{"id":"https://openalex.org/W4311938756","doi":"https://doi.org/10.1186/s13677-022-00361-y","title":"NIDD: an intelligent network intrusion detection model for nursing homes","display_name":"NIDD: an intelligent network intrusion detection model for nursing homes","publication_year":2022,"publication_date":"2022-12-08","ids":{"openalex":"https://openalex.org/W4311938756","doi":"https://doi.org/10.1186/s13677-022-00361-y"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-022-00361-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00361-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00361-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00361-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109234652","display_name":"Feng Zhou","orcid":"https://orcid.org/0000-0001-5810-701X"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Zhou","raw_affiliation_strings":["Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040636728","display_name":"Xin Du","orcid":"https://orcid.org/0000-0002-6215-9733"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Du","raw_affiliation_strings":["Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100625305","display_name":"Wenli Li","orcid":"https://orcid.org/0000-0002-5586-9120"},"institutions":[{"id":"https://openalex.org/I182722699","display_name":"Shenzhen Polytechnic","ror":"https://ror.org/00d2w9g53","country_code":"CN","type":"education","lineage":["https://openalex.org/I182722699"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenli Li","raw_affiliation_strings":["Shenzhen Polytechnic, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Polytechnic, Shenzhen, China","institution_ids":["https://openalex.org/I182722699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047344828","display_name":"Zhihui Lu","orcid":"https://orcid.org/0000-0001-5706-7503"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihui Lu","raw_affiliation_strings":["Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100724763","display_name":"Jie Ying Wu","orcid":"https://orcid.org/0000-0002-7306-8140"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Wu","raw_affiliation_strings":["Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100625305"],"corresponding_institution_ids":["https://openalex.org/I182722699"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":1.9978,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.87098057,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9656000137329102,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8145390748977661},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6185100078582764},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5828861594200134},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5089550018310547},{"id":"https://openalex.org/keywords/gradient-boosting","display_name":"Gradient boosting","score":0.5008702278137207},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.48589175939559937},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.4733034670352936},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.426542729139328},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3791857659816742},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12761536240577698}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8145390748977661},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6185100078582764},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5828861594200134},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5089550018310547},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.5008702278137207},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48589175939559937},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.4733034670352936},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.426542729139328},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3791857659816742},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12761536240577698},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-022-00361-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00361-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00361-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5d52620958ed40eca646c2fdbc3afaaa","is_oa":true,"landing_page_url":"https://doaj.org/article/5d52620958ed40eca646c2fdbc3afaaa","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-17 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-022-00361-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00361-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00361-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5906920483","display_name":null,"funder_award_id":"61873309","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G612673205","display_name":null,"funder_award_id":"2019YFB1405000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G901593827","display_name":null,"funder_award_id":"6187330","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4311938756.pdf","grobid_xml":"https://content.openalex.org/works/W4311938756.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W2111072639","https://openalex.org/W2135248726","https://openalex.org/W2295598076","https://openalex.org/W2591788621","https://openalex.org/W2766296277","https://openalex.org/W2840169530","https://openalex.org/W2941914242","https://openalex.org/W2945710360","https://openalex.org/W2963684088","https://openalex.org/W2964050365","https://openalex.org/W2974559344","https://openalex.org/W2982676361","https://openalex.org/W3019959491","https://openalex.org/W3096831136","https://openalex.org/W3110547954","https://openalex.org/W3141436557","https://openalex.org/W4213311783","https://openalex.org/W4291178412"],"related_works":["https://openalex.org/W2967733078","https://openalex.org/W3204430031","https://openalex.org/W3137904399","https://openalex.org/W4310492845","https://openalex.org/W2885778889","https://openalex.org/W2766514146","https://openalex.org/W2885516856","https://openalex.org/W4289703016","https://openalex.org/W3094138326","https://openalex.org/W4310224730"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"nursing":[2,273],"homes":[3],"using":[4],"technologies":[5],"such":[6,23],"as":[7,24,144],"IoT,":[8],"big":[9],"data,":[10],"cloud":[11,44,64,277,288],"computing,":[12],"and":[13,34,42,62,103,127,152,174,238,275,279,286],"machine":[14],"learning,":[15],"there":[16],"is":[17,52],"a":[18,293],"constant":[19],"risk":[20],"of":[21,121,170,195,244],"attacks":[22,240],"Brute":[25,28,224,227],"Force":[26,29,225,228],"FTP,":[27,226],"SSH,":[30,229],"Web":[31,232],"Attack,":[32,233],"Infiltration,":[33,234],"Botnet":[35],"during":[36],"data":[37,51,56,69,126,268,281],"communication":[38,50,57,73,269],"between":[39,59,271],"individual":[40,60],"terminals":[41,61],"the":[43,63,68,118,122,130,137,145,150,156,168,171,176,181,187,191,204,212,249,253,262,267,272,276,280,283,287],"server.":[45,65,289],"Therefore,":[46],"effectively":[47,128],"identifying":[48],"network":[49,95,196],"essential":[53],"to":[54,148,154,166,180],"protect":[55],"security":[58,74,270,291],"Aiming":[66],"at":[67],"mentioned":[70],"above":[71],"regarding":[72],"issues,":[75],"we":[76,135,185,247],"propose":[77],"an":[78,242],"intelligent":[79,192],"intrusion":[80,157],"detection":[81,158,193],"model":[82,88,110,177,189,194,214,251,264],"NIDD":[83,109,213,250,263],"(Network":[84],"Intelligent":[85],"Data":[86],"Detection)":[87],"that":[89,211,261],"combines":[90],"deep":[91],"convolution":[92],"generation":[93],"adversarial":[94],"(DCGAN)":[96],"with":[97,241],"Light":[98,138,218],"Gradient":[99,139,219],"Boosting":[100,140,220],"Machine":[101,141,221],"(LightGBM)":[102,142],"Shapley":[104,162],"Additive":[105,163],"exPlanations":[106,164],"(SHAP).":[107],"The":[108,207,256],"first":[111],"generates":[112],"new":[113],"attack":[114,124,132],"samples":[115],"by":[116],"learning":[117],"feature":[119],"distribution":[120],"existing":[123],"sample":[125],"expands":[129],"rare":[131],"samples.":[133],"Secondly,":[134],"use":[136,161],"algorithm":[143],"base":[146],"classifier":[147],"train":[149],"dataset":[151],"start":[153],"build":[155],"model.":[159],"Then":[160],"(SHAP)":[165],"analyze":[167],"contribution":[169],"classification":[172],"results,":[173],"adjust":[175],"parameters":[178],"according":[179],"analysis":[182],"results.":[183],"Finally,":[184,246],"obtain":[186],"optimal":[188],"for":[190],"intrusion.":[197],"This":[198],"paper":[199],"conducts":[200],"experimental":[201,208],"tests":[202],"on":[203,217,252],"NSL-KDD":[205],"dataset.":[206,255],"results":[209,257],"show":[210],"built":[215],"based":[216],"can":[222],"detect":[223],"DoS,":[230],"Heartbleed,":[231],"Botnet,":[235],"PROBE,":[236],"R2L,":[237],"U2R":[239],"accuracy":[243],"99.76%.":[245],"re-verified":[248],"CIC-IDC-2018":[254],"once":[258],"again":[259],"proved":[260],"could":[265],"solve":[266],"robot":[274],"server":[278],"before":[282],"IoT":[284],"terminal":[285],"Communication":[290],"provides":[292],"sufficient":[294],"guarantee.":[295]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
