{"id":"https://openalex.org/W3036420809","doi":"https://doi.org/10.1186/s42400-020-00053-7","title":"Conceptualisation of Cyberattack prediction with deep learning","display_name":"Conceptualisation of Cyberattack prediction with deep learning","publication_year":2020,"publication_date":"2020-06-17","ids":{"openalex":"https://openalex.org/W3036420809","doi":"https://doi.org/10.1186/s42400-020-00053-7","mag":"3036420809"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-020-00053-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00053-7","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00053-7","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00053-7","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073639644","display_name":"Ayei E. Ibor","orcid":"https://orcid.org/0000-0002-4083-454X"},"institutions":[{"id":"https://openalex.org/I3970730","display_name":"University of Calabar","ror":"https://ror.org/05qderh61","country_code":"NG","type":"education","lineage":["https://openalex.org/I3970730"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Ayei E. Ibor","raw_affiliation_strings":["Department of Computer Science, University of Calabar, Calabar, Nigeria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calabar, Calabar, Nigeria","institution_ids":["https://openalex.org/I3970730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057692249","display_name":"Florence A. Oladeji","orcid":null},"institutions":[{"id":"https://openalex.org/I197610006","display_name":"University of Lagos","ror":"https://ror.org/05rk03822","country_code":"NG","type":"education","lineage":["https://openalex.org/I197610006"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Florence A. Oladeji","raw_affiliation_strings":["Department of Computer Sciences, University of Lagos, Lagos, Nigeria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, University of Lagos, Lagos, Nigeria","institution_ids":["https://openalex.org/I197610006"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073687869","display_name":"Olusoji B. Okunoye","orcid":"https://orcid.org/0000-0002-3472-4520"},"institutions":[{"id":"https://openalex.org/I197610006","display_name":"University of Lagos","ror":"https://ror.org/05rk03822","country_code":"NG","type":"education","lineage":["https://openalex.org/I197610006"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Olusoji B. Okunoye","raw_affiliation_strings":["Department of Computer Sciences, University of Lagos, Lagos, Nigeria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, University of Lagos, Lagos, Nigeria","institution_ids":["https://openalex.org/I197610006"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110229182","display_name":"Obeten O. Ekabua","orcid":null},"institutions":[{"id":"https://openalex.org/I3970730","display_name":"University of Calabar","ror":"https://ror.org/05qderh61","country_code":"NG","type":"education","lineage":["https://openalex.org/I3970730"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Obeten O. Ekabua","raw_affiliation_strings":["Department of Computer Science, University of Calabar, Calabar, Nigeria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calabar, Calabar, Nigeria","institution_ids":["https://openalex.org/I3970730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073639644"],"corresponding_institution_ids":["https://openalex.org/I3970730"],"apc_list":null,"apc_paid":null,"fwci":2.267,"has_fulltext":true,"cited_by_count":27,"citation_normalized_percentile":{"value":0.88790047,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"3","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7922910451889038},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6774877309799194},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6006326675415039},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5819138884544373},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.5515730381011963},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.5467421412467957},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4798109829425812},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.46111392974853516},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4276285171508789}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7922910451889038},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6774877309799194},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6006326675415039},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5819138884544373},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.5515730381011963},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.5467421412467957},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4798109829425812},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.46111392974853516},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4276285171508789},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-020-00053-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00053-7","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00053-7","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a9ac143f9dc04dc6819f779b15689f2a","is_oa":true,"landing_page_url":"https://doaj.org/article/a9ac143f9dc04dc6819f779b15689f2a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 3, Iss 1, Pp 1-14 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-020-00053-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00053-7","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00053-7","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3036420809.pdf","grobid_xml":"https://content.openalex.org/works/W3036420809.