2598684549","https://openalex.org/W2606697812","https://openalex.org/W2607918523","https://openalex.org/W2618017145","https://openalex.org/W2618530766","https://openalex.org/W2742119477","https://openalex.org/W2762776925","https://openalex.org/W2789828921","https://openalex.org/W2798117183","https://openalex.org/W2810292802","https://openalex.org/W2884675507","https://openalex.org/W2886020981","https://openalex.org/W2900774199","https://openalex.org/W2918854598","https://openalex.org/W2921453769","https://openalex.org/W2941775396","https://openalex.org/W2944992190","https://openalex.org/W2959716986","https://openalex.org/W2963285578","https://openalex.org/W2972328267","https://openalex.org/W3005630930","https://openalex.org/W3005641848","https://openalex.org/W3032465393","https://openalex.org/W3152157423","https://openalex.org/W4240663692","https://openalex.org/W6600284362","https://openalex.org/W6674914833","https://openalex.org/W6675354045"],"related_works":["https://openalex.org/W4293226380","https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3193565141","https://openalex.org/W3133861977","https://openalex.org/W2951211570","https://openalex.org/W3167935049","https://openalex.org/W2964954556","https://openalex.org/W3103566983","https://openalex.org/W3029198973"],"abstract_inverted_index":{"The":[0,212],"significant":[1],"development":[2],"of":[3,82,166,169,229,256],"Internet":[4],"applications":[5],"over":[6],"the":[7,14,18,41,65,122,133,137,160,164,167,180,202,209,243,247],"past":[8],"10":[9],"years":[10],"has":[11],"resulted":[12],"in":[13,125,132,216,254],"rising":[15],"necessity":[16],"for":[17,148,200],"information":[19],"network":[20,31,103,220],"to":[21,38,40,91,111,117,136,179,251,273],"be":[22,36,76],"secured.":[23],"An":[24],"intrusion":[25,221],"detection":[26,222],"system":[27,223],"is":[28,100,107,115,146,154],"a":[29,88,143,186,218],"fundamental":[30],"infrastructure":[32],"defense":[33],"that":[34,49,73,142,156,162,176,197,224,232,241,262],"must":[35],"able":[37],"adapt":[39],"ever-evolving":[42],"threat":[43],"landscape":[44],"and":[45,68,206,266],"identify":[46,118],"new":[47,187],"attacks":[48],"have":[50,55,267],"low":[51,268],"false":[52],"alarm.":[53],"Researchers":[54],"developed":[56,199],"several":[57],"supervised":[58],"as":[59,61,192,271],"well":[60],"unsupervised":[62],"methods":[63],"from":[64],"data":[66],"mining":[67],"machine":[69,83],"learning":[70,86,97,201],"disciplines":[71],"so":[72],"anomalies":[74,261],"can":[75,233],"detected":[77],"reliably.":[78],"As":[79],"an":[80,170,226],"aspect":[81],"learning,":[84],"deep":[85,96],"uses":[87],"neuron-like":[89],"structure":[90],"learn":[92,159],"tasks.":[93],"A":[94],"successful":[95],"technique":[98],"method":[99,145],"convolution":[101,194],"neural":[102],"(CNN);":[104],"however,":[105],"it":[106],"presently":[108],"not":[109],"suitable":[110],"detect":[112],"anomalies.":[113],"It":[114,153,238],"easier":[116],"expected":[119,155],"contents":[120],"within":[121],"input":[123],"flow":[124],"CNNs,":[126],"whereas":[127],"there":[128],"are":[129,177,263],"minor":[130,151],"differences":[131],"abnormalities":[134],"compared":[135],"normal":[138],"content.":[139,181],"This":[140],"suggests":[141],"particular":[144,210],"required":[147],"identifying":[149,208],"such":[150],"changes.":[152],"CNNs":[157],"would":[158],"features":[161,205],"form":[163,228],"characteristic":[165],"content":[168,204],"image":[171],"(flow)":[172],"rather":[173],"than":[174],"variations":[175],"unrelated":[178],"Hence,":[182],"this":[183],"study":[184],"recommends":[185],"CNN":[188],"architecture":[189],"type":[190],"known":[191],"mean":[193],"layer":[195,231],"(CNN-MCL)":[196],"was":[198,239],"anomalies\u2019":[203],"then":[207],"abnormality.":[211],"recommended":[213],"CNN-MCL":[214],"helps":[215],"designing":[217],"strong":[219],"includes":[225],"innovative":[227],"convolutional":[230],"teach":[234],"low-level":[235],"abnormal":[236],"characteristics.":[237],"observed":[240],"assessing":[242],"proposed":[244],"model":[245],"on":[246],"CICIDS2017":[248],"dataset":[249],"led":[250],"favorable":[252],"results":[253],"terms":[255],"real-world":[257],"application":[258],"regarding":[259],"detecting":[260],"highly":[264],"accurate":[265],"false-alarm":[269],"rate":[270],"opposed":[272],"other":[274],"best":[275],"models.":[276]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
