{"id":"https://openalex.org/W3167228939","doi":"https://doi.org/10.1155/2021/5561816","title":"Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection","display_name":"Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection","publication_year":2021,"publication_date":"2021-06-14","ids":{"openalex":"https://openalex.org/W3167228939","doi":"https://doi.org/10.1155/2021/5561816","mag":"3167228939"},"language":"en","primary_location":{"id":"doi:10.1155/2021/5561816","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5561816","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5561816.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/5561816.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049136980","display_name":"Priyanka Dixit","orcid":"https://orcid.org/0000-0002-5579-4835"},"institutions":[{"id":"https://openalex.org/I196622127","display_name":"Rajiv Gandhi Technical University","ror":"https://ror.org/03xmje391","country_code":"IN","type":"education","lineage":["https://openalex.org/I196622127"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Priyanka Dixit","raw_affiliation_strings":["RGPV University, Bhopal, Madhya Pradesh, India"],"raw_orcid":"https://orcid.org/0000-0002-5579-4835","affiliations":[{"raw_affiliation_string":"RGPV University, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I196622127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074365297","display_name":"Rashi Kohli","orcid":"https://orcid.org/0000-0003-0992-4923"},"institutions":[{"id":"https://openalex.org/I3132238960","display_name":"Institute of Electrical and Electronics Engineers","ror":"https://ror.org/01n002310","country_code":"US","type":"education","lineage":["https://openalex.org/I3132238960"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rashi Kohli","raw_affiliation_strings":["IEEE, New York, NY, USA"],"raw_orcid":"https://orcid.org/0000-0003-0992-4923","affiliations":[{"raw_affiliation_string":"IEEE, New York, NY, USA","institution_ids":["https://openalex.org/I3132238960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053301129","display_name":"\u00c1ngel Acevedo-Duque","orcid":"https://orcid.org/0000-0002-8774-3282"},"institutions":[{"id":"https://openalex.org/I3121512035","display_name":"Universidad Aut\u00f3noma de Chile","ror":"https://ror.org/010r9dy59","country_code":"CL","type":"education","lineage":["https://openalex.org/I3121512035"]}],"countries":["CL"],"is_corresponding":true,"raw_author_name":"Angel Acevedo-Duque","raw_affiliation_strings":["Faculty of Business and Administration, Public Policy Observatory, Universidad Aut\u00f3noma de Chile, Santiago, Chile"],"raw_orcid":"https://orcid.org/0000-0002-8774-3282","affiliations":[{"raw_affiliation_string":"Faculty of Business and Administration, Public Policy Observatory, Universidad Aut\u00f3noma de Chile, Santiago, Chile","institution_ids":["https://openalex.org/I3121512035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038598021","display_name":"Romel Ram\u00f3n Gonz\u00e1lez-D\u00edaz","orcid":"https://orcid.org/0000-0002-7529-8847"},"institutions":[{"id":"https://openalex.org/I4210160041","display_name":"Corporaci\u00f3n Internacional para el Desarrollo Educativo","ror":"https://ror.org/0540xtx50","country_code":"CO","type":"education","lineage":["https://openalex.org/I4210160041"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Romel Ramon Gonzalez-Diaz","raw_affiliation_strings":["Centro Internacional de Investigaci\u00f3ny Desarrollo (CIID), Monteria 230001, Colombia"],"raw_orcid":"https://orcid.org/0000-0002-7529-8847","affiliations":[{"raw_affiliation_string":"Centro Internacional de Investigaci\u00f3ny Desarrollo (CIID), Monteria 230001, Colombia","institution_ids":["https://openalex.org/I4210160041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037977430","display_name":"Rutvij H. Jhaveri","orcid":"https://orcid.org/0000-0002-3285-7346"},"institutions":[{"id":"https://openalex.org/I33586908","display_name":"Pandit Deendayal Energy University","ror":"https://ror.org/02nsv5p42","country_code":"IN","type":"education","lineage":["https://openalex.org/I33586908"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rutvij H. Jhaveri","raw_affiliation_strings":["Pandit Deendayal Energy