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W2032345158","https://openalex.org/W2036695131","https://openalex.org/W2076063813","https://openalex.org/W2150341604","https://openalex.org/W2160841769","https://openalex.org/W2197538184","https://openalex.org/W2252815174","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2340896621","https://openalex.org/W2432038293","https://openalex.org/W2462597051","https://openalex.org/W2508015754","https://openalex.org/W2529525882","https://openalex.org/W2557283755","https://openalex.org/W2565637284","https://openalex.org/W2597441556","https://openalex.org/W2625602624","https://openalex.org/W2732560875","https://openalex.org/W2743483681","https://openalex.org/W2747715470","https://openalex.org/W2751399725","https://openalex.org/W2762776925","https://openalex.org/W2780584094","https://openalex.org/W2783741806","https://openalex.org/W2789828921","https://openalex.org/W2792643794","https://openalex.org/W2890474333","https://openalex.org/W2891432086","https://openalex.org/W2913446593","https://openalex.org/W2919115771","https://openalex.org/W2921134108","https://openalex.org/W2921364842","https://openalex.org/W2926701059","https://openalex.org/W2939745396","https://openalex.org/W2944643572","https://openalex.org/W2953384591","https://openalex.org/W2953448948","https://openalex.org/W2962829655","https://openalex.org/W2969482453","https://openalex.org/W2978631110","https://openalex.org/W3100503250","https://openalex.org/W4205947740","https://openalex.org/W6713134421"],"related_works":["https://openalex.org/W4380075502","https://openalex.org/W4223943233","https://openalex.org/W4312200629","https://openalex.org/W4360585206","https://openalex.org/W4364306694","https://openalex.org/W4380086463","https://openalex.org/W4225161397","https://openalex.org/W3014300295","https://openalex.org/W3164822677","https://openalex.org/W2795261237"],"abstract_inverted_index":{"Abstract":[0],"The":[1,195,222],"state":[2],"of":[3,16,33,45,118,163,190,198,217],"the":[4,9,53,60,114,140,156,160,181,199,210],"cyberspace":[5],"portends":[6],"uncertainty":[7],"for":[8,39,55,184],"future":[10],"Internet":[11],"and":[12,49,66,100,124,192,207,228],"its":[13,104],"accelerated":[14],"number":[15],"users.":[17],"New":[18],"paradigms":[19],"add":[20],"more":[21],"concerns":[22],"with":[23],"big":[24],"data":[25,72,116],"collected":[26],"through":[27],"device":[28],"sensors":[29],"divulging":[30],"large":[31],"amounts":[32],"information,":[34],"which":[35,68,80],"can":[36,109],"be":[37,110],"used":[38],"targeted":[40],"attacks.":[41],"Though":[42],"a":[43,136,147,164,173,188,215,232],"plethora":[44],"extant":[46],"approaches,":[47],"models":[48,65],"algorithms":[50],"have":[51],"provided":[52],"basis":[54],"cyberattack":[56,133],"predictions,":[57],"there":[58],"is":[59,81,224],"need":[61],"to":[62,121,213],"consider":[63],"new":[64,148],"algorithms,":[67],"are":[69],"based":[70],"on":[71,231],"representations":[73,117],"other":[74],"than":[75],"task-specific":[76],"techniques.":[77],"Deep":[78],"learning,":[79,85],"underpinned":[82],"by":[83],"representation":[84],"has":[86],"found":[87],"widespread":[88],"relevance":[89],"in":[90,159,187],"computer":[91],"vision,":[92],"speech":[93],"recognition,":[94,99],"natural":[95],"language":[96],"processing,":[97],"audio":[98],"drug":[101],"design.":[102],"However,":[103],"non-linear":[105],"information":[106],"processing":[107],"architecture":[108,143],"adapted":[111],"towards":[112],"learning":[113,142,176],"different":[115],"network":[119,126],"traffic":[120],"classify":[122],"benign":[123,191],"malicious":[125],"packets.":[127],"In":[128],"this":[129],"paper,":[130],"we":[131],"model":[132,149,200,223,244],"prediction":[134],"as":[135,155],"classification":[137],"problem.":[138],"Furthermore,":[139],"deep":[141,165],"was":[144],"co-opted":[145],"into":[146],"using":[150,226],"rectified":[151],"linear":[152],"units":[153],"(ReLU)":[154],"activation":[157],"function":[158],"hidden":[161],"layers":[162],"feed":[166],"forward":[167],"neural":[168],"network.":[169],"Our":[170],"approach":[171],"achieves":[172],"greedy":[174],"layer-by-layer":[175],"process":[177],"that":[178,242],"best":[179],"represents":[180],"features":[182],"useful":[183],"predicting":[185],"cyberattacks":[186],"dataset":[189],"malign":[193],"traffic.":[194],"underlying":[196],"algorithm":[197],"also":[201],"performs":[202],"feature":[203],"selection,":[204],"dimensionality":[205],"reduction,":[206],"clustering":[208],"at":[209],"initial":[211],"stage,":[212],"generate":[214],"set":[216],"input":[218],"vectors":[219],"called":[220],"hyper-features.":[221],"evaluated":[225],"CICIDS2017":[227],"UNSW_NB15":[229],"datasets":[230],"Python":[233],"environment":[234],"test":[235],"bed.":[236],"Results":[237],"obtained":[238],"from":[239],"experimentation":[240],"show":[241],"our":[243],"demonstrates":[245],"superior":[246],"performance":[247],"over":[248],"similar":[249],"models.":[250]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
