{"id":"https://openalex.org/W4410376956","doi":"https://doi.org/10.32604/cmc.2025.064270","title":"Intelligent Detection of Abnormal Traffic Based on SCN-BiLSTM","display_name":"Intelligent Detection of Abnormal Traffic Based on SCN-BiLSTM","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410376956","doi":"https://doi.org/10.32604/cmc.2025.064270"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064270","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064270","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064270","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101917641","display_name":"Lulu Zhang","orcid":"https://orcid.org/0000-0002-5791-4167"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lulu Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100697401","display_name":"Xuehui Du","orcid":"https://orcid.org/0000-0002-4923-900X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuehui Du","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111433001","display_name":"Wenjuan Wang","orcid":"https://orcid.org/0000-0001-9180-2823"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenjuan Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006938082","display_name":"Yu Cao","orcid":"https://orcid.org/0000-0001-6494-3014"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu Cao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101740239","display_name":"Xiangyu Wu","orcid":"https://orcid.org/0000-0002-6607-1819"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiangyu Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5065697745","display_name":"Shihao Wang","orcid":"https://orcid.org/0000-0001-6152-3559"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shihao Wang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101917641"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12623717,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"1","first_page":"1901","last_page":"1919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.9419000148773193,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.9239000082015991,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4540572464466095},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3735191524028778}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4540572464466095},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3735191524028778}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064270","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064270","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064270","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064270","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2064675550","https://openalex.org/W2942292460","https://openalex.org/W2947802941","https://openalex.org/W3086638135","https://openalex.org/W3177795942","https://openalex.org/W3185895012","https://openalex.org/W3207580017","https://openalex.org/W4206268789","https://openalex.org/W4210743106","https://openalex.org/W4212986808","https://openalex.org/W4214699222","https://openalex.org/W4220844189","https://openalex.org/W4229003780","https://openalex.org/W4308194848","https://openalex.org/W4310701589","https://openalex.org/W4316591601","https://openalex.org/W4319997993","https://openalex.org/W4327705396","https://openalex.org/W4366606623","https://openalex.org/W4387007843","https://openalex.org/W4387458573","https://openalex.org/W4392940028"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"To":[0,127],"address":[1,128],"the":[2,91,104,121,131,140,143,159,163,176],"limitations":[3],"of":[4,95,123,142,168,179],"existing":[5,164],"abnormal":[6],"traffic":[7,96],"detection":[8,33,69,133],"methods,":[9],"such":[10],"as":[11],"insufficient":[12],"temporal":[13,108],"and":[14,25,48,65,68,117,171,173],"spatial":[15,93],"feature":[16,62],"extraction,":[17],"high":[18],"false":[19],"positive":[20],"rate":[21,178],"(FPR),":[22],"poor":[23],"generalization,":[24],"class":[26,129],"imbalance,":[27,130],"this":[28],"study":[29],"proposed":[30,160],"an":[31],"intelligent":[32],"method":[34,55,161],"that":[35,147,158],"combines":[36],"a":[37,61,66,77,83],"Stacked":[38],"Convolutional":[39,78],"Network":[40,80],"(SCN),":[41],"Bidirectional":[42],"Long":[43],"Short-Term":[44],"Memory":[45],"(BiLSTM)":[46],"network,":[47],"Equalization":[49],"Loss":[50],"v2":[51,137],"(EQL":[52],"v2).":[53],"This":[54],"was":[56,73,113],"divided":[57],"into":[58,103],"two":[59],"components:":[60],"extraction":[63,122],"model":[64,134],"classification":[67,132],"model.":[70],"First,":[71],"SCN":[72,116],"constructed":[74],"by":[75],"combining":[76],"Neural":[79],"(CNN)":[81],"with":[82],"Depthwise":[84],"Separable":[85],"Convolution":[86],"(DSC)":[87],"network":[88],"to":[89,106,119,138],"capture":[90,107],"abstract":[92],"features":[94,99],"data.":[97],"These":[98],"were":[100],"then":[101],"input":[102],"BiLSTM":[105,118],"dependencies.":[109],"An":[110],"attention":[111],"mechanism":[112],"incorporated":[114],"after":[115],"enhance":[120],"key":[124],"spatiotemporal":[125],"features.":[126],"applied":[135],"EQL":[136],"adjust":[139],"weights":[141],"minority":[144,180],"classes,":[145],"ensuring":[146],"they":[148],"received":[149],"equal":[150],"focus":[151],"during":[152],"training.":[153],"The":[154],"experimental":[155],"results":[156],"indicated":[157],"outperformed":[162],"methods":[165],"in":[166],"terms":[167],"accuracy,":[169],"FPR,":[170],"F1-score":[172],"significantly":[174],"improved":[175],"identification":[177],"classes.":[181]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