University, Gandhinagar, Gujarat, India"],"raw_orcid":"https://orcid.org/0000-0002-3285-7346","affiliations":[{"raw_affiliation_string":"Pandit Deendayal Energy University, Gandhinagar, Gujarat, India","institution_ids":["https://openalex.org/I33586908"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053301129"],"corresponding_institution_ids":["https://openalex.org/I3121512035"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.5626,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.89653725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.871687650680542},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49381837248802185},{"id":"https://openalex.org/keywords/metaheuristic","display_name":"Metaheuristic","score":0.47399938106536865},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4557698369026184},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4483014941215515},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4472806453704834},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41906508803367615},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3880437910556793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.871687650680542},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49381837248802185},{"id":"https://openalex.org/C109718341","wikidata":"https://www.wikidata.org/wiki/Q1385229","display_name":"Metaheuristic","level":2,"score":0.47399938106536865},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4557698369026184},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4483014941215515},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4472806453704834},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41906508803367615},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3880437910556793},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/5561816","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5561816","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5561816.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f2af923b1ac54b55917f2304f69bb35e","is_oa":false,"landing_page_url":"https://doaj.org/article/f2af923b1ac54b55917f2304f69bb35e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/5561816","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5561816","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5561816.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3167228939.pdf","grobid_xml":"https://content.openalex.org/works/W3167228939.grobid-xml"},"referenced_works_count":79,"referenced_works":["https://openalex.org/W1465090524","https://openalex.org/W1587463760","https://openalex.org/W1589711726","https://openalex.org/W1642161394","https://openalex.org/W1831625788","https://openalex.org/W1975766232","https://openalex.org/W1983488804","https://openalex.org/W1986334900","https://openalex.org/W1993717606","https://openalex.org/W1996639403","https://openalex.org/W2000502642","https://openalex.org/W2001314672","https://openalex.org/W2018901966","https://openalex.org/W2020651442","https://openalex.org/W2034265047","https://openalex.org/W2042251274","https://openalex.org/W2064806155","https://openalex.org/W2066664409","https://openalex.org/W2078398370","https://openalex.org/W2098637805","https://openalex.org/W2103292786","https://openalex.org/W2105006174","https://openalex.org/W2122641792","https://openalex.org/W2140519269","https://openalex.org/W2146196597","https://openalex.org/W2146943412","https://openalex.org/W2148299746","https://openalex.org/W2156612354","https://openalex.org/W2157496457","https://openalex.org/W2163679388","https://openalex.org/W2165574575","https://openalex.org/W2328763899","https://openalex.org/W2332804323","https://openalex.org/W2340470859","https://openalex.org/W2342408547","https://openalex.org/W2342986212","https://openalex.org/W2399941526","https://openalex.org/W2473439651","https://openalex.org/W2507690097","https://openalex.org/W2510196049","https://openalex.org/W2514292692","https://openalex.org/W2552631155","https://openalex.org/W2553339901","https://openalex.org/W2568830032","https://openalex.org/W2578394146","https://openalex.org/W2587396378","https://openalex.org/W2593319564","https://openalex.org/W2612574117","https://openalex.org/W2708867732","https://openalex.org/W2734933926","https://openalex.org/W2762776925","https://openalex.org/W2768025005","https://openalex.org/W2900977498