Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1155/2022/9386989
Cloud services are a popular concept used to describe how internet-based services are delivered and maintained. The computer technology environment is being restructured with respect to information preservation. Data protection is of critical importance when storing huge volumes of information. In today’s cyber world, an intrusion is a significant security problem. Services, information, and services are all vulnerable to attack in the cloud due to its distributed structure of the cloud. Inappropriate behavior in the connection and in the host is detected using intrusion detection systems (IDS) in the cloud. DDoS attacks are difficult to protect against since they produce massive volumes of harmful information on the network. This assault forces the cloud services to become unavailable to target consumers, which depletes computer resources and leaves the provider exposed to massive financial and reputational losses. Cyber-analyst data mining techniques may assist in intrusion detection. Machine learning techniques are used to create many strategies. Attribute selection techniques are also vital in keeping the dataset’s dimensionality low. In this study, one method is provided, and the dataset is taken from the NSL-KDD dataset. In the first strategy, a filtering method called learning vector quantization (LVQ) is used, and in the second strategy, a dimensionality-simplifying method called PCA. The selected attributes from each technique are used for categorization before being tested against a DoS attack. This recent study shows that an LVQ-based SVM performs better than the competition in detecting threats.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1155/2022/9386989
- https://downloads.hindawi.com/journals/js/2022/9386989.pdf
- OA Status
- hybrid
- Cited By
- 14
- References
- 23
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4292014285
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4292014285Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1155/2022/9386989Digital Object Identifier
- Title
-
Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning AlgorithmWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-08-16Full publication date if available
- Authors
-
Pravin R. Kshirsagar, Hariprasath Manoharan, Hassan A. Alterazi, Nawaf Alhebaishi, Osama Rabie, Shitharth SelvarajanList of authors in order
- Landing page
-
https://doi.org/10.1155/2022/9386989Publisher landing page
- PDF URL
-
https://downloads.hindawi.com/journals/js/2022/9386989.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://downloads.hindawi.com/journals/js/2022/9386989.pdfDirect OA link when available
- Concepts
-
Computer science, Cloud computing, Intrusion detection system, Learning vector quantization, Machine learning, Data mining, Backup, Denial-of-service attack, Support vector machine, Artificial intelligence, Computer security, The Internet, Algorithm, Artificial neural network, World Wide Web, Database, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
14Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 2, 2024: 5, 2023: 4, 2022: 3Per-year citation counts (last 5 years)
- References (count)
-
23Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4292014285 |
|---|---|
| doi | https://doi.org/10.1155/2022/9386989 |
| ids.doi | https://doi.org/10.1155/2022/9386989 |
| ids.openalex | https://openalex.org/W4292014285 |
| fwci | 2.99938443 |
| type | article |
| title | Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm |
| biblio.issue | |
| biblio.volume | 2022 |
| biblio.last_page | 13 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11598 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9976999759674072 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Internet Traffic Analysis and Secure E-voting |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9962999820709229 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list.value | 2100 |
| apc_list.currency | USD |
| apc_list.value_usd | 2100 |
| apc_paid.value | 2100 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2100 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7702723145484924 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C79974875 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7073646187782288 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[1].display_name | Cloud computing |
