{"id":"https://openalex.org/W2789628275","doi":"https://doi.org/10.1109/access.2018.2801792","title":"A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security","display_name":"A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2789628275","doi":"https://doi.org/10.1109/access.2018.2801792","mag":"2789628275"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2801792","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8274985/08307061.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8274985/08307061.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050621611","display_name":"Nasser R. Sabar","orcid":"https://orcid.org/0000-0002-0276-4704"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nasser R. Sabar","raw_affiliation_strings":["Department of Computer Science and Information Technology, La Trobe University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, La Trobe University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100709723","display_name":"Xun Yi","orcid":"https://orcid.org/0000-0001-7351-5724"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xun Yi","raw_affiliation_strings":["School of Computer Science and Information Technology, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Technology, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056403144","display_name":"Andy Song","orcid":"https://orcid.org/0000-0002-7579-7048"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Andy Song","raw_affiliation_strings":["School of Computer Science and Information Technology, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Technology, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":3.872,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":45,"citation_normalized_percentile":{"value":0.918478,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"6","issue":null,"first_page":"10421","last_page":"10431"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.5709314},{"id":"https://openalex.org/keywords/hyper-heuristic","display_name":"Hyper-heuristic","score":0.54856557}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80680263},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7632355},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.5709314},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.56969696},{"id":"https://openalex.org/C117270229","wikidata":"https://www.wikidata.org/wiki/Q5957539","display_name":"Hyper-heuristic","level":5,"score":0.54856557},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.52710664},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48891154},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4875969},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.48707655},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48177978},{"id":"https://openalex.org/C137635306","wikidata":"https://www.wikidata.org/wiki/Q182667","display_name":"Pareto principle","level":2,"score":0.46719408},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44539762},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.41297814},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.20291755},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12692234},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08351609},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C188888258","wikidata":"https://www.wikidata.org/wiki/Q7353390","display_name":"Robot learning","level":4,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.0},{"id":"https://openalex.org/C19966478","wikidata":"https://www.wikidata.org/wiki/Q4810574","display_name":"Mobile robot","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2801792","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8274985/08307061.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/f7617c589f26400380992d5dd1a57cb9","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2801792","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8274985/08307061.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":57,"referenced_works":["https://openalex.org/W13034104","https://openalex.org/W1489517264","https://openalex.org/W1512383952","https://openalex.org/W1515180657","https://openalex.org/W1560724230","https://openalex.org/W1563088657","https://openalex.org/W1576809010","https://openalex.org/W1595498733","https://openalex.org/W1814515812","https://openalex.org/W1827822366","https://openalex.org/W1918839972","https://openalex.org/W1969163824","https://openalex.org/W1989048657","https://openalex.org/W1996264924","https://openalex.org/W1998177457","https://openalex.org/W2018117886","https://openalex.org/W2021264330","https://openalex.org/W2025001960","https://openalex.org/W2041099987","https://openalex.org/W2043128754","https://openalex.org/W2044374252