{"id":"https://openalex.org/W3135931079","doi":"https://doi.org/10.3390/jcp1010011","title":"Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector","display_name":"Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector","publication_year":2021,"publication_date":"2021-03-21","ids":{"openalex":"https://openalex.org/W3135931079","doi":"https://doi.org/10.3390/jcp1010011","mag":"3135931079"},"language":"en","primary_location":{"id":"doi:10.3390/jcp1010011","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1010011","pdf_url":"https://www.mdpi.com/2624-800X/1/1/11/pdf?version=1616642358","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/1/1/11/pdf?version=1616642358","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014889503","display_name":"Mostofa Ahsan","orcid":"https://orcid.org/0000-0002-1748-5652"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mostofa Ahsan","raw_affiliation_strings":["Department of Computer Science, North Dakota State University, Fargo, ND 58102, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Dakota State University, Fargo, ND 58102, USA","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034845580","display_name":"Rahul Gomes","orcid":"https://orcid.org/0000-0002-5377-8196"},"institutions":[{"id":"https://openalex.org/I124727415","display_name":"University of Wisconsin\u2013Eau Claire","ror":"https://ror.org/03mnm0t94","country_code":"US","type":"education","lineage":["https://openalex.org/I124727415"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rahul Gomes","raw_affiliation_strings":["Department of Computer Science, University of Wisconsin-Eau Claire, Eau Claire, WI 54701, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Wisconsin-Eau Claire, Eau Claire, WI 54701, USA","institution_ids":["https://openalex.org/I124727415"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064125900","display_name":"Md Minhaz Chowdhury","orcid":"https://orcid.org/0000-0003-0145-6838"},"institutions":[{"id":"https://openalex.org/I79060951","display_name":"East Stroudsburg University","ror":"https://ror.org/05atz9219","country_code":"US","type":"education","lineage":["https://openalex.org/I79060951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md. Minhaz Chowdhury","raw_affiliation_strings":["Department of Computer Science, East Stroudsburg University of Pennsylvania, East Stroudsburg, PA 18301, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, East Stroudsburg University of Pennsylvania, East Stroudsburg, PA 18301, USA","institution_ids":["https://openalex.org/I79060951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046205221","display_name":"Kendall E. Nygard","orcid":null},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kendall E. Nygard","raw_affiliation_strings":["Department of Computer Science, North Dakota State University, Fargo, ND 58102, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Dakota State University, Fargo, ND 58102, USA","institution_ids":["https://openalex.org/I57328836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014889503","https://openalex.org/A5034845580"],"corresponding_institution_ids":["https://openalex.org/I124727415","https://openalex.org/I57328836"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":12.5527,"has_fulltext":true,"cited_by_count":99,"citation_normalized_percentile":{"value":0.99029332,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"1","issue":"1","first_page":"199","last_page":"218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8299253582954407},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6649976372718811},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6600912809371948},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6505268812179565},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.540199339389801},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5199854969978333},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5047687292098999},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.4974561035633087},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4859687089920044},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45385584235191345},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.45370903611183167},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.41131776571273804},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33541783690452576}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8299253582954407},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6649976372718811},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6600912809371948},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6505268812179565},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.540199339389801},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5199854969978333},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5047687292098999},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.4974561035633087},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4859687089920044},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45385584235191345},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.45370903611183167},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.41131776571273804},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33541783690452576},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3390/jcp1010011","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1010011","pdf_url":"https://www.mdpi.com/2624-800X/1/1/11/pdf?version=1616642358","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3390/jcp1010011","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1010011","pdf_url":"https://www.mdpi.com/2624-800X/1/1/11/pdf?version=1616642358","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309013","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3135931079.pdf","grobid_xml":"https://content.openalex.org/works/W3135931079.grobid-xml"},"referenced_works_count":68,"referenced_works":["https://openalex.org/W67767829","https://