{"id":"https://openalex.org/W2600058599","doi":"https://doi.org/10.3390/a10020039","title":"From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions","display_name":"From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions","publication_year":2017,"publication_date":"2017-03-27","ids":{"openalex":"https://openalex.org/W2600058599","doi":"https://doi.org/10.3390/a10020039","mag":"2600058599"},"language":"en","primary_location":{"id":"doi:10.3390/a10020039","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a10020039","pdf_url":"https://www.mdpi.com/1999-4893/10/2/39/pdf?version=1490879826","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-4893/10/2/39/pdf?version=1490879826","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059423432","display_name":"Shahid Anwar","orcid":"https://orcid.org/0000-0003-3302-5557"},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Shahid Anwar","raw_affiliation_strings":["Faculty of Computer Systems & Software Engineering (FSKKP), Universiti Malaysia Pahang, LebuhrayaTun Razak Gambang, 26300 Kuantan"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Systems & Software Engineering (FSKKP), Universiti Malaysia Pahang, LebuhrayaTun Razak Gambang, 26300 Kuantan","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046044880","display_name":"Jasni Mohamad Zain","orcid":"https://orcid.org/0000-0003-2072-1510"},"institutions":[{"id":"https://openalex.org/I82724352","display_name":"Universiti Teknologi MARA","ror":"https://ror.org/05n8tts92","country_code":"MY","type":"education","lineage":["https://openalex.org/I82724352"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Jasni Mohamad Zain","raw_affiliation_strings":["Center for Computer Technology & Networking Studies, Faculty of Computer & Mathematical Sciences,Universiti Teknologi MARA (UiTM), 40450 Shah Alam, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center for Computer Technology & Networking Studies, Faculty of Computer & Mathematical Sciences,Universiti Teknologi MARA (UiTM), 40450 Shah Alam, Malaysia","institution_ids":["https://openalex.org/I82724352"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072484169","display_name":"Mohamad Fadli Zolkipli","orcid":"https://orcid.org/0000-0002-6780-8480"},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohamad Fadli Zolkipli","raw_affiliation_strings":["Faculty of Computer Systems & Software Engineering (FSKKP), Universiti Malaysia Pahang, LebuhrayaTun Razak Gambang, 26300 Kuantan"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Systems & Software Engineering (FSKKP), Universiti Malaysia Pahang, LebuhrayaTun Razak Gambang, 26300 Kuantan","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057272965","display_name":"Zakira Inayat","orcid":null},"institutions":[{"id":"https://openalex.org/I90610274","display_name":"University of Engineering and Technology Peshawar","ror":"https://ror.org/00p034093","country_code":"PK","type":"education","lineage":["https://openalex.org/I90610274"]},{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]},{"id":"https://openalex.org/I4210144487","display_name":"Cloud Computing Center","ror":"https://ror.org/04aa0zm65","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210144487"]}],"countries":["CN","MY","PK"],"is_corresponding":false,"raw_author_name":"Zakira Inayat","raw_affiliation_strings":["Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur,","Department of Computer Science, University of Engineering and Technology Peshawar, Peshawar 2500, Pakistan"],"affiliations":[{"raw_affiliation_string":"Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur,","institution_ids":["https://openalex.org/I4210144487","https://openalex.org/I33849332"]},{"raw_affiliation_string":"Department of Computer Science, University of Engineering and Technology Peshawar, Peshawar 2500, Pakistan","institution_ids":["https://openalex.org/I90610274"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005292451","display_name":"Suleman Khan","orcid":"https://orcid.org/0000-0003-1190-258X"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]},{"id":"https://openalex.org/I4210144487","display_name":"Cloud Computing Center","ror":"https://ror.org/04aa0zm65","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210144487"]}],"countries":["CN","MY"],"is_corresponding":false,"raw_author_name":"Suleman Khan","raw_affiliation_strings":["Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur,"],"affiliations":[{"raw_affiliation_string":"Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur,","institution_ids":["https://openalex.org/I4210144487","https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014717166","display_name":"Bokolo Anthony","orcid":"https://orcid.org/0000-0002-7276-0258"},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Bokolo Anthony","raw_affiliation_strings":["Faculty of Computer Systems & Software Engineering (FSKKP), Universiti Malaysia Pahang, LebuhrayaTun Razak Gambang, 26300 Kuantan"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Systems & Software Engineering (FSKKP), Universiti Malaysia Pahang, LebuhrayaTun Razak Gambang, 26300 Kuantan","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064078720","display_name":"Victor Chang","orcid":"https://orcid.org/0000-0002-8012-5852"},"institutions":[{"id":"https://openalex.org/I69356397","display_name":"Xi\u2019an Jiaotong-Liverpool