| concepts[2].id | https://openalex.org/C35525427 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6175373792648315 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[2].display_name | Intrusion detection system |
| concepts[3].id | https://openalex.org/C40567965 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5405638813972473 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1820283 |
| concepts[3].display_name | Learning vector quantization |
| concepts[4].id | https://openalex.org/C119857082 |
| concepts[4].level | 1 |
| concepts[4].score | 0.5056123733520508 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[4].display_name | Machine learning |
| concepts[5].id | https://openalex.org/C124101348 |
| concepts[5].level | 1 |
| concepts[5].score | 0.4512825906276703 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[5].display_name | Data mining |
| concepts[6].id | https://openalex.org/C2780945871 |
| concepts[6].level | 2 |
| concepts[6].score | 0.44116392731666565 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q194274 |
| concepts[6].display_name | Backup |
| concepts[7].id | https://openalex.org/C38822068 |
| concepts[7].level | 3 |
| concepts[7].score | 0.4310173988342285 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[7].display_name | Denial-of-service attack |
| concepts[8].id | https://openalex.org/C12267149 |
| concepts[8].level | 2 |
| concepts[8].score | 0.42801111936569214 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q282453 |
| concepts[8].display_name | Support vector machine |
| concepts[9].id | https://openalex.org/C154945302 |
| concepts[9].level | 1 |
| concepts[9].score | 0.40208324790000916 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[9].display_name | Artificial intelligence |
| concepts[10].id | https://openalex.org/C38652104 |
| concepts[10].level | 1 |
| concepts[10].score | 0.39570552110671997 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[10].display_name | Computer security |
| concepts[11].id | https://openalex.org/C110875604 |
| concepts[11].level | 2 |
| concepts[11].score | 0.3885120153427124 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[11].display_name | The Internet |
| concepts[12].id | https://openalex.org/C11413529 |
| concepts[12].level | 1 |
| concepts[12].score | 0.3621991276741028 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[12].display_name | Algorithm |
| concepts[13].id | https://openalex.org/C50644808 |
| concepts[13].level | 2 |
| concepts[13].score | 0.164411723613739 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q192776 |
| concepts[13].display_name | Artificial neural network |
| concepts[14].id | https://openalex.org/C136764020 |
| concepts[14].level | 1 |
| concepts[14].score | 0.1484736204147339 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[14].display_name | World Wide Web |
| concepts[15].id | https://openalex.org/C77088390 |
| concepts[15].level | 1 |
| concepts[15].score | 0.1259865164756775 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[15].display_name | Database |
| concepts[16].id | https://openalex.org/C111919701 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[16].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7702723145484924 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/cloud-computing |
| keywords[1].score | 0.7073646187782288 |
| keywords[1].display_name | Cloud computing |
| keywords[2].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[2].score | 0.6175373792648315 |
| keywords[2].display_name | Intrusion detection system |
| keywords[3].id | https://openalex.org/keywords/learning-vector-quantization |
| keywords[3].score | 0.5405638813972473 |
| keywords[3].display_name | Learning vector quantization |
| keywords[4].id | https://openalex.org/keywords/machine-learning |
| keywords[4].score | 0.5056123733520508 |
| keywords[4].display_name | Machine learning |
| keywords[5].id | https://openalex.org/keywords/data-mining |
| keywords[5].score | 0.4512825906276703 |
| keywords[5].display_name | Data mining |
| keywords[6].id | https://openalex.org/keywords/backup |
| keywords[6].score | 0.44116392731666565 |
| keywords[6].display_name | Backup |
| keywords[7].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[7].score | 0.4310173988342285 |
| keywords[7].display_name | Denial-of-service attack |
| keywords[8].id | https://openalex.org/keywords/support-vector-machine |
| keywords[8].score | 0.42801111936569214 |
