{"id":"https://openalex.org/W4321380134","doi":"https://doi.org/10.34028/iajit/20/2/1","title":"Ensemble Voting based Intrusion Detection Technique using Negative Selection Algorithm","display_name":"Ensemble Voting based Intrusion Detection Technique using Negative Selection Algorithm","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4321380134","doi":"https://doi.org/10.34028/iajit/20/2/1"},"language":"en","primary_location":{"id":"doi:10.34028/iajit/20/2/1","is_oa":true,"landing_page_url":"http://doi.org/10.34028/iajit/20/2/1","pdf_url":"https://doi.org/10.34028/iajit/20/2/1","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.34028/iajit/20/2/1","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100622437","display_name":"Kuldeep Singh","orcid":"https://orcid.org/0009-0008-5559-4615"},"institutions":[{"id":"https://openalex.org/I79161377","display_name":"Punjabi University","ror":"https://ror.org/00xdn8y92","country_code":"IN","type":"education","lineage":["https://openalex.org/I79161377"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kuldeep Singh","raw_affiliation_strings":["Department of Computer Science and Engineering , Punjabi University , Patiala","Department of Computer Science and Engineering, Punjabi University, Patiala"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering , Punjabi University , Patiala","institution_ids":["https://openalex.org/I79161377"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Punjabi University, Patiala","institution_ids":["https://openalex.org/I79161377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109498834","display_name":"Lakhwinder Kaur","orcid":"https://orcid.org/0000-0003-3990-558X"},"institutions":[{"id":"https://openalex.org/I79161377","display_name":"Punjabi University","ror":"https://ror.org/00xdn8y92","country_code":"IN","type":"education","lineage":["https://openalex.org/I79161377"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Lakhwinder Kaur","raw_affiliation_strings":["Department of Computer Science and Engineering , Punjabi University , Patiala","Department of Computer Science and Engineering, Punjabi University, Patiala"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering , Punjabi University , Patiala","institution_ids":["https://openalex.org/I79161377"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Punjabi University, Patiala","institution_ids":["https://openalex.org/I79161377"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005847782","display_name":"Raman Maini","orcid":"https://orcid.org/0000-0003-0223-1622"},"institutions":[{"id":"https://openalex.org/I79161377","display_name":"Punjabi University","ror":"https://ror.org/00xdn8y92","country_code":"IN","type":"education","lineage":["https://openalex.org/I79161377"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Raman Maini","raw_affiliation_strings":["Department of Computer Science and Engineering , Punjabi University , Patiala","Department of Computer Science and Engineering, Punjabi University, Patiala"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering , Punjabi University , Patiala","institution_ids":["https://openalex.org/I79161377"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Punjabi University, Patiala","institution_ids":["https://openalex.org/I79161377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100622437"],"corresponding_institution_ids":["https://openalex.org/I79161377"],"apc_list":null,"apc_paid":null,"fwci":0.223,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.45412647,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"20","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9696999788284302,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9469000101089478,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8945450782775879},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.757259726524353},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.587642252445221},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5857291221618652},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5319452881813049},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4925902485847473},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.464619517326355},{"id":"https://openalex.org/keywords/euclidean-distance","display_name":"Euclidean distance","score":0.4409826397895813},{"id":"https://openalex.org/keywords/artificial-immune-system","display_name":"Artificial immune