","https://openalex.org/W2066220442","https://openalex.org/W2066496894","https://openalex.org/W2080780788","https://openalex.org/W2080905836","https://openalex.org/W2082758646","https://openalex.org/W2082776647","https://openalex.org/W2090342772","https://openalex.org/W2095537056","https://openalex.org/W2099505562","https://openalex.org/W2099940443","https://openalex.org/W2099964107","https://openalex.org/W2107889964","https://openalex.org/W2112204321","https://openalex.org/W2119251836","https://openalex.org/W2126105956","https://openalex.org/W2126299219","https://openalex.org/W2138882494","https://openalex.org/W2143381319","https://openalex.org/W2145680191","https://openalex.org/W2150295936","https://openalex.org/W2153635508","https://openalex.org/W2159128662","https://openalex.org/W2160109842","https://openalex.org/W2163206542","https://openalex.org/W2165607334","https://openalex.org/W2166078469","https://openalex.org/W2171798680","https://openalex.org/W2267635142","https://openalex.org/W2514388731","https://openalex.org/W26704448","https://openalex.org/W2732916693","https://openalex.org/W2734718015","https://openalex.org/W2927227509","https://openalex.org/W2950680102","https://openalex.org/W3144619878","https://openalex.org/W4206686222"],"related_works":["https://openalex.org/W4297052805","https://openalex.org/W4214899859","https://openalex.org/W3186374002","https://openalex.org/W3083497736","https://openalex.org/W2521454154","https://openalex.org/W2521049309","https://openalex.org/W2109775141","https://openalex.org/W2107678394","https://openalex.org/W2020754965","https://openalex.org/W1628567638"],"abstract_inverted_index":{"Cyber":[0],"security":[1,36,232],"in":[2,68,104],"the":[3,21,59,64,95,129,134,162,167,192,201,206,214,223,248],"context":[4],"of":[5,83,128,151,169,208,217,222],"big":[6,34,236],"data":[7,35,237],"is":[8,71,126,133,251],"known":[9],"to":[10,20,54,62,165,176,189,212],"be":[11,174],"a":[12,17,72,80,100,118,138,152,178],"critical":[13],"problem":[14,103,130],"and":[15,79,88,107,155,239,261],"presents":[16],"great":[18],"challenge":[19],"research":[22],"community.":[23],"Machine":[24],"learning":[25],"algorithms":[26],"have":[27,45],"been":[28,141,227],"suggested":[29],"as":[30,99,112],"candidates":[31],"for":[32,86,122,143],"handling":[33],"problems.":[37,52],"Among":[38],"these":[39],"algorithms,":[40],"support":[41],"vector":[42],"machines":[43],"(SVMs)":[44],"achieved":[46],"remarkable":[47],"success":[48],"on":[49,229],"various":[50],"classification":[51,238],"However,":[53],"establish":[55],"an":[56],"effective":[57],"SVM,":[58],"user":[60],"needs":[61],"define":[63],"proper":[65],"SVM":[66,96,180,193,218],"configuration":[67,97,194],"advance,":[69],"which":[70,105,170],"challenging":[73],"task":[74],"that":[75,125,137,247],"requires":[76],"expert":[77],"knowledge":[78],"large":[81],"amount":[82],"manual":[84],"effort":[85],"trial":[87],"error.":[89],"In":[90],"this":[91,144],"paper,":[92],"we":[93],"formulate":[94],"process":[98],"bi-objective":[101,123,199],"optimization":[102,124],"accuracy":[106],"model":[108],"complexity":[109],"are":[110],"considered":[111],"two":[113,230],"conflicting":[114],"objectives.":[115],"We":[116],"propose":[117],"novel":[119],"hyper-heuristic":[120,139,148],"framework":[121,149,203,225,250],"independent":[127],"domain.":[131],"This":[132],"first":[135],"time":[136],"has":[140,226],"developed":[142],"problem.":[145],"The":[146,158,182,220,243],"proposed":[147,202,224,249],"consists":[150],"high-level":[153,159],"strategy":[154,160],"low-level":[156,171,183],"heuristics.":[157],"uses":[161],"search":[163,195],"performance":[164],"control":[166],"selection":[168],"heuristic":[172],"should":[173],"used":[175],"generate":[177],"new":[179],"configuration.":[181],"heuristics":[184],"each":[185],"use":[186],"different":[187],"rules":[188],"effectively":[190],"explore":[191],"space.":[196],"To":[197],"address":[198],"optimization,":[200],"adaptively":[204],"integrates":[205],"strengths":[207],"decompositionand":[209],"Paretobased":[210],"approaches":[211],"approximate":[213],"Pareto":[215],"set":[216],"configurations.":[219],"effectiveness":[221],"evaluated":[228],"cyber":[231],"problems:":[233],"Microsoft":[234],"malware":[235],"anomaly":[240],"intrusion":[241],"detection.":[242],"obtained":[244],"results":[245],"demonstrate":[246],"very":[252],"effective,":[253],"if":[254],"not":[255],"superior,":[256],"compared":[257],"with":[258],"its":[259],"counterparts":[260],"other":[262],"algorithms.":[263]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2789628275","counts_by_year":[{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":2}],"updated_date":"2025-01-23T03:32:23.727309","created_date":"2018-03-29"}