{"id":"https://openalex.org/W4416980949","doi":"https://doi.org/10.1186/s13677-025-00818-w","title":"FSEGM: feature selection and ensemble generative model for adaptive cloud security","display_name":"FSEGM: feature selection and ensemble generative model for adaptive cloud security","publication_year":2025,"publication_date":"2025-12-04","ids":{"openalex":"https://openalex.org/W4416980949","doi":"https://doi.org/10.1186/s13677-025-00818-w"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00818-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00818-w","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1186/s13677-025-00818-w","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011952981","display_name":"Chinmayee Rout","orcid":null},"institutions":[{"id":"https://openalex.org/I20791572","display_name":"Indira Gandhi Institute of Technology","ror":"https://ror.org/0010jkx06","country_code":"IN","type":"education","lineage":["https://openalex.org/I20791572"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Chinmayee Rout","raw_affiliation_strings":["Indira Gandhi Institute of Technology, Sarang (Utkal University), Sarang, India"],"affiliations":[{"raw_affiliation_string":"Indira Gandhi Institute of Technology, Sarang (Utkal University), Sarang, India","institution_ids":["https://openalex.org/I20791572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021606976","display_name":"Srinivas Sethi","orcid":"https://orcid.org/0000-0002-5130-2768"},"institutions":[{"id":"https://openalex.org/I20791572","display_name":"Indira Gandhi Institute of Technology","ror":"https://ror.org/0010jkx06","country_code":"IN","type":"education","lineage":["https://openalex.org/I20791572"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Srinivas Sethi","raw_affiliation_strings":["Indira Gandhi Institute of Technology, Sarang (Utkal University), Sarang, India"],"affiliations":[{"raw_affiliation_string":"Indira Gandhi Institute of Technology, Sarang (Utkal University), Sarang, India","institution_ids":["https://openalex.org/I20791572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026524680","display_name":"J. Chandrakanta Badajena","orcid":null},"institutions":[{"id":"https://openalex.org/I4400600923","display_name":"Odisha University of Technology and Research","ror":"https://ror.org/031jmyr19","country_code":null,"type":"education","lineage":["https://openalex.org/I4400600923"]},{"id":"https://openalex.org/I13567498","display_name":"Odisha University of Agriculture and Technology","ror":"https://ror.org/03tg0z446","country_code":"IN","type":"education","lineage":["https://openalex.org/I13567498"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"J. Chandrakanta Badajena","raw_affiliation_strings":["Odisha University of Technology and Research, Bhubaneswar, India"],"affiliations":[{"raw_affiliation_string":"Odisha University of Technology and Research, Bhubaneswar, India","institution_ids":["https://openalex.org/I13567498","https://openalex.org/I4400600923"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002607507","display_name":"Ramesh K. Sahoo","orcid":"https://orcid.org/0000-0001-5623-8446"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ramesh Kumar Sahoo","raw_affiliation_strings":["Birla Global University, Bhubaneswar, Odisha, India"],"affiliations":[{"raw_affiliation_string":"Birla Global University, Bhubaneswar, Odisha, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011952981"],"corresponding_institution_ids":["https://openalex.org/I20791572"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":1.5781,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89251639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9277999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9277999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6100000143051147},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6039999723434448},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5117999911308289},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.4887999892234802},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.4729999899864197},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.46470001339912415},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.40560001134872437},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.37450000643730164},{"id":"https://openalex.org/keywords/bayes-theorem","display_name":"Bayes' theorem","score":0.37059998512268066},{"id":"https://openalex.org/keywords/ensemble-forecasting","display_name":"Ensemble forecasting","score":0.3474999964237213}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7253999710083008},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6100000143051147},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6039999723434448},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5831000208854675},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.541100025177002},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5117999911308289},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.4887999892234802},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4884999990463257},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.4729999899864197},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.46470001339912415},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.40560001134872437},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.37450000643730164},{"id":"https://openalex.org/C207201462","wikidata":"https://www.wikidata.org/wiki/Q182505","display_name":"Bayes' theorem","level":3,"score":0.37059998512268066},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.3474999964237213},{"id":"https://openalex.org/C2776839635","wikidata":"https://www.wikidata.org/wiki/Q14942679","display_name":"Random