system","score":0.420761376619339},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4121052026748657},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3967292308807373},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.37648165225982666}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8945450782775879},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.757259726524353},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.587642252445221},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5857291221618652},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5319452881813049},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4925902485847473},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.464619517326355},{"id":"https://openalex.org/C120174047","wikidata":"https://www.wikidata.org/wiki/Q847073","display_name":"Euclidean distance","level":2,"score":0.4409826397895813},{"id":"https://openalex.org/C93768804","wikidata":"https://www.wikidata.org/wiki/Q2518735","display_name":"Artificial immune system","level":2,"score":0.420761376619339},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4121052026748657},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3967292308807373},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37648165225982666},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.34028/iajit/20/2/1","is_oa":true,"landing_page_url":"http://doi.org/10.34028/iajit/20/2/1","pdf_url":"https://doi.org/10.34028/iajit/20/2/1","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.34028/iajit/20/2/1","is_oa":true,"landing_page_url":"http://doi.org/10.34028/iajit/20/2/1","pdf_url":"https://doi.org/10.34028/iajit/20/2/1","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","score":0.6000000238418579,"display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4321380134.pdf","grobid_xml":"https://content.openalex.org/works/W4321380134.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1493684801","https://openalex.org/W1498351444","https://openalex.org/W1516113782","https://openalex.org/W1551657146","https://openalex.org/W1986492570","https://openalex.org/W2017196532","https://openalex.org/W2024454892","https://openalex.org/W2072580964","https://openalex.org/W2116008099","https://openalex.org/W2117699771","https://openalex.org/W2131690936","https://openalex.org/W2149149813","https://openalex.org/W2171048231","https://openalex.org/W2196824591","https://openalex.org/W2321189130","https://openalex.org/W2556855889","https://openalex.org/W2603143963","https://openalex.org/W2763230888","https://openalex.org/W2973032842","https://openalex.org/W2981025625","https://openalex.org/W3042222095","https://openalex.org/W3121147667","https://openalex.org/W6679416362","https://openalex.org/W7074150349"],"related_works":["https://openalex.org/W1987409039","https://openalex.org/W2381869356","https://openalex.org/W1983393909","https://openalex.org/W2384108410","https://openalex.org/W2540152232","https://openalex.org/W2562838041","https://openalex.org/W2383254572","https://openalex.org/W1006157206","https://openalex.org/W2362522936","https://openalex.org/W2380706723"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"an":[3,9],"Intrusion":[4,102],"Detection":[5,103],"Technique":[6,104],"(IDT)":[7],"using":[8],"Artificial":[10],"Immune":[11],"System":[12],"(AIS)":[13],"based":[14,75,82,101,127],"on":[15,76,83,128,152],"Negative":[16],"Selection":[17],"Algorithm":[18],"(NSA)":[19],"to":[20,54,87,106,133],"distinguish":[21],"the":[22,33,110,113,120,135,140,147,158,163,170,173],"self":[23,64],"and":[24,42,65,80,93,108,125,157],"non-self":[25],"(intrusion)":[26],"in":[27,112,169],"computer":[28],"networks.":[29],"The":[30,115,144,166],"novelties":[31],"of":[32,38,48,52,70,96,122,146,172],"work":[34],"are":[35,160,168],"1)":[36],"use":[37,51],"Stacked":[39],"Autoencoders":[40],"(SAEs)":[41],"random":[43],"forest":[44],"for":[45],"dimensionality":[46],"reduction":[47],"data,":[49],"2)":[50],"AIS":[53],"exploit":[55],"its":[56],"feature":[57],"like":[58],"self-learning,":[59],"distributed,":[60],"self-adaption,":[61],"self-regulation":[62],"with":[63,162],"non-self-distinguishing":[66],"capability,":[67],"3)":[68],"implementation":[69],"two":[71],"algorithms":[72,132],"i.e.,":[73],"NSA":[74,81,126],"Cosine":[77],"distance":[78,130],"(NSA_CD)":[79],"Pearson":[84],"Distance":[85],"(NSA_PD)":[86],"explore":[88],"their":[89],"intrusion":[90],"detection":[91,136],"capabilities,":[92],"iv)":[94],"development":[95],"a":[97],"new":[98],"ensemble":[99],"voting":[100],"(IDT-NSAEV)":[105],"detect":[107],"test":[109],"anomalies":[111],"system.":[114],"proposed":[116,148,174],"IDT-NSAEV":[117],"technique":[118,149],"combines":[119],"power":[121],"NSA_CD,":[123],"NSA_PD":[124],"Euclidean":[129],"(NSA_ED)":[131],"enhance":[134],"rate":[137],"by":[138],"reducing":[139],"false":[141],"alarm":[142],"rate.":[143],"performance":[145],"is":[150],"tested":[151],"standard":[153],"benchmark":[154],"NSL-KDD":[155],"dataset":[156],"results":[159,167],"compared":[161],"state-of-the-art":[164],"techniques.":[165],"favour":[171],"technique.":[175]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