| keywords[8].display_name | Support vector machine |
| keywords[9].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[9].score | 0.40208324790000916 |
| keywords[9].display_name | Artificial intelligence |
| keywords[10].id | https://openalex.org/keywords/computer-security |
| keywords[10].score | 0.39570552110671997 |
| keywords[10].display_name | Computer security |
| keywords[11].id | https://openalex.org/keywords/the-internet |
| keywords[11].score | 0.3885120153427124 |
| keywords[11].display_name | The Internet |
| keywords[12].id | https://openalex.org/keywords/algorithm |
| keywords[12].score | 0.3621991276741028 |
| keywords[12].display_name | Algorithm |
| keywords[13].id | https://openalex.org/keywords/artificial-neural-network |
| keywords[13].score | 0.164411723613739 |
| keywords[13].display_name | Artificial neural network |
| keywords[14].id | https://openalex.org/keywords/world-wide-web |
| keywords[14].score | 0.1484736204147339 |
| keywords[14].display_name | World Wide Web |
| keywords[15].id | https://openalex.org/keywords/database |
| keywords[15].score | 0.1259865164756775 |
| keywords[15].display_name | Database |
| language | en |
| locations[0].id | doi:10.1155/2022/9386989 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S96783963 |
| locations[0].source.issn | 1687-725X, 1687-7268 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1687-725X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Journal of Sensors |
| locations[0].source.host_organization | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_name | Hindawi Publishing Corporation |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_lineage_names | Hindawi Publishing Corporation |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://downloads.hindawi.com/journals/js/2022/9386989.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Sensors |
| locations[0].landing_page_url | https://doi.org/10.1155/2022/9386989 |
| locations[1].id | pmh:oai:doaj.org/article:77d4d0621b6b47d09c94ce95e36b5f27 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Journal of Sensors, Vol 2022 (2022) |
| locations[1].landing_page_url | https://doaj.org/article/77d4d0621b6b47d09c94ce95e36b5f27 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5076524025 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-7381-6284 |
| authorships[0].author.display_name | Pravin R. Kshirsagar |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210146358 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Artificial Intelligence, G. H. Raisoni College of Engineering, Nagpur, India |
| authorships[0].institutions[0].id | https://openalex.org/I4210146358 |
| authorships[0].institutions[0].ror | https://ror.org/03dp11s58 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210146358 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Raisoni Group of Institutions |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Pravin R. Kshirsagar |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Artificial Intelligence, G. H. Raisoni College of Engineering, Nagpur, India |
| authorships[1].author.id | https://openalex.org/A5085186219 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Hariprasath Manoharan |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Electronics and Communication Engineering, Panimalar Engineering College, Poonamallee, Chennai, India |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Hariprasath Manoharan |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Electronics and Communication Engineering, Panimalar Engineering College, Poonamallee, Chennai, India |
| authorships[2].author.id | https://openalex.org/A5056741535 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-0137-9422 |
| authorships[2].author.display_name | Hassan A. Alterazi |
| authorships[2].countries | SA |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I185163786 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Saudi Arabia |
| authorships[2].institutions[0].id | https://openalex.org/I185163786 |
| authorships[2].institutions[0].ror | https://ror.org/02ma4wv74 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I185163786 |
| authorships[2].institutions[0].country_code | SA |
| authorships[2].institutions[0].display_name | King Abdulaziz University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Hassan A. Alterazi |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Saudi Arabia |
