{"id":"https://openalex.org/W4210853927","doi":"https://doi.org/10.12720/jcm.17.2.134-142","title":"IP Packaging Filtering in Computer Networks Using Artificial Intelligence in the Regulatory Authority of Electronic and Communications Kosovo","display_name":"IP Packaging Filtering in Computer Networks Using Artificial Intelligence in the Regulatory Authority of Electronic and Communications Kosovo","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4210853927","doi":"https://doi.org/10.12720/jcm.17.2.134-142"},"language":"en","primary_location":{"id":"doi:10.12720/jcm.17.2.134-142","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.17.2.134-142","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.12720/jcm.17.2.134-142","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050366657","display_name":"Kastriot D\u00ebrmaku","orcid":"https://orcid.org/0000-0002-6473-8288"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kastriot Dermaku","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097474966","display_name":"Liridon Hoti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liridon Hoti","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055001648","display_name":"Selami Klaiqi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Selami Klaiqi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5084190690","display_name":"Hifoblina Dermaku","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hifoblina Dermaku","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050366657"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49033725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"134","last_page":"142"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9628999829292297,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8305090069770813},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.6512038707733154},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5837850570678711},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5275556445121765},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5071110725402832},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.4719972610473633},{"id":"https://openalex.org/keywords/matlab","display_name":"MATLAB","score":0.41181015968322754},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4046250879764557},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.269684374332428},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1497916579246521},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09715551137924194},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.09427332878112793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8305090069770813},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.6512038707733154},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5837850570678711},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5275556445121765},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5071110725402832},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.4719972610473633},{"id":"https://openalex.org/C2780365114","wikidata":"https://www.wikidata.org/wiki/Q169478","display_name":"MATLAB","level":2,"score":0.41181015968322754},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4046250879764557},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.269684374332428},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1497916579246521},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09715551137924194},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.09427332878112793},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.12720/jcm.17.2.134-142","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.17.2.134-142","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.12720/jcm.17.2.134-142","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.17.2.134-142","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2364669875","https://openalex.org/W2367805574","https://openalex.org/W2961085424","https://openalex.org/W2374665966","https://openalex.org/W2382357074","https://openalex.org/W2348598194","https://openalex.org/W4306674287","https://openalex.org/W2388455374","https://openalex.org/W2386823416","https://openalex.org/W2386128257"],"abstract_inverted_index":{"The":[0],"security":[1,32],"of":[2,7,16,33,60,91,98,111,118,132],"our":[3],"data":[4],"is":[5,14,49,71,196],"one":[6,15],"the":[8,17,28,31,89,109,116,130,133,138,154,190,192],"most":[9],"important":[10],"challenges,":[11],"and":[12,37,54,146],"it":[13],"things":[18],"we":[19,25],"must":[20],"be":[21,76],"careful":[22],"about":[23],"what":[24],"display":[26],"on":[27,88,101],"Internet.":[29],"For":[30],"this":[34,82],"data,":[35],"computer":[36],"cyber":[38],"networking":[39],"experts":[40],"use":[41],"different":[42,162],"methods":[43,94],"to":[44],"prevent":[45],"these":[46,61],"attacks,":[47],"prevention":[48],"done":[50,77,87,158],"by":[51,56,135,182],"Firewall":[52],"techniques,":[53],"then":[55],"Router":[57],"where":[58,107,165,188],"both":[59],"cases":[62],"are":[63],"quite":[64,197],"popular":[65],"nowadays":[66],"today,":[67],"however,":[68],"another":[69],"innovation":[70],"that":[72],"filtering":[73,186,193],"can":[74],"also":[75],"through":[78,104,121],"Artificial":[79,92,105,136],"Intelligence.":[80],"In":[81],"paper,":[83],"research":[84,134],"has":[85],"been":[86],"application":[90],"Intelligence":[93,106],"such":[95],"as":[96,151,173,175],"those":[97],"deep":[99],"learning":[100],"IP":[102,163],"packages":[103],"specifically":[108],"method":[110],"Support":[112],"Vector":[113],"Machine":[114],"with":[115,185],"training":[117],"a":[119,122],"model":[120],"simulated":[123],"input":[124],"corpus,":[125],"using":[126],"MATLAB":[127],"software.":[128],"From":[129],"results":[131],"Intelligence,":[137],"source":[139],"address,":[140,142],"destination":[141],"port":[143],"number,":[144],"protocol":[145],"package":[147],"size":[148],"were":[149,168,178],"used":[150,169,179],"filters.":[152],"All":[153],"practical":[155],"work":[156],"was":[157],"in":[159,189],"over":[160],"350":[161],"addresses,":[164],"175":[166,176],"IPs":[167,177],"for":[170,180],"algorithm":[171],"training,":[172],"well":[174],"testing":[181],"combining":[183],"them":[184],"attributes,":[187],"end":[191],"accuracy":[194],"gained":[195],"high":[198],"(83%).":[199]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2022-02-09T00:00:00"}