tree","level":4,"score":0.329800009727478},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.3249000012874603},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.3231000006198883},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.3125999867916107},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3125},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3025999963283539},{"id":"https://openalex.org/C177769412","wikidata":"https://www.wikidata.org/wiki/Q278090","display_name":"Prior probability","level":3,"score":0.28940001130104065},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.28040000796318054},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C93959086","wikidata":"https://www.wikidata.org/wiki/Q6888345","display_name":"Model selection","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.25270000100135803},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00818-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00818-w","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0bf127534f204d13940a13e1c64517be","is_oa":true,"landing_page_url":"https://doaj.org/article/0bf127534f204d13940a13e1c64517be","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 15, Iss 1, Pp 1-29 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00818-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00818-w","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W2791756253","https://openalex.org/W2899191278","https://openalex.org/W2977634018","https://openalex.org/W2981094074","https://openalex.org/W2987273375","https://openalex.org/W2989622188","https://openalex.org/W2990352665","https://openalex.org/W3014732532","https://openalex.org/W3034667690","https://openalex.org/W3043844898","https://openalex.org/W3094908868","https://openalex.org/W3131010053","https://openalex.org/W3162620147","https://openalex.org/W3164321464","https://openalex.org/W3199041797","https://openalex.org/W4205136287","https://openalex.org/W4220922367","https://openalex.org/W4281295043","https://openalex.org/W4295788744","https://openalex.org/W4295832059","https://openalex.org/W4317811086","https://openalex.org/W4320029347","https://openalex.org/W4327736930","https://openalex.org/W4365816927","https://openalex.org/W4378575886","https://openalex.org/W4382138812","https://openalex.org/W4386134148","https://openalex.org/W4386255686","https://openalex.org/W4387172140","https://openalex.org/W4388326161","https://openalex.org/W4388451370","https://openalex.org/W4399073090","https://openalex.org/W4402936492","https://openalex.org/W4403605016","https://openalex.org/W4403937073","https://openalex.org/W4405365287","https://openalex.org/W4405499124","https://openalex.org/W4405865604","https://openalex.org/W4409916028"],"related_works":[],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDS)":[3],"are":[4],"crucial":[5],"to":[6,33,60,126],"secure":[7],"cloud-based":[8],"infrastructures":[9],"from":[10,130],"ever-evolving":[11],"cyber-attacks.":[12],"However,":[13],"traditional":[14,200],"IDS":[15,49],"models":[16,59,180],"struggle":[17],"with":[18,115,159],"issues":[19],"such":[20,202],"as":[21,203],"redundant":[22],"features,":[23],"ineffective":[24],"attack":[25,134],"classification,":[26],"and":[27,43,56,64,79,112,144,215,223,232],"outdated":[28],"datasets,":[29],"limiting":[30],"their":[31],"adaptability":[32],"emerging":[34],"cyber":[35,228],"threats.":[36],"This":[37,68],"paper":[38],"presents":[39],"FSEGM":[40,175],"(Feature":[41],"Selection":[42],"Ensemble":[44],"Generative":[45],"Model),":[46],"an":[47,95],"advanced":[48],"framework":[50,70],"that":[51,172],"integrates":[52],"both":[53,198],"feature":[54,86],"selection":[55],"ensemble":[57,96],"generative":[58,120],"improve":[61],"the":[62,153,160,173,220],"efficiency":[63],"accuracy":[65],"of":[66],"detection.":[67,168],"proposed":[69,154,174],"follows":[71],"a":[72,76,163],"multi-stage":[73],"methodology:":[74],"first,":[75],"stepwise":[77],"forward":[78],"backward":[80],"elimination":[81],"algorithm":[82],"is":[83,99,123],"employed":[84],"for":[85,147,152,165],"selection,":[87],"reducing":[88],"dimensionality":[89],"while":[90,192],"preserving":[91],"essential":[92],"information.":[93],"Next,":[94],"classification":[97],"approach":[98],"applied,":[100],"combining":[101],"several":[102],"methods,":[103],"including":[104,210],"Decision":[105,193],"Tree":[106,194],"(J48),":[107],"Random":[108,110,186],"Forest,":[109],"Tree,":[111],"Na\u00efve":[113,204],"Bayes":[114,205],"Attribute":[116],"Penalization":[117],"(NBPA).":[118],"A":[119],"learning":[121],"technique":[122],"then":[124],"used":[125],"merge":[127],"probability":[128],"distributions":[129],"base":[131],"classifiers,":[132],"improving":[133],"recognition.":[135],"The":[136,169,185],"final":[137],"response":[138],"phase":[139],"categorizes":[140],"threats":[141],"into":[142],"misuse-based":[143],"anomaly-based":[145],"activities":[146],"proactive":[148],"mitigation.":[149],"Experimental":[150],"investigations":[151],"model":[155],"were":[156],"carried":[157],"out":[158],"CIC-IDS2017":[161],"dataset,":[162],"benchmark":[164],"network":[166],"intrusion":[167],"results":[170],"demonstrate":[171],"method":[176],"significantly":[177],"outperforms":[178],"state-of-the-art":[179],"across":[181],"multiple":[182],"evaluation":[183],"metrics.":[184],"Forest":[187],"classifier":[188],"achieved":[189],"98.99%":[190],"accuracy,":[191],"(J48)":[195],"reached":[196],"99.17%,":[197],"surpassing":[199],"approaches":[201],"(73.01%).":[206],"Additional":[207],"performance":[208],"measures,":[209],"precision":[211],"(0.959),":[212],"recall":[213],"(0.938),":[214],"ROC":[216],"Area":[217],"(0.994),":[218],"confirm":[219],"model\u2019s":[221],"reliability":[222],"robustness":[224],"in":[225],"identifying":[226],"diverse":[227],"threats,":[229],"particularly":[230],"DoS":[231],"PortScan":[233],"attacks.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-12-04T00:00:00"}