University","ror":"https://ror.org/03zmrmn05","country_code":"CN","type":"education","lineage":["https://openalex.org/I69356397"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Victor Chang","raw_affiliation_strings":["International Business School Suzhou (IBSS), Xi\u2019an Jiaotong-Liverpool University, 111 Ren\u2019ai Road, SuzhouDushu Lake Science and Education Innovation Industrial Park, Suzhou 215123","International Business School Suzhou (IBSS), Xi'an Jiaotong-Liverpool University, 111 Ren'ai Road, SuzhouDushu Lake Science and Education Innovation Industrial Park, Suzhou 215123"],"affiliations":[{"raw_affiliation_string":"International Business School Suzhou (IBSS), Xi\u2019an Jiaotong-Liverpool University, 111 Ren\u2019ai Road, SuzhouDushu Lake Science and Education Innovation Industrial Park, Suzhou 215123","institution_ids":["https://openalex.org/I69356397"]},{"raw_affiliation_string":"International Business School Suzhou (IBSS), Xi'an Jiaotong-Liverpool University, 111 Ren'ai Road, SuzhouDushu Lake Science and Education Innovation Industrial Park, Suzhou 215123","institution_ids":["https://openalex.org/I69356397"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5059423432"],"corresponding_institution_ids":["https://openalex.org/I102913810"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":12.2248,"has_fulltext":true,"cited_by_count":198,"citation_normalized_percentile":{"value":0.98842911,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"10","issue":"2","first_page":"39","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8696129322052002},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7596738338470459},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.5815742015838623},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.569764256477356},{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.5657310485839844},{"id":"https://openalex.org/keywords/response-time","display_name":"Response time","score":0.5541526079177856},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5338948965072632},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46112602949142456},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4451933801174164},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4294169843196869},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.42631155252456665},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3541390001773834},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17483735084533691},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06824624538421631}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8696129322052002},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7596738338470459},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.5815742015838623},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.569764256477356},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.5657310485839844},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.5541526079177856},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5338948965072632},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46112602949142456},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4451933801174164},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4294169843196869},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.42631155252456665},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3541390001773834},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17483735084533691},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06824624538421631},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/a10020039","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a10020039","pdf_url":"https://www.mdpi.com/1999-4893/10/2/39/pdf?version=1490879826","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:nrl.northumbria.ac.uk:41161","is_oa":true,"landing_page_url":null,"pdf_url":"http://nrl.northumbria.ac.uk/id/eprint/41161/1/Anwar%20et%20al%20-%20From%20intrusion%20detection%20to%20an%20intrusion%20response%20system%20OA.pdf","source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:openaire/5d6ec6fb-33d4-46f7-aca7-bd4a4a4ffeeb","is_oa":true,"landing_page_url":"https://research.tees.ac.uk/en/publications/5d6ec6fb-33d4-46f7-aca7-bd4a4a4ffeeb","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Anwar, S, Zain, J M, Zolkipli, M F, Inayat, Z, Khan, S, Anthony, B & Chang, V 2017, 'From intrusion detection to an intrusion response system : Fundamentals, requirements, and future directions', Algorithms, vol. 10, no. 2, 39. https://doi.org/10.3390/a10020039","raw_type":"article"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:publications/5d6ec6fb-33d4-46f7-aca7-bd4a4a4ffeeb","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85020650273&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Anwar, S, Zain, J M, Zolkipli, M F, Inayat, Z, Khan, S, Anthony, B & Chang, V 2017, 'From intrusion detection to an intrusion response system : Fundamentals, requirements, and future directions', Algorithms, vol. 10, no. 2, 39. https://doi.org/10.3390/a10020039","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-4893/10/2/39/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/a10020039","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms; Volume 10; Issue 2; Pages: 39","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/a10020039","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a10020039","pdf_url":"https://www.mdpi.com/1999-4893/10/2/39/pdf?version=1490879826","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320323310","display_name":"Universiti