{"id":"https://openalex.org/W2130683417","doi":"https://doi.org/10.4304/jnw.7.8.1214-1219","title":"Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks","display_name":"Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2130683417","doi":"https://doi.org/10.4304/jnw.7.8.1214-1219","mag":"2130683417"},"language":"en","primary_location":{"id":"doi:10.4304/jnw.7.8.1214-1219","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.7.8.1214-1219","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078876257","display_name":"Rongrong Fu","orcid":"https://orcid.org/0009-0007-5974-8581"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rongrong Fu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101644259","display_name":"Kangfeng Zheng","orcid":"https://orcid.org/0000-0001-8405-1726"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kangfeng Zheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083961028","display_name":"Tianliang Lu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tianliang Lu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100331492","display_name":"Dongmei Zhang","orcid":"https://orcid.org/0000-0003-2497-3678"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dongmei Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5071134614","display_name":"Yixian Yang","orcid":"https://orcid.org/0000-0001-8067-4774"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yixian Yang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5078876257"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.0085,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.76785586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7","issue":"8","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9300000071525574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8846681118011475},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6685284376144409},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5953817963600159},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.47768694162368774},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4481930136680603},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37345802783966064},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3690081536769867},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3440772593021393},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3169429302215576}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8846681118011475},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6685284376144409},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5953817963600159},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.47768694162368774},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4481930136680603},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37345802783966064},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3690081536769867},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3440772593021393},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3169429302215576},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jnw.7.8.1214-1219","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.7.8.1214-1219","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.5099999904632568,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W47109092","https://openalex.org/W1699101073","https://openalex.org/W1988745956","https://openalex.org/W2026946828","https://openalex.org/W2044899742","https://openalex.org/W2084543849","https://openalex.org/W2090709743","https://openalex.org/W2113613181","https://openalex.org/W2116008099","https://openalex.org/W2127699957","https://openalex.org/W2132159317","https://openalex.org/W2139772053","https://openalex.org/W2145736817","https://openalex.org/W2150496197","https://openalex.org/W2163269314","https://openalex.org/W3124662447","https://openalex.org/W6676787757","https://openalex.org/W6678686615"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W3210364259","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4300558037","https://openalex.org/W4377864969","https://openalex.org/W3030345572"],"abstract_inverted_index":{"The":[0,62,95],"resource":[1,15,27],"constraint":[2,28],"characteristic":[3,29],"of":[4,54],"sensor":[5,9],"nodes":[6],"make":[7],"wireless":[8],"networks":[10],"(WSN)":[11],"very":[12],"vulnerable":[13],"to":[14,76,101],"depletion":[16],"attack":[17],"such":[18],"as":[19],"DoS/DDos":[20],"attack.":[21],"On":[22],"the":[23,26,41,52,77,83,104,118],"other":[24],"hand,":[25],"also":[30],"makes":[31],"anomaly":[32,47],"detection":[33,48,90,110,115],"a":[34],"challenging":[35],"problem":[36],"in":[37,89,123],"WSN.":[38],"To":[39],"address":[40],"challenge,":[42],"this":[43],"paper":[44],"presents":[45],"an":[46],"framework":[49,64],"by":[50],"taking":[51],"advantages":[53,88,122],"artificial":[55],"immune":[56],"system":[57],"(AIS)":[58],"and":[59,72,80,112,125],"fuzzy":[60],"theory.":[61],"proposed":[63,84,105],"incorporates":[65],"three":[66],"components:":[67],"local":[68],"danger":[69],"sensing,":[70],"co-stimulation":[71],"global":[73],"recognition.":[74],"Due":[75],"hierarchical":[78],"structure":[79],"cooperative":[81],"mechanism,":[82],"model":[85],"shows":[86,121],"more":[87],"performance":[91],"than":[92],"conventional":[93],"method.":[94],"simulation":[96],"results":[97],"show":[98],"that":[99],"compared":[100],"watchdog":[102],"method,":[103],"method":[106,120],"can":[107],"provide":[108],"higher":[109],"rate":[111],"lower":[113],"false":[114],"rate.":[116],"Moreover,":[117],"propose":[119],"flexibility":[124],"adaptability.":[126]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
