{"id":"https://openalex.org/W2045517003","doi":"https://doi.org/10.2298/csis130415035a","title":"Flow-based anomaly intrusion detection system using two neural network stages","display_name":"Flow-based anomaly intrusion detection system using two neural network stages","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2045517003","doi":"https://doi.org/10.2298/csis130415035a","mag":"2045517003"},"language":"en","primary_location":{"id":"doi:10.2298/csis130415035a","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis130415035a","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141400035A","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141400035A","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054175213","display_name":"Yousef Abuadlla","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yousef Abuadlla","raw_affiliation_strings":["School of Electrical Engineering, Belgrade"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Belgrade","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062006226","display_name":"Goran Kva\u0161\u010dev","orcid":"https://orcid.org/0000-0001-8642-0361"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Goran Kvascev","raw_affiliation_strings":["School of Electrical Engineering, Belgrade"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Belgrade","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039301259","display_name":"Slavko Gajin","orcid":"https://orcid.org/0000-0002-8939-3589"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Slavko Gajin","raw_affiliation_strings":["School of Electrical Engineering, Belgrade"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Belgrade","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010444361","display_name":"Zoran Jovanovi\u0107","orcid":"https://orcid.org/0000-0003-1727-4852"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zoran Jovanovic","raw_affiliation_strings":["School of Electrical Engineering, Belgrade"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Belgrade","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054175213"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.4481,"has_fulltext":true,"cited_by_count":44,"citation_normalized_percentile":{"value":0.93143535,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"2","first_page":"601","last_page":"622"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.894748330116272},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8190617561340332},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5842192769050598},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5602568984031677},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.549362063407898},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5056502819061279},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.45985087752342224},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.454480916261673},{"id":"https://openalex.org/keywords/flow-network","display_name":"Flow network","score":0.44738227128982544},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.36615872383117676},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32038530707359314},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2922397255897522},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1038162112236023}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.894748330116272},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8190617561340332},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5842192769050598},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5602568984031677},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.549362063407898},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5056502819061279},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45985087752342224},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.454480916261673},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.44738227128982544},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.36615872383117676},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32038530707359314},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2922397255897522},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1038162112236023},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2298/csis130415035a","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis130415035a","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141400035A","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:doiserbia:1820-02141400035A","is_oa":false,"landing_page_url":"http://doi.org/10.2298/CSIS130415035A","pdf_url":null,"source":{"id":"https://openalex.org/S4306400515","display_name":"Digital Object Identifier (DOI) Repository Serbia (National Library of Serbia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210142455","host_organization_name":"National Library of Serbia","host_organization_lineage":["https://openalex.org/I4210142455"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":". 11(2) 601-622"}],"best_oa_location":{"id":"doi:10.2298/csis130415035a","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis130415035a","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141400035A","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2045517003.pdf","grobid_xml":"https://content.openalex.org/works/W2045517003.grobid-xml"},"referenced_works_count":128,"referenced_works":["https://openalex.org/W32779056","https://openalex.org/W40890042","https://openalex.org/W91862604","https://openalex.org/W103634144","https://openalex.org/W109802382","https://openalex.org/W117981830","https://openalex.org/W125818563","https://openalex.org/W130548217","https://openalex.org/W576664164","https://openalex.org/W1496979250","https://openalex.org/W1516506771","https://openalex.org/W1529614846","https://openalex.org/W1538458095","https://openalex.org/W1542522493","https://openalex.org/W1551705282","https://openalex.org/W1569097456","https://openalex.org/W1576064560","https://openalex.org/W1586941149","https://openalex.org/W1590210340","https://openalex.org/W1590739294","https://openalex.org/W1603652346","https://openalex.org/W1642161394","https://openalex.org/W1698314624","https://openalex.org/W1738203895","https://openalex.org/W1825077972","https://openalex.org/W1891111920","https://openalex.org/W1952056635","https://openalex.org/W1964883112","https://openalex.org/W1971751469","https://openalex.org/W1974102697","https://openalex.org/W1980065740","https://openalex.org/W1982304603","https://openalex.org/W1988741337","https://openalex.org/W1988918299","https://openalex.org/W1995875735","https://openalex.org/W1997299558","https://openalex.org/W1999427165","https://openalex.org/W2008353316","https://openalex.org/W2008420372","https://openalex.org/W2012701999","https://openalex.org/W2031006315","https://openalex.org/W2034065435","https://openalex.org/W2039075288","https://openalex.org/W2043084056","https://openalex.org/W2050672458","https://openalex.org/W2053692906","https://openalex.org/W2056470605","https://openalex.org/W2058614926","https://openalex.org/W2062359435","https://openalex.org/W2065312802","https://openalex.org/W2068031829","https://openalex.org/W2072773743","https://openalex.org/W2075325892","https://openalex.org/W2078191206","https://openalex.org/W2079318510","https://openalex.org/W2081706040","https://openalex.org/W2087119637","https://openalex.org/W2095947041","https://openalex.org/W2096915403","https://openalex.org/W2098732343","https://openalex.org/W2099384706","https://openalex.org/W2099940443","https://openalex.org/W2103496339","https://openalex.org/W2110238613","https://openalex.org/W2110385611","https://openalex.org/W2113061123","https://openalex.org/W2114615295","https://openalex.org/W2114718230","https://openalex.org/W2119690221","https://openalex.org/W2120617515","https://openalex.org/W2122799296","https://openalex.org/W2125347499","https://openalex.org/W2126716398","https://openalex.org/W2129700391","https://openalex.org/W2131970275","https://openalex.org/W2134387601","https://openalex.org/W2136053377","https://openalex.org/W2136112593","https://openalex.org/W2138650149","https://openalex.org/W2139237456","https://openalex.org/W2139562214","https://openalex.org/W2141301886","https://openalex.org/W2143439191","https://openalex.org/W2144936818","https://openalex.org/W2146196597","https://openalex.org/W2149086123","https://openalex.org/W2149331048","https://openalex.org/W2150010995","https://openalex.org/W2150847526","https://openalex.org/W2153028064","https://openalex.org/W2154642048","https://openalex.org/W2155378438","https://openalex.org/W2155482699","https://openalex.org/W2157157130","https://openalex.org/W2157216842","https://openalex.org/W2157578436","https://openalex.org/W2158673492","https://openalex.org/W2158926605","https://openalex.org/W2160598920","https://openalex.org/W2161085373","https://openalex.org/W2161925864","https://openalex.org/W2163295856","https://openalex.org/W2163375756","https://openalex.org/W2163740425","https://openalex.org/W2164210932","https://openalex.org/W2167287136","https://openalex.org/W2168917894","https://openalex.org/W2169164008","https://openalex.org/W2170726951","https://openalex.org/W2171277043","https://openalex.org/W2171331105","https://openalex.org/W2255206882","https://openalex.org/W2293322640","https://openalex.org/W2532292920","https://openalex.org/W2766736793","https://openalex.org/W2809839462","https://openalex.org/W2901391803","https://openalex.org/W2970052061","https://openalex.org/W2983170364","https://openalex.org/W3105682467","https://openalex.org/W3214373139","https://openalex.org/W4233045210","https://openalex.org/W4241582622","https://openalex.org/W4242989628","https://openalex.org/W4243490088","https://openalex.org/W4285719527","https://openalex.org/W6674931827","https://openalex.org/W6681545543"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Computer":[0],"systems":[1,58],"and":[2,11,79,117,149,184,197,218],"networks":[3],"suffer":[4],"due":[5],"to":[6,14,49,192],"rapid":[7],"increase":[8],"of":[9,61,70,156,216,224],"attacks,":[10,168],"in":[12,120,129,150,214],"order":[13],"keep":[15],"them":[16],"safe":[17],"from":[18],"malicious":[19],"activities":[20],"or":[21,95,170],"policy":[22],"violations,":[23],"there":[24,144],"is":[25,113,145,161],"need":[26],"for":[27,115,163,201],"effective":[28],"security":[29],"monitoring":[30],"systems,":[31],"such":[32],"as":[33],"Intrusion":[34],"Detection":[35],"Systems":[36],"(IDS).":[37],"Many":[38],"researchers":[39],"concentrate":[40],"their":[41],"efforts":[42],"on":[43,66,81,111],"this":[44,99],"area":[45],"using":[46,105],"different":[47,176],"approaches":[48,63],"build":[50],"reliable":[51],"intrusion":[52,56,102],"detection":[53,57,103],"systems.":[54],"Flow-based":[55],"are":[59,76,172,212],"one":[60],"these":[62],"that":[64,132,151,208],"rely":[65],"aggregated":[67],"flow":[68],"statistics":[69],"network":[71,92,108,121,178,202],"traffic.":[72,122],"Their":[73],"main":[74],"advantages":[75],"host":[77],"independence":[78],"usability":[80],"high":[82],"speed":[83],"networks,":[84,188],"since":[85],"the":[86,130,139,154,190,198,209],"metrics":[87],"may":[88],"be":[89,134],"collected":[90],"by":[91],"device":[93],"hardware":[94],"standalone":[96],"probes.":[97],"In":[98],"paper,":[100],"an":[101],"system":[104],"two":[106],"neural":[107,177],"stages":[109],"based":[110],"flow-data":[112],"proposed":[114],"detecting":[116],"classifying":[118],"attacks":[119],"The":[123,158,204],"first":[124,159],"stage":[125,141,160],"detects":[126],"significant":[127],"changes":[128],"traffic":[131],"could":[133],"a":[135,146],"potential":[136],"attack,":[137],"while":[138],"second":[140],"defines":[142],"if":[143],"known":[147,169],"attack":[148],"case":[152],"classifies":[153],"type":[155],"attack.":[157],"crucial":[162],"selecting":[164],"time":[165,199],"windows":[166],"where":[167],"unknown,":[171],"more":[173],"probable.":[174],"Two":[175],"structures":[179],"have":[180],"been":[181],"used,":[182],"multilayer":[183],"radial":[185],"basis":[186],"function":[187],"with":[189,221],"objective":[191],"compare":[193],"performance,":[194],"memory":[195],"consumption":[196],"required":[200],"training.":[203],"experimental":[205],"results":[206],"demonstrate":[207],"designed":[210],"models":[211],"promising":[213],"terms":[215],"accuracy":[217],"computational":[219],"time,":[220],"low":[222],"probability":[223],"false":[225],"alarms.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
