{"id":"https://openalex.org/W4288968100","doi":"https://doi.org/10.5539/nct.v7n1p55","title":"An overview of Intrusion Detection within an Information System: The Improvment by Process Mining","display_name":"An overview of Intrusion Detection within an Information System: The Improvment by Process Mining","publication_year":2022,"publication_date":"2022-07-31","ids":{"openalex":"https://openalex.org/W4288968100","doi":"https://doi.org/10.5539/nct.v7n1p55"},"language":"en","primary_location":{"id":"doi:10.5539/nct.v7n1p55","is_oa":true,"landing_page_url":"https://doi.org/10.5539/nct.v7n1p55","pdf_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/47572/51013","source":{"id":"https://openalex.org/S4210171281","display_name":"Network and Communication Technologies","issn_l":"1927-064X","issn":["1927-064X","1927-0658"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network and Communication Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/47572/51013","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090383571","display_name":"Nkondock Mi Bahanag Nicolas","orcid":null},"institutions":[{"id":"https://openalex.org/I1331070479","display_name":"Universit\u00e9 de Yaound\u00e9 I","ror":"https://ror.org/022zbs961","country_code":"CM","type":"education","lineage":["https://openalex.org/I1331070479"]}],"countries":["CM"],"is_corresponding":true,"raw_author_name":"Nkondock Mi Bahanag Nicolas","raw_affiliation_strings":["Department of Computer Science, University of Yaounde I, Cameroon"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Yaounde I, Cameroon","institution_ids":["https://openalex.org/I1331070479"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091868126","display_name":"Atsa Etoundi Roger","orcid":"https://orcid.org/0000-0003-1988-4021"},"institutions":[{"id":"https://openalex.org/I1331070479","display_name":"Universit\u00e9 de Yaound\u00e9 I","ror":"https://ror.org/022zbs961","country_code":"CM","type":"education","lineage":["https://openalex.org/I1331070479"]}],"countries":["CM"],"is_corresponding":false,"raw_author_name":"Atsa Etoundi Roger","raw_affiliation_strings":["Department of Computer Science, University of Yaounde I, Cameroon"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Yaounde I, Cameroon","institution_ids":["https://openalex.org/I1331070479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090383571"],"corresponding_institution_ids":["https://openalex.org/I1331070479"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11621769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":"1","first_page":"55","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7917889952659607},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7861083745956421},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6158105731010437},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5782797932624817},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.5583493113517761},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5167728662490845},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4971471130847931},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49414995312690735},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.479383260011673},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4708309471607208},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.46280544996261597},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4434420168399811},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.42687681317329407},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14092785120010376}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7917889952659607},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7861083745956421},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6158105731010437},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5782797932624817},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.5583493113517761},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5167728662490845},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4971471130847931},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49414995312690735},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.479383260011673},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4708309471607208},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.46280544996261597},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4434420168399811},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.42687681317329407},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14092785120010376},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5539/nct.v7n1p55","is_oa":true,"landing_page_url":"https://doi.org/10.5539/nct.v7n1p55","pdf_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/47572/51013","source":{"id":"https://openalex.org/S4210171281","display_name":"Network and Communication Technologies","issn_l":"1927-064X","issn":["1927-064X","1927-0658"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network and Communication Technologies","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:ibn:nctjnl:v:7:y:2022:i:1:p:55","is_oa":false,"landing_page_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/47572/51013","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.5539/nct.v7n1p55","is_oa":true,"landing_page_url":"https://doi.org/10.5539/nct.v7n1p55","pdf_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/47572/51013","source":{"id":"https://openalex.org/S4210171281","display_name":"Network and Communication Technologies","issn_l":"1927-064X","issn":["1927-064X","1927-0658"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network and Communication Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4288968100.pdf","grobid_xml":"https://content.openalex.org/works/W4288968100.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W1578367810","https://openalex.org/W1601789105","https://openalex.org/W2076271933","https://openalex.org/W2121717903","https://openalex.org/W2130013189","https://openalex.org/W2150599915","https://openalex.org/W2188394038","https://openalex.org/W2319011228","https://openalex.org/W2342142671","https://openalex.org/W2377065004","https://openalex.org/W2460383888","https://openalex.org/W3208688400","https://openalex.org/W4230145224","https://openalex.org/W6634601964","https://openalex.org/W7064111672"],"related_works":["https://openalex.org/W2390910196","https://openalex.org/W2100730920","https://openalex.org/W2374633101","https://openalex.org/W2171399046","https://openalex.org/W2347501756","https://openalex.org/W2291193707","https://openalex.org/W4239903230","https://openalex.org/W2124296288","https://openalex.org/W2580659917","https://openalex.org/W2325183502"],"abstract_inverted_index":{"Information":[0,66],"Systems":[1],"handle":[2],"big":[3],"amount":[4],"of":[5,41,55,78,84,92,135,141,152],"data":[6,31],"within":[7,65],"enterprises":[8],"by":[9],"offering":[10],"the":[11,46,118,139,149],"possibility":[12],"to":[13,29,60,88,98,111,124,131],"collect,":[14],"treat,":[15],"keep":[16],"and":[17,39,52,143,146],"make":[18],"information":[19],"avail-":[20],"able.":[21],"To":[22],"realize":[23],"these":[24],"tasks,":[25],"it":[26,59],"is":[27,73,87],"important":[28],"secure":[30],"from":[32],"intrusions":[33],"that":[34,115],"can":[35],"affect":[36],"confidentiality,":[37],"availability":[38],"integrity":[40],"information.":[42],"Un-":[43],"fortunately,":[44],"with":[45,128],"time,":[47],"technologies":[48],"are":[49,121],"more":[50],"used":[51,106],"various":[53],"types":[54],"attacks":[56],"act":[57],"on":[58,103,117],"create":[61],"intrusion":[62,70,94],"or":[63],"misuses":[64],"Systems.":[67],"Research":[68],"in":[69],"detection":[71,95],"field":[72],"still":[74],"looking":[75],"for":[76,107,138],"solutions":[77],"such":[79],"relevant":[80],"problems.":[81],"The":[82],"purpose":[83],"this":[85],"paper":[86],"present":[89],"an":[90],"overview":[91],"existing":[93],"techniques":[96],"compared":[97],"a":[99,133],"new":[100],"issue":[101],"based":[102],"process":[104],"mining":[105],"event":[108],"logs":[109],"analysis":[110],"detect":[112],"abnormal":[113,144],"events":[114,120,145],"occurs":[116],"system.":[119],"classified":[122],"accordingly":[123],"security":[125],"policy":[126],"etablished":[127],"fuzzy":[129,136],"logic":[130],"build":[132],"set":[134],"rules,":[137],"definition":[140],"normal":[142],"then":[147],"reduce":[148],"high":[150],"level":[151],"false":[153],"alerts.":[154]},"counts_by_year":[],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
