{"id":"https://openalex.org/W2032181929","doi":"https://doi.org/10.5539/cis.v3n3p203","title":"Intrusion Detection in Agent-Based Virtual Knowledge Communities","display_name":"Intrusion Detection in Agent-Based Virtual Knowledge Communities","publication_year":2010,"publication_date":"2010-07-20","ids":{"openalex":"https://openalex.org/W2032181929","doi":"https://doi.org/10.5539/cis.v3n3p203","mag":"2032181929"},"language":"en","primary_location":{"id":"doi:10.5539/cis.v3n3p203","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n3p203","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/5473/5455","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ccsenet.org/journal/index.php/cis/article/download/5473/5455","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024193667","display_name":"Gabriel Opeyemi Ogunleye","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gabriel Opeyemi Ogunleye","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5059489339","display_name":"Adewale Opeoluwa Ogunde","orcid":"https://orcid.org/0000-0002-7913-3281"},"institutions":[{"id":"https://openalex.org/I265584191","display_name":"Redeemer's University","ror":"https://ror.org/01v0we819","country_code":"NG","type":"education","lineage":["https://openalex.org/I265584191"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"ADEWALE OPEOLUWA OGUNDE","raw_affiliation_strings":["REDEEMER'S UNIVERSITY (RUN)"],"affiliations":[{"raw_affiliation_string":"REDEEMER'S UNIVERSITY (RUN)","institution_ids":["https://openalex.org/I265584191"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024193667"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3561,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6218959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8510152697563171},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.6844967603683472},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6391646265983582},{"id":"https://openalex.org/keywords/knowledge-sharing","display_name":"Knowledge sharing","score":0.6144357919692993},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5895998477935791},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4413221478462219},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4220249056816101},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3846687972545624},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.34125036001205444}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8510152697563171},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.6844967603683472},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6391646265983582},{"id":"https://openalex.org/C2776604539","wikidata":"https://www.wikidata.org/wiki/Q6423395","display_name":"Knowledge sharing","level":2,"score":0.6144357919692993},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5895998477935791},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4413221478462219},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4220249056816101},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3846687972545624},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.34125036001205444},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5539/cis.v3n3p203","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n3p203","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/5473/5455","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.5539/cis.v3n3p203","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n3p203","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/5473/5455","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2032181929.pdf","grobid_xml":"https://content.openalex.org/works/W2032181929.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W56351569","https://openalex.org/W79626244","https://openalex.org/W1497223332","https://openalex.org/W1518527889","https://openalex.org/W1583975142","https://openalex.org/W2000940208","https://openalex.org/W2032862710","https://openalex.org/W2124543982","https://openalex.org/W2131970275","https://openalex.org/W2149871830","https://openalex.org/W2398602324","https://openalex.org/W2678934292","https://openalex.org/W3214373139","https://openalex.org/W4232628089","https://openalex.org/W4243082082","https://openalex.org/W6603289077"],"related_works":["https://openalex.org/W3114154697","https://openalex.org/W1547577918","https://openalex.org/W2152869043","https://openalex.org/W2133389611","https://openalex.org/W2013494527","https://openalex.org/W342068300","https://openalex.org/W91279511","https://openalex.org/W2099974807","https://openalex.org/W1553767020","https://openalex.org/W3008366965"],"abstract_inverted_index":{"Virtual":[0],"Knowledge":[1],"Communities":[2],"(VKC)":[3],"are":[4,27,32,114],"current":[5],"popular":[6],"media":[7],"on":[8,66,90],"the":[9,13,38,79,84,97,104,126],"internet":[10],"through":[11],"which":[12,42],"access":[14],"and":[15,19,53,83],"sharing":[16,105],"of":[17,23,40,61,72,81,86,99,106,134],"knowledge":[18,48,68,107,110],"information":[20],"among":[21,55],"communities":[22,69],"similar":[24],"interest":[25],"groups":[26],"made":[28],"possible.":[29],"Agent\u2019s":[30],"technologies":[31],"presently":[33],"being":[34],"deployed":[35],"to":[36,118],"facilitate":[37],"success":[39],"VKC,":[41],"is":[43],"a":[44,59],"virtual":[45,109],"place":[46],"where":[47],"agents":[49,113],"can":[50],"meet,":[51],"communicate":[52],"interact":[54],"themselves.":[56],"Recently,":[57],"quite":[58],"number":[60],"works":[62,74],"have":[63,75],"been":[64],"done":[65],"agent-based":[67],"but":[70],"most":[71],"these":[73,87],"not":[76],"actually":[77],"considered":[78],"possibilities":[80],"intrusion":[82,100],"consequences":[85],"malicious":[88],"attacks":[89],"those":[91],"systems.":[92],"This":[93],"paper":[94],"therefore":[95],"addresses":[96],"issue":[98],"detection":[101],"problems":[102],"in":[103,108],"communities.":[111],"Intelligent":[112],"proposed":[115,130],"as":[116],"measures":[117],"guide":[119],"against":[120],"any":[121],"spy":[122],"or":[123],"intruder":[124],"into":[125],"VKC.":[127],"The":[128],"method":[129],"shows":[131],"potential":[132],"evidences":[133],"promising":[135],"results.":[136]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
