{"id":"https://openalex.org/W2949569885","doi":"https://doi.org/10.3233/jifs-179197","title":"Optimal design of hadoop intrusion detection system based on neural network boosting algorithms","display_name":"Optimal design of hadoop intrusion detection system based on neural network boosting algorithms","publication_year":2019,"publication_date":"2019-06-11","ids":{"openalex":"https://openalex.org/W2949569885","doi":"https://doi.org/10.3233/jifs-179197","mag":"2949569885"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-179197","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-179197","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114860677","display_name":"Yan\u2010Song Liu","orcid":"https://orcid.org/0000-0002-5361-4212"},"institutions":[{"id":"https://openalex.org/I4210097214","display_name":"Shandong Management University","ror":"https://ror.org/00vzprm14","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210097214"]},{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu Yansong","raw_affiliation_strings":["Shandong Management University, Jinan, China","X\u00edan Jiao Tong University, X\u00edan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Management University, Jinan, China","institution_ids":["https://openalex.org/I4210097214"]},{"raw_affiliation_string":"X\u00edan Jiao Tong University, X\u00edan, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100380625","display_name":"Zhu Li","orcid":"https://orcid.org/0000-0002-8246-177X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhu Li","raw_affiliation_strings":["X\u00edan Jiao Tong University, X\u00edan, China"],"affiliations":[{"raw_affiliation_string":"X\u00edan Jiao Tong University, X\u00edan, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100415227","display_name":"Feng Liu","orcid":"https://orcid.org/0000-0001-9435-2098"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]},{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu Feng","raw_affiliation_strings":["Central South University, Changsha, China","University of Jinan, School of Software, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"University of Jinan, School of Software, Jinan, China","institution_ids":["https://openalex.org/I34949971"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100380625"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0687778,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"37","issue":"5","first_page":"6127","last_page":"6138"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.8356460332870483},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.823427140712738},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7141676545143127},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6416359543800354},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45997026562690735},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4458591341972351},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43177181482315063}],"concepts":[{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.8356460332870483},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.823427140712738},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7141676545143127},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6416359543800354},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45997026562690735},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4458591341972351},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43177181482315063}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-179197","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-179197","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.47999998927116394,"display_name":"Climate action"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W768765635","https://openalex.org/W962268279","https://openalex.org/W1499516487","https://openalex.org/W1979058236","https://openalex.org/W1983752416","https://openalex.org/W1986480561","https://openalex.org/W1987381312","https://openalex.org/W1990257170","https://openalex.org/W2033558816","https://openalex.org/W2036279382","https://openalex.org/W2058294246","https://openalex.org/W2064195420","https://openalex.org/W2090220299","https://openalex.org/W2237432403","https://openalex.org/W2295894764","https://openalex.org/W2330776402","https://openalex.org/W2378031214","https://openalex.org/W2495383427","https://openalex.org/W2518835065","https://openalex.org/W6658725366"],"related_works":["https://openalex.org/W2125652721","https://openalex.org/W1540371141","https://openalex.org/W1549363203","https://openalex.org/W4231274751","https://openalex.org/W3082059448","https://openalex.org/W4313640622","https://openalex.org/W2364419519","https://openalex.org/W2017948608","https://openalex.org/W2360767377","https://openalex.org/W2360951146"],"abstract_inverted_index":{"The":[0,51,76,111,154],"security":[1,12,32],"of":[2,10,17,23,33,54,63,107,118,151,176],"massive":[3,34],"data":[4,18],"has":[5,91],"always":[6],"been":[7],"the":[8,15,20,30,81,99,105,108,115,124,128,133,138,141,147,158,167],"focus":[9],"computer":[11],"research.":[13],"With":[14],"increase":[16],"storage,":[19],"computing":[21,42,46,60,120,135],"platform":[22,43,61,121],"single":[24],"node":[25,71,90],"can":[26],"not":[27],"deal":[28],"with":[29],"increasing":[31],"data.":[35],"It":[36],"is":[37,143,162],"urgent":[38],"to":[39,44,122,145,165],"use":[40],"distributed":[41,119],"improve":[45,146],"efficiency":[47,148],"and":[48,72,102,127,149,170],"detection":[49,56,84,93,160],"accuracy.":[50],"physical":[52],"deployment":[53],"intrusion":[55,83,152,159,177],"system":[57,85,169],"on":[58,87],"cloud":[59,89,134],"consists":[62],"monitoring":[64],"server,":[65,68,70],"Hadoop":[66,88,116],"master":[67],"IDS":[69,73],"terminal":[74],"management.":[75],"experimental":[77],"results":[78,155],"show":[79,156],"that":[80,157],"proposed":[82],"based":[86],"better":[92],"effect.":[94],"This":[95],"paper":[96],"searches":[97],"for":[98],"optimal":[100],"weights,":[101],"then":[103],"begins":[104],"training":[106],"neural":[109,129],"network.":[110],"whole":[112],"process":[113],"uses":[114],"framework":[117],"implement":[123],"genetic":[125],"algorithm":[126,131,142],"network":[130],"in":[132],"platform.":[136],"At":[137],"same":[139],"time,":[140],"improved":[144],"accuracy":[150],"detection.":[153],"technology":[161],"very":[163],"effective":[164],"protect":[166],"application":[168],"help":[171],"it":[172],"against":[173],"various":[174],"types":[175],"attacks.":[178]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