Malaysia Pahang","ror":"https://ror.org/01704wp68"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2600058599.pdf","grobid_xml":"https://content.openalex.org/works/W2600058599.grobid-xml"},"referenced_works_count":79,"referenced_works":["https://openalex.org/W23242426","https://openalex.org/W33780096","https://openalex.org/W44528998","https://openalex.org/W103440906","https://openalex.org/W158575402","https://openalex.org/W1427174644","https://openalex.org/W1481915258","https://openalex.org/W1489073918","https://openalex.org/W1515052829","https://openalex.org/W1520221279","https://openalex.org/W1533145153","https://openalex.org/W1541150254","https://openalex.org/W1601618042","https://openalex.org/W1601789105","https://openalex.org/W1628966152","https://openalex.org/W1854288931","https://openalex.org/W1934458198","https://openalex.org/W1996575854","https://openalex.org/W2000432868","https://openalex.org/W2002907052","https://openalex.org/W2005500027","https://openalex.org/W2016551721","https://openalex.org/W2026258420","https://openalex.org/W2030400585","https://openalex.org/W2036358294","https://openalex.org/W2036584242","https://openalex.org/W2038889839","https://openalex.org/W2044583315","https://openalex.org/W2050561062","https://openalex.org/W2075694406","https://openalex.org/W2078012503","https://openalex.org/W2081633971","https://openalex.org/W2083477206","https://openalex.org/W2087433244","https://openalex.org/W2097209984","https://openalex.org/W2097688220","https://openalex.org/W2098875950","https://openalex.org/W2104182023","https://openalex.org/W2117667893","https://openalex.org/W2124571204","https://openalex.org/W2129167642","https://openalex.org/W2130119598","https://openalex.org/W2135329833","https://openalex.org/W2136755117","https://openalex.org/W2138410641","https://openalex.org/W2139836766","https://openalex.org/W2142889610","https://openalex.org/W2145223243","https://openalex.org/W2155141930","https://openalex.org/W2156352116","https://openalex.org/W2158390457","https://openalex.org/W2160520992","https://openalex.org/W2164668947","https://openalex.org/W2167733259","https://openalex.org/W2334530377","https://openalex.org/W2340444533","https://openalex.org/W2425058326","https://openalex.org/W2431517476","https://openalex.org/W2475472996","https://openalex.org/W2490447569","https://openalex.org/W2570619149","https://openalex.org/W2579847648","https://openalex.org/W2622610444","https://openalex.org/W2678934292","https://openalex.org/W3032603470","https://openalex.org/W3123284927","https://openalex.org/W3140706010","https://openalex.org/W3145799356","https://openalex.org/W4254386461","https://openalex.org/W4300826984","https://openalex.org/W6678952967","https://openalex.org/W6679409561","https://openalex.org/W6683117186","https://openalex.org/W6684268416","https://openalex.org/W6703956493","https://openalex.org/W6732358989","https://openalex.org/W6737693475","https://openalex.org/W6792273215","https://openalex.org/W7061889555"],"related_works":["https://openalex.org/W2038889839","https://openalex.org/W2040442727","https://openalex.org/W2030818986","https://openalex.org/W2393409647","https://openalex.org/W2401796238","https://openalex.org/W2387383822","https://openalex.org/W1973858469","https://openalex.org/W2021573540","https://openalex.org/W2133389611","https://openalex.org/W2347581643"],"abstract_inverted_index":{"In":[0],"the":[1,5,80,86,106,113,124],"past":[2],"few":[3],"decades,":[4],"rise":[6],"in":[7,12,16,65,137],"attacks":[8,143],"on":[9,70,105],"communication":[10],"devices":[11],"networks":[13],"has":[14],"resulted":[15],"a":[17,57,71,95],"reduction":[18],"of":[19,53,88,98,108,112,119,123],"network":[20,30,89,120,132,135],"functionality,":[21],"throughput,":[22],"and":[23,27,34,100,134],"performance.":[24],"To":[25,74],"detect":[26],"mitigate":[28],"these":[29],"attacks,":[31,68],"researchers,":[32],"academicians,":[33],"practitioners":[35],"developed":[36],"Intrusion":[37,101],"Detection":[38],"Systems":[39,103],"(IDSs)":[40],"with":[41,144],"automatic":[42],"response":[43,46,59,82,114],"systems.":[44],"The":[45],"system":[47],"is":[48],"considered":[49],"an":[50],"important":[51],"component":[52],"IDS,":[54],"since":[55],"without":[56],"timely":[58],"IDSs":[60,77,99],"may":[61],"not":[62],"function":[63],"properly":[64],"countering":[66],"various":[67],"especially":[69],"real-time":[72],"basis.":[73],"respond":[75],"appropriately,":[76],"should":[78],"select":[79],"optimal":[81],"option":[83,115],"according":[84],"to":[85,128,140],"type":[87],"attack.":[90],"This":[91],"research":[92],"study":[93],"provides":[94],"complete":[96],"survey":[97],"Response":[102],"(IRSs)":[104],"basis":[107],"our":[109],"in-depth":[110],"understanding":[111,138],"for":[116],"different":[117,142],"types":[118],"attacks.":[121],"Knowledge":[122],"path":[125],"from":[126],"IDS":[127],"IRS":[129],"can":[130],"assist":[131],"administrators":[133],"staffs":[136],"how":[139],"tackle":[141],"state-of-the-art":[145],"technologies.":[146]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":29},{"year":2022,"cited_by_count":37},{"year":2021,"cited_by_count":29},{"year":2020,"cited_by_count":28},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":14},{"year":2017,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