","https://openalex.org/W2902662365","https://openalex.org/W2926701059","https://openalex.org/W2928016897","https://openalex.org/W2937711216","https://openalex.org/W2947319230","https://openalex.org/W2950399464","https://openalex.org/W2961629612","https://openalex.org/W2980329246","https://openalex.org/W2991305957","https://openalex.org/W2997990748","https://openalex.org/W3001364574","https://openalex.org/W3033079786","https://openalex.org/W3033675321","https://openalex.org/W3043640246","https://openalex.org/W3045800130","https://openalex.org/W3090907207","https://openalex.org/W3094117827","https://openalex.org/W3098576337","https://openalex.org/W3108827348","https://openalex.org/W3130982961","https://openalex.org/W3142757756","https://openalex.org/W4300905509","https://openalex.org/W6636895364","https://openalex.org/W6638831772","https://openalex.org/W6681545543","https://openalex.org/W6686806119"],"related_works":["https://openalex.org/W2789681586","https://openalex.org/W2794361564","https://openalex.org/W4243392960","https://openalex.org/W3156820950","https://openalex.org/W4232791346","https://openalex.org/W2971069100","https://openalex.org/W2504553392","https://openalex.org/W2331509522","https://openalex.org/W2937748796","https://openalex.org/W2135210976"],"abstract_inverted_index":{"Now":[0],"a":[1,65,248],"day\u2019s":[2],"advancement":[3],"in":[4,120,163,209,272],"technology":[5],"increases":[6],"the":[7,17,27,34,39,50,53,57,86,96,103,134,140,149,164,173,188,195,252,258],"use":[8],"of":[9,29,41,61,68,100,130,133,144,151,166,175,190,194,244,260],"automation,":[10],"mobility,":[11],"smart":[12],"devices,":[13],"and":[14,26,32,48,63,72,80,82,98,114,127,142,153,160,183,192,205,215,242,246,269],"application":[15],"over":[16,52,251],"Internet":[18],"that":[19,217],"can":[20,46,218],"create":[21],"serious":[22],"problems":[23],"for":[24,70,95,108,148,179,187,239],"protection":[25],"privacy":[28],"digital":[30],"data":[31,51,132],"raised":[33],"global":[35],"security":[36,145,249],"issues.":[37],"Therefore,":[38],"necessity":[40],"intelligent":[42,263],"systems":[43],"or":[44,226],"techniques":[45,92,104,116,162,186,231],"prevent":[47],"protect":[49],"network.":[54,88,135,253],"Cyberattack":[55],"is":[56,138,170],"most":[58],"prominent":[59,196],"problem":[60],"cybersecurity":[62],"now":[64],"challenging":[66],"area":[67],"research":[69,228],"scientists":[71],"researchers.":[73],"These":[74],"attacks":[75],"may":[76,84],"destroy":[77],"data,":[78],"system,":[79],"resources":[81],"sometimes":[83],"damage":[85],"whole":[87],"Previously":[89],"numerous":[90],"traditional":[91],"were":[93],"used":[94],"detection":[97,150],"mitigation":[99],"cyberattack,":[101],"but":[102],"are":[105,117,207,233],"not":[106],"efficient":[107,125],"new":[109],"attacks.":[110],"Today\u2019s":[111],"machine":[112,158,184,203],"learning":[113,159,185],"metaheuristic":[115,177],"popularly":[118],"applied":[119,235],"different":[121,157,176,267],"areas":[122],"to":[123],"achieve":[124],"computation":[126],"fast":[128],"processing":[129],"complex":[131],"This":[136,168,211],"paper":[137,169],"discussing":[139],"improvements":[141],"enhancement":[143],"models,":[146],"frameworks":[147],"cyberattacks,":[152],"prevention":[154],"by":[155],"using":[156],"optimization":[161],"domain":[165],"cybersecurity.":[167],"focused":[171],"on":[172],"literature":[174,223],"algorithms":[178,197],"optimal":[180],"feature":[181],"selection":[182],"classification":[189],"attacks,":[191],"some":[193],"such":[198],"as":[199],"GA,":[200],"evolutionary,":[201],"PSO,":[202],"learning,":[204],"others":[206],"discussed":[208,232],"detail.":[210,273],"study":[212],"provides":[213],"descriptions":[214],"tutorials":[216],"be":[219],"referred":[220],"from":[221],"various":[222,261],"citations,":[224],"references,":[225],"latest":[227],"papers.":[229],"The":[230],"efficiently":[234],"with":[236],"high":[237],"performance":[238],"detection,":[240],"mitigation,":[241],"identification":[243],"cyberattacks":[245],"provide":[247],"mechanism":[250],"Hence,":[254],"this":[255],"survey":[256],"presents":[257],"description":[259],"existing":[262],"techniques,":[264],"attack":[265],"datasets,":[266],"observations,":[268],"comparative":[270],"studies":[271]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