openalex.org/W85009029","https://openalex.org/W1506044744","https://openalex.org/W1574447377","https://openalex.org/W1586736793","https://openalex.org/W1678356000","https://openalex.org/W1966816403","https://openalex.org/W2013313366","https://openalex.org/W2016375676","https://openalex.org/W2040884411","https://openalex.org/W2080911646","https://openalex.org/W2091118421","https://openalex.org/W2099940443","https://openalex.org/W2100383651","https://openalex.org/W2102661631","https://openalex.org/W2102831150","https://openalex.org/W2135458935","https://openalex.org/W2155632266","https://openalex.org/W2155925556","https://openalex.org/W2159401492","https://openalex.org/W2169125069","https://openalex.org/W2295598076","https://openalex.org/W2296509296","https://openalex.org/W2343416635","https://openalex.org/W2435251607","https://openalex.org/W2572939427","https://openalex.org/W2580662672","https://openalex.org/W2586483808","https://openalex.org/W2588792172","https://openalex.org/W2621914863","https://openalex.org/W2626468835","https://openalex.org/W2734020236","https://openalex.org/W2786743105","https://openalex.org/W2794247686","https://openalex.org/W2806643775","https://openalex.org/W2808986925","https://openalex.org/W2890574336","https://openalex.org/W2892548074","https://openalex.org/W2899487481","https://openalex.org/W2902529532","https://openalex.org/W2902736485","https://openalex.org/W2903396188","https://openalex.org/W2904494163","https://openalex.org/W2909420804","https://openalex.org/W2919936975","https://openalex.org/W2923375803","https://openalex.org/W2941023688","https://openalex.org/W2944643572","https://openalex.org/W2949598955","https://openalex.org/W2951775809","https://openalex.org/W2963105378","https://openalex.org/W2963608065","https://openalex.org/W2972609722","https://openalex.org/W2974383344","https://openalex.org/W2998216295","https://openalex.org/W2999212871","https://openalex.org/W3005630930","https://openalex.org/W3011807858","https://openalex.org/W3031174774","https://openalex.org/W3040204705","https://openalex.org/W3043077209","https://openalex.org/W3080935736","https://openalex.org/W3102476541","https://openalex.org/W4212883601","https://openalex.org/W4285719527","https://openalex.org/W6756621107","https://openalex.org/W6869608176","https://openalex.org/W7066667914"],"related_works":["https://openalex.org/W4296209631","https://openalex.org/W3193043704","https://openalex.org/W4386259002","https://openalex.org/W1546989560","https://openalex.org/W3171520305","https://openalex.org/W4388745254","https://openalex.org/W2980082554","https://openalex.org/W1517228774","https://openalex.org/W2767419625","https://openalex.org/W2389704471"],"abstract_inverted_index":{"Machine":[0],"learning":[1,18,23],"algorithms":[2,178],"are":[3],"becoming":[4],"very":[5],"efficient":[6,119],"in":[7,57,82,108,212,236],"intrusion":[8],"detection":[9,30],"systems":[10],"with":[11,36,88],"their":[12],"real":[13],"time":[14,60,96],"response":[15],"and":[16,61,97,116,136,144,166,192,198],"adaptive":[17],"process.":[19],"A":[20],"robust":[21],"machine":[22],"model":[24,142],"can":[25],"be":[26,70],"deployed":[27],"for":[28,158,203,267],"anomaly":[29],"by":[31],"using":[32],"a":[33,51,71,76,105,193],"comprehensive":[34],"dataset":[35],"multiple":[37],"attack":[38],"types.":[39],"Nowadays":[40],"datasets":[41,49,156],"contain":[42],"many":[43,67],"attributes.":[44],"Such":[45],"high":[46],"dimensionality":[47],"of":[48,59,75,101,168,222,264],"poses":[50],"significant":[52],"challenge":[53],"to":[54,80,123,140,216,228,240,248,256],"information":[55],"extraction":[56],"terms":[58],"space":[62],"complexity.":[63],"Moreover,":[64],"having":[65],"so":[66],"attributes":[68],"may":[69],"hindrance":[72],"towards":[73],"creation":[74],"decision":[77],"boundary":[78],"due":[79],"noise":[81],"the":[83,94,174],"dataset.":[84],"Large":[85],"scale":[86],"data":[87],"redundant":[89],"or":[90],"insignificant":[91,125],"features":[92,225,265],"increases":[93],"computational":[95],"often":[98],"decreases":[99],"goodness":[100],"fit":[102],"which":[103],"is":[104,253],"critical":[106],"issue":[107],"cybersecurity.":[109],"In":[110,173,230],"this":[111],"research,":[112],"we":[113,151,232],"have":[114],"proposed":[115,128,194,251],"implemented":[117],"an":[118,210,234],"feature":[120,137,220,244],"selection":[121],"algorithm":[122],"filter":[124],"variables.":[126],"Our":[127],"Dynamic":[129],"Feature":[130],"Selector":[131],"(DFS)":[132],"uses":[133],"statistical":[134],"analysis":[135],"importance":[138],"tests":[139],"reduce":[141],"complexity":[143],"improve":[145],"prediction":[146],"accuracy.":[147],"To":[148],"evaluate":[149],"DFS,":[150],"conducted":[152],"experiments":[153,208],"on":[154],"two":[155],"used":[157],"cybersecurity":[159],"research":[160],"namely":[161,181],"Network":[162,197],"Security":[163],"Laboratory":[164],"(NSL-KDD)":[165],"University":[167],"New":[169],"South":[170],"Wales":[171],"(UNSW-NB15).":[172],"meta-learning":[175],"stage,":[176],"four":[177],"were":[179],"compared":[180],"Bidirectional":[182],"Long":[183,199],"Short-Term":[184,200],"Memory":[185,201],"(Bi-LSTM),":[186],"Gated":[187],"Recurrent":[188],"Units,":[189],"Random":[190],"Forest":[191],"Convolutional":[195],"Neural":[196],"(CNN-LSTM)":[202],"accuracy":[204,213,237,259],"estimation.":[205],"For":[206],"NSL-KDD,":[207],"revealed":[209],"increment":[211],"from":[214,226,238,246],"99.54%":[215],"99.64%":[217],"while":[218,242,260],"reducing":[219,243],"size":[221,245],"one-hot":[223],"encoded":[224],"123":[227],"50.":[229],"UNSW-NB15":[231],"observed":[233],"increase":[235],"90.98%":[239],"92.46%":[241],"196":[247],"47.":[249],"The":[250],"approach":[252],"thus":[254],"able":[255],"achieve":[257],"higher":[258],"significantly":[261],"lowering":[262],"number":[263],"required":[266],"processing.":[268]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":22},{"year":2021,"cited_by_count":9}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2021-03-29T00:00:00"}
