{"id":"https://openalex.org/W4412188537","doi":"https://doi.org/10.32604/cmc.2025.063451","title":"A Hybrid Feature Selection Method for Advanced Persistent Threat Detection","display_name":"A Hybrid Feature Selection Method for Advanced Persistent Threat Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412188537","doi":"https://doi.org/10.32604/cmc.2025.063451"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.063451","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063451","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.063451","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103864724","display_name":"Adam Khalid","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Adam Khalid","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062591167","display_name":"Anazida Zainal","orcid":"https://orcid.org/0000-0003-0022-3039"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anazida Zainal","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043834125","display_name":"Fuad A. Ghaleb","orcid":"https://orcid.org/0000-0002-1468-0655"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fuad A. Ghaleb","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116438305","display_name":"Bander Ali Saleh Al-rimy","orcid":"https://orcid.org/0009-0004-0935-1533"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bander Ali Saleh Al-rimy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5022300884","display_name":"Yussuf Ahmed","orcid":"https://orcid.org/0000-0003-4079-9243"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yussuf Ahmed","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103864724"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.1486,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.9208418,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"84","issue":"3","first_page":"5665","last_page":"5691"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9510999917984009,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.704750657081604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6144484281539917},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5681182146072388},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5395898222923279},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4433022141456604},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3878442943096161},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32102394104003906}],"concepts":[{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.704750657081604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6144484281539917},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5681182146072388},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5395898222923279},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4433022141456604},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3878442943096161},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32102394104003906},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.32604/cmc.2025.063451","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063451","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},{"id":"pmh:oai:www.open-access.bcu.ac.uk:16509","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402654","display_name":"BCU Open Access Repository (Birmingham City University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I12870472","host_organization_name":"Birmingham City University","host_organization_lineage":["https://openalex.org/I12870472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.063451","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063451","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.7400000095367432,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4205762803","https://openalex.org/W2535856026","https://openalex.org/W2265065644","https://openalex.org/W3147584709","https://openalex.org/W2134699697","https://openalex.org/W3017188156","https://openalex.org/W2322875716","https://openalex.org/W2961085424","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"Advanced":[0],"Persistent":[1],"Threats":[2],"(APTs)":[3],"represent":[4],"one":[5],"of":[6,13,31,86,141],"the":[7,83,87,122,136,142,155,182,197,206,224],"most":[8,123],"complex":[9],"and":[10,22,97,108,117,139,169,214,235,243,251],"dangerous":[11],"categories":[12],"cyber-attacks":[14],"characterised":[15],"by":[16,78],"their":[17,50],"stealthy":[18],"behaviour,":[19],"long-term":[20],"persistence,":[21],"ability":[23],"to":[24,74,103,153,174,192,230],"bypass":[25],"traditional":[26],"detection":[27,77,143,189],"systems.":[28],"The":[29,178,201,218],"complexity":[30],"real-world":[32,148],"network":[33],"data":[34],"poses":[35],"significant":[36],"challenges":[37],"in":[38,46,240,257],"detection.":[39],"Machine":[40,165],"learning":[41],"models":[42,194],"have":[43],"shown":[44],"promise":[45],"detecting":[47],"APTs;":[48],"however,":[49],"performance":[51],"often":[52],"suffers":[53],"when":[54],"trained":[55,195],"on":[56,146,196],"large":[57],"datasets":[58,150],"with":[59,209],"redundant":[60],"or":[61],"irrelevant":[62],"features.":[63],"This":[64,128,246],"study":[65],"presents":[66],"a":[67,147,233,249],"novel,":[68],"hybrid":[69],"feature":[70,105,111,184,199,237],"selection":[71,185,225],"method":[72,129,186,226],"designed":[73],"improve":[75],"APT":[76,149],"reducing":[79],"dimensionality":[80,255],"while":[81,113],"preserving":[82],"informative":[84],"characteristics":[85],"data.":[88],"It":[89],"combines":[90],"Mutual":[91],"Information":[92],"(MI),":[93],"Symmetric":[94],"Uncertainty":[95],"(SU)":[96],"Minimum":[98],"Redundancy":[99],"Maximum":[100],"Relevance":[101],"(mRMR)":[102],"enhance":[104],"selection.":[106],"MI":[107],"SU":[109],"assess":[110,175],"relevance,":[112],"mRMR":[114],"maximises":[115],"relevance":[116],"minimises":[118],"redundancy,":[119],"ensuring":[120],"that":[121,181],"impactful":[124],"features":[125],"are":[126],"prioritised.":[127],"addresses":[130],"redundancy":[131],"among":[132],"selected":[133],"features,":[134],"improving":[135],"overall":[137],"efficiency":[138],"effectiveness":[140],"model.":[144],"Experiments":[145],"were":[151,172],"conducted":[152],"evaluate":[154],"proposed":[156,183,219],"method.":[157],"Multiple":[158],"classifiers":[159],"including,":[160],"Random":[161,202],"Forest,":[162],"Support":[163],"Vector":[164],"(SVM),":[166],"Gradient":[167],"Boosting,":[168],"Neural":[170],"Networks":[171],"used":[173],"classification":[176],"performance.":[177,245],"results":[179],"demonstrate":[180],"significantly":[187],"enhances":[188],"accuracy":[190],"compared":[191],"baseline":[193],"full":[198],"set.":[200],"Forest":[203],"algorithm":[204,222],"achieved":[205],"highest":[207],"performance,":[208],"near-perfect":[210],"accuracy,":[211],"precision,":[212],"recall,":[213],"F1":[215],"scores":[216],"(99.97%).":[217],"adaptive":[220],"thresholding":[221],"within":[223],"allows":[227],"each":[228],"classifier":[229],"benefit":[231],"from":[232],"reduced":[234],"optimised":[236],"space,":[238],"resulting":[239],"improved":[241],"training":[242],"predictive":[244],"research":[247],"offers":[248],"scalable":[250],"classifier-agnostic":[252],"solution":[253],"for":[254],"reduction":[256],"cybersecurity":[258],"applications.":[259]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