| authorships[3].author.id | https://openalex.org/A5017266517 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-0438-4243 |
| authorships[3].author.display_name | Nawaf Alhebaishi |
| authorships[3].countries | SA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I185163786 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Saudi Arabia |
| authorships[3].institutions[0].id | https://openalex.org/I185163786 |
| authorships[3].institutions[0].ror | https://ror.org/02ma4wv74 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I185163786 |
| authorships[3].institutions[0].country_code | SA |
| authorships[3].institutions[0].display_name | King Abdulaziz University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Nawaf Alhebaishi |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Saudi Arabia |
| authorships[4].author.id | https://openalex.org/A5064850998 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-8680-7080 |
| authorships[4].author.display_name | Osama Rabie |
| authorships[4].countries | SA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I185163786 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Saudi Arabia |
| authorships[4].institutions[0].id | https://openalex.org/I185163786 |
| authorships[4].institutions[0].ror | https://ror.org/02ma4wv74 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I185163786 |
| authorships[4].institutions[0].country_code | SA |
| authorships[4].institutions[0].display_name | King Abdulaziz University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Osama Bassam J. Rabie |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Saudi Arabia |
| authorships[5].author.id | https://openalex.org/A5067888843 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-4931-724X |
| authorships[5].author.display_name | Shitharth Selvarajan |
| authorships[5].countries | ET |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I4210107262, https://openalex.org/I4387152840 |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Computer Science & Engineering, Kebri Dehar University, Kebri Dehar, Ethiopia |
| authorships[5].institutions[0].id | https://openalex.org/I4387152840 |
| authorships[5].institutions[0].ror | https://ror.org/00r6xxj20 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I4387152840 |
| authorships[5].institutions[0].country_code | |
| authorships[5].institutions[0].display_name | Kebri Dehar University |
| authorships[5].institutions[1].id | https://openalex.org/I4210107262 |
| authorships[5].institutions[1].ror | https://ror.org/01vwxpj86 |
| authorships[5].institutions[1].type | government |
| authorships[5].institutions[1].lineage | https://openalex.org/I4210107262 |
| authorships[5].institutions[1].country_code | ET |
| authorships[5].institutions[1].display_name | Amhara Agricultural Research Institute |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | S. Shitharth |
| authorships[5].is_corresponding | True |
| authorships[5].raw_affiliation_strings | Department of Computer Science & Engineering, Kebri Dehar University, Kebri Dehar, Ethiopia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://downloads.hindawi.com/journals/js/2022/9386989.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm |
| has_fulltext | True |
| is_retracted | True |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2955195711, https://openalex.org/W1647056466, https://openalex.org/W2354454611, https://openalex.org/W2137852660, https://openalex.org/W2360214423, https://openalex.org/W2156017042, https://openalex.org/W2387580700, https://openalex.org/W2746581472, https://openalex.org/W2899285606, https://openalex.org/W60934498 |
| cited_by_count | 14 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 5 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 4 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 3 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1155/2022/9386989 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S96783963 |
| best_oa_location.source.issn | 1687-725X, 1687-7268 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1687-725X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Journal of Sensors |
| best_oa_location.source.host_organization | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_name | Hindawi Publishing Corporation |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://downloads.hindawi.com/journals/js/2022/9386989.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Sensors |
