{"id":"https://openalex.org/W2014718716","doi":"https://doi.org/10.4304/jnw.8.11.2541-2547","title":"Network Intrusion Detection Technology based on Improved C-means Clustering Algorithm","display_name":"Network Intrusion Detection Technology based on Improved C-means Clustering Algorithm","publication_year":2013,"publication_date":"2013-10-16","ids":{"openalex":"https://openalex.org/W2014718716","doi":"https://doi.org/10.4304/jnw.8.11.2541-2547","mag":"2014718716"},"language":"en","primary_location":{"id":"doi:10.4304/jnw.8.11.2541-2547","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.8.11.2541-2547","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100327175","display_name":"Yanjun Wang","orcid":"https://orcid.org/0000-0002-1336-7464"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yanjun Wang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100327175"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.131,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80579051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"8","issue":"11","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9599999785423279,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9217256307601929},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7222144603729248},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7051070928573608},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4814288318157196},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.47801077365875244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3207990825176239}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9217256307601929},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7222144603729248},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7051070928573608},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4814288318157196},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.47801077365875244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3207990825176239}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4304/jnw.8.11.2541-2547","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.8.11.2541-2547","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.403.2005","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.403.2005","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ojs.academypublisher.com/index.php/jnw/article/viewFile/jnw081125412547/7964/","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1492996112","https://openalex.org/W1566399673","https://openalex.org/W2004174214","https://openalex.org/W2255162841","https://openalex.org/W2312748358","https://openalex.org/W2314815623","https://openalex.org/W2315063894","https://openalex.org/W2315783848","https://openalex.org/W2317863469","https://openalex.org/W2318340085","https://openalex.org/W2320464513","https://openalex.org/W2321051213","https://openalex.org/W2322757120","https://openalex.org/W2325161289","https://openalex.org/W2326434744","https://openalex.org/W2329351358","https://openalex.org/W2329453236","https://openalex.org/W2329864724","https://openalex.org/W2332248774","https://openalex.org/W2333667357","https://openalex.org/W2369676632","https://openalex.org/W4239127116","https://openalex.org/W4254373586","https://openalex.org/W6629612601","https://openalex.org/W6634005176","https://openalex.org/W6708783467"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2317200988","https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2364419519","https://openalex.org/W2017948608","https://openalex.org/W2360767377","https://openalex.org/W2360951146"],"abstract_inverted_index":{"Abstract\u2014Current":[0],"intrusion":[1,15,27],"detection":[2,6,28],"systems":[3],"have":[4],"low":[5],"rate":[7,12,109],"and":[8,36,58,73,110],"high":[9],"false":[10,107],"positive":[11,108,113],"for":[13],"new":[14],"types.":[16],"This":[17,65],"article":[18],"applied":[19],"PSO":[20],"in":[21,42],"network":[22],"security":[23],"area,":[24],"a":[25],"novel":[26],"method":[29,66,100],"based":[30],"on":[31],"chaos":[32],"Particle":[33],"Swarm":[34],"Optimization":[35],"Fuzzy":[37],"C-Means":[38],"Clustering":[39],"is":[40,51],"proposed":[41],"order":[43],"to":[44,55,60,83],"solve":[45],"the":[46,56,85],"problem":[47],"of":[48],"FCM":[49],"which":[50],"much":[52],"more":[53],"sensitive":[54],"initialization":[57],"easier":[59],"fall":[61],"into":[62],"local":[63],"optimization.":[64],"can":[67,74,101],"quickly":[68],"obtain":[69],"global":[70],"optimal":[71],"clustering":[72],"detect":[75,102],"unknown":[76,103],"intrusions":[77,104],"efficiently,":[78],"it":[79],"does":[80],"not":[81],"need":[82],"classify":[84],"training":[86],"data":[87],"sets":[88],"with":[89,105],"artificial":[90],"or":[91],"other":[92],"methods.":[93],"The":[94],"experimental":[95],"results":[96],"show":[97],"that":[98],"this":[99],"lower":[106],"higher":[111],"true":[112],"rate.":[114]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