| best_oa_location.landing_page_url | https://doi.org/10.1155/2022/9386989 |
| primary_location.id | doi:10.1155/2022/9386989 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S96783963 |
| primary_location.source.issn | 1687-725X, 1687-7268 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1687-725X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Journal of Sensors |
| primary_location.source.host_organization | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_name | Hindawi Publishing Corporation |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://downloads.hindawi.com/journals/js/2022/9386989.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Sensors |
| primary_location.landing_page_url | https://doi.org/10.1155/2022/9386989 |
| publication_date | 2022-08-16 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W3003272299, https://openalex.org/W2997894255, https://openalex.org/W2979998718, https://openalex.org/W2995691346, https://openalex.org/W3014469150, https://openalex.org/W3004744731, https://openalex.org/W2943427313, https://openalex.org/W4220847861, https://openalex.org/W2980967918, https://openalex.org/W2592906302, https://openalex.org/W3172554013, https://openalex.org/W3216390247, https://openalex.org/W2988973149, https://openalex.org/W4327567955, https://openalex.org/W2810135582, https://openalex.org/W4285073103, https://openalex.org/W3178608626, https://openalex.org/W3184406784, https://openalex.org/W4226013632, https://openalex.org/W3210854102, https://openalex.org/W4225747846, https://openalex.org/W4281606134, https://openalex.org/W4281778452 |
| referenced_works_count | 23 |
| abstract_inverted_index.a | 3, 47, 185, 200, 219 |
| abstract_inverted_index.In | 40, 165, 181 |
| abstract_inverted_index.an | 44, 227 |
| abstract_inverted_index.in | 60, 73, 77, 87, 141, 159, 196, 235 |
| abstract_inverted_index.is | 20, 30, 46, 80, 170, 175, 193 |
| abstract_inverted_index.of | 31, 38, 68, 102 |
| abstract_inverted_index.on | 105 |
| abstract_inverted_index.to | 7, 25, 58, 64, 94, 114, 117, 129, 149 |
| abstract_inverted_index.DoS | 220 |
| abstract_inverted_index.SVM | 229 |
| abstract_inverted_index.The | 16, 205 |
| abstract_inverted_index.all | 56 |
| abstract_inverted_index.and | 14, 53, 76, 124, 132, 172, 195 |
| abstract_inverted_index.are | 2, 12, 55, 92, 147, 156, 211 |
| abstract_inverted_index.due | 63 |
| abstract_inverted_index.for | 213 |
| abstract_inverted_index.how | 9 |
| abstract_inverted_index.its | 65 |
| abstract_inverted_index.may | 139 |
| abstract_inverted_index.one | 168 |
| abstract_inverted_index.the | 61, 69, 74, 78, 88, 106, 111, 126, 161, 173, 178, 182, 197, 233 |
| abstract_inverted_index.DDoS | 90 |
| abstract_inverted_index.Data | 28 |
| abstract_inverted_index.PCA. | 204 |
| abstract_inverted_index.This | 108, 222 |
| abstract_inverted_index.also | 157 |
| abstract_inverted_index.data | 136 |
| abstract_inverted_index.each | 209 |
| abstract_inverted_index.from | 177, 208 |
| abstract_inverted_index.host | 79 |
| abstract_inverted_index.huge | 36 |
| abstract_inverted_index.low. | 164 |
| abstract_inverted_index.many | 151 |
| abstract_inverted_index.than | 232 |
| abstract_inverted_index.that | 226 |
| abstract_inverted_index.they | 98 |
| abstract_inverted_index.this | 166 |
| abstract_inverted_index.used | 6, 148, 212 |
| abstract_inverted_index.when | 34 |
| abstract_inverted_index.with | 23 |
| abstract_inverted_index.(IDS) | 86 |
| abstract_inverted_index.(LVQ) | 192 |
| abstract_inverted_index.Cloud | 0 |
| abstract_inverted_index.being | 21, 216 |
| abstract_inverted_index.cloud | 62, 112 |
| abstract_inverted_index.cyber | 42 |
| abstract_inverted_index.first | 183 |
| abstract_inverted_index.shows | 225 |
| abstract_inverted_index.since | 97 |
| abstract_inverted_index.study | 224 |
| abstract_inverted_index.taken | 176 |
| abstract_inverted_index.used, | 194 |
| abstract_inverted_index.using | 82 |
| abstract_inverted_index.vital | 158 |
| abstract_inverted_index.which | 120 |
| abstract_inverted_index.assist | 140 |
| abstract_inverted_index.attack | 59 |
| abstract_inverted_index.become | 115 |
| abstract_inverted_index.before | 215 |
| abstract_inverted_index.better | 231 |
| abstract_inverted_index.called | 188, 203 |
| abstract_inverted_index.cloud. | 70, 89 |
| abstract_inverted_index.create | 150 |
| abstract_inverted_index.forces | 110 |
| abstract_inverted_index.leaves | 125 |
| abstract_inverted_index.method | 169, 187, 202 |
| abstract_inverted_index.mining | 137 |
| abstract_inverted_index.recent | 223 |
| abstract_inverted_index.second | 198 |
| abstract_inverted_index.study, | 167 |
| abstract_inverted_index.target | 118 |
| abstract_inverted_index.tested | 217 |
| abstract_inverted_index.vector | 190 |
| abstract_inverted_index.world, | 43 |
| abstract_inverted_index.Machine | 144 |
| abstract_inverted_index.NSL-KDD | 179 |
| abstract_inverted_index.against | 96, 218 |
| abstract_inverted_index.assault | 109 |
| abstract_inverted_index.attack. | 221 |
| abstract_inverted_index.attacks | 91 |
| abstract_inverted_index.concept | 5 |
| abstract_inverted_index.dataset | 174 |
| abstract_inverted_index.exposed | 128 |
| abstract_inverted_index.harmful | 103 |
| abstract_inverted_index.keeping | 160 |
| abstract_inverted_index.losses. | 134 |
| abstract_inverted_index.massive | 100, 130 |
| abstract_inverted_index.popular | 4 |
| abstract_inverted_index.produce | 99 |
| abstract_inverted_index.protect | 95 |
| abstract_inverted_index.respect | 24 |
| abstract_inverted_index.storing | 35 |
| abstract_inverted_index.systems | 85 |
| abstract_inverted_index.volumes | 37, 101 |
| abstract_inverted_index.behavior | 72 |
| abstract_inverted_index.computer | 17, 122 |
| abstract_inverted_index.critical | 32 |
| abstract_inverted_index.dataset. | 180 |
| abstract_inverted_index.depletes | 121 |
| abstract_inverted_index.describe | 8 |
| abstract_inverted_index.detected | 81 |
| abstract_inverted_index.learning | 145, 189 |
| abstract_inverted_index.network. | 107 |
| abstract_inverted_index.performs | 230 |
| abstract_inverted_index.problem. | 50 |
| abstract_inverted_index.provider | 127 |
| abstract_inverted_index.security | 49 |
| abstract_inverted_index.selected | 206 |
| abstract_inverted_index.services | 1, 11, 54, 113 |
| abstract_inverted_index.threats. | 237 |
| abstract_inverted_index.Attribute | 153 |
| abstract_inverted_index.LVQ-based | 228 |
| abstract_inverted_index.Services, | 51 |
| abstract_inverted_index.delivered | 13 |
| abstract_inverted_index.detecting | 236 |
| abstract_inverted_index.detection | 84 |
| abstract_inverted_index.difficult | 93 |
| abstract_inverted_index.filtering | 186 |
| abstract_inverted_index.financial | 131 |
| abstract_inverted_index.intrusion | 45, 83, 142 |
| abstract_inverted_index.provided, | 171 |
| abstract_inverted_index.resources | 123 |
| abstract_inverted_index.selection | 154 |
| abstract_inverted_index.strategy, | 184, 199 |
| abstract_inverted_index.structure | 67 |
| abstract_inverted_index.technique | 210 |
| abstract_inverted_index.today’s | 41 |
| abstract_inverted_index.attributes | 207 |
| abstract_inverted_index.connection | 75 |
| abstract_inverted_index.consumers, | 119 |
| abstract_inverted_index.detection. | 143 |
| abstract_inverted_index.importance | 33 |
| abstract_inverted_index.protection | 29 |
| abstract_inverted_index.techniques | 138, 146, 155 |
| abstract_inverted_index.technology | 18 |
| abstract_inverted_index.vulnerable | 57 |
| abstract_inverted_index.competition | 234 |
| abstract_inverted_index.dataset’s | 162 |
| abstract_inverted_index.distributed | 66 |
| abstract_inverted_index.environment | 19 |
| abstract_inverted_index.information | 26, 104 |
| abstract_inverted_index.maintained. | 15 |
| abstract_inverted_index.significant | 48 |
| abstract_inverted_index.strategies. | 152 |
| abstract_inverted_index.unavailable | 116 |
| abstract_inverted_index.information, | 52 |
| abstract_inverted_index.information. | 39 |
| abstract_inverted_index.quantization | 191 |
| abstract_inverted_index.reputational | 133 |
| abstract_inverted_index.restructured | 22 |
| abstract_inverted_index.Cyber-analyst | 135 |
| abstract_inverted_index.Inappropriate | 71 |
| abstract_inverted_index.preservation. | 27 |
| abstract_inverted_index.categorization | 214 |
| abstract_inverted_index.dimensionality | 163 |
| abstract_inverted_index.internet-based | 10 |
| abstract_inverted_index.dimensionality-simplifying | 201 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 95 |
| corresponding_author_ids | https://openalex.org/A5067888843 |
| countries_distinct_count | 3 |
| institutions_distinct_count | 6 |
| corresponding_institution_ids | https://openalex.org/I4210107262, https://openalex.org/I4387152840 |
| citation_normalized_percentile.value | 0.87566853 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |