{"id":"https://openalex.org/W3129455871","doi":"https://doi.org/10.1109/dependsys51298.2020.00015","title":"An Ensemble Feature Selection Method for IoT IDS","display_name":"An Ensemble Feature Selection Method for IoT IDS","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3129455871","doi":"https://doi.org/10.1109/dependsys51298.2020.00015","mag":"3129455871"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dependsys51298.2020.00015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065195138","display_name":"Alaa Alhowaide","orcid":"https://orcid.org/0000-0003-2825-2448"},"institutions":[{"id":"https://openalex.org/I130438778","display_name":"Memorial University of Newfoundland","ror":"https://ror.org/04haebc03","country_code":"CA","type":"education","lineage":["https://openalex.org/I130438778"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Alaa Alhowaide","raw_affiliation_strings":["Computer Science Department, Memorial University of Newfoundland, St. John's, NL, Canada"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Memorial University of Newfoundland, St. John's, NL, Canada","institution_ids":["https://openalex.org/I130438778"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075965221","display_name":"Izzat Alsmadi","orcid":"https://orcid.org/0000-0001-7832-5081"},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Izzat Alsmadi","raw_affiliation_strings":["Department of Computing and Cyber Security, Texas A&M University-San Antonio, San Antonio, Texas, United States"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Cyber Security, Texas A&M University-San Antonio, San Antonio, Texas, United States","institution_ids":["https://openalex.org/I1335518801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050725783","display_name":"Jian Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I130438778","display_name":"Memorial University of Newfoundland","ror":"https://ror.org/04haebc03","country_code":"CA","type":"education","lineage":["https://openalex.org/I130438778"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jian Tang","raw_affiliation_strings":["Computer Science Department, Memorial University of Newfoundland, St. John's, NL, Canada"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Memorial University of Newfoundland, St. John's, NL, Canada","institution_ids":["https://openalex.org/I130438778"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.255,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.740995,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":73,"max":77},"biblio":{"volume":"454","issue":null,"first_page":"41","last_page":"48"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9966,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.54895544},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble Learning","score":0.4707214}],"concepts":[{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.8612404},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8097358},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6702136},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.63277936},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6209256},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.559789},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.54895544},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.52280724},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.50353044},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5012741},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.4707214},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.44627744},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3761667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.071653426},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dependsys51298.2020.00015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1570713908","https://openalex.org/W1598874232","https://openalex.org/W1966809779","https://openalex.org/W1998846421","https://openalex.org/W2040884411","https://openalex.org/W2288558380","https://openalex.org/W2296509296","https://openalex.org/W2404581582","https://openalex.org/W2604813801","https://openalex.org/W2626250024","https://openalex.org/W2790513427","https://openalex.org/W2804368608","https://openalex.org/W2805398399","https://openalex.org/W2853755454","https://openalex.org/W2892556724","https://openalex.org/W2963197901","https://openalex.org/W2965552844","https://openalex.org/W2993263385","https://openalex.org/W2995972857"],"related_works":["https://openalex.org/W4311097251","https://openalex.org/W4296209631","https://openalex.org/W4247463117","https://openalex.org/W4245926026","https://openalex.org/W4200598720","https://openalex.org/W3097449145","https://openalex.org/W2950174689","https://openalex.org/W2921026492","https://openalex.org/W2625093826","https://openalex.org/W2586548817"],"abstract_inverted_index":{"The":[0],"usage":[1],"of":[2,5,33],"the":[3,46,83,90,97,110,116],"Internet":[4],"Things":[6],"(IoT)":[7],"is":[8],"growing":[9],"in":[10,24,30,104],"both":[11],"classical":[12],"and":[13,56],"new":[14],"application":[15],"domains.":[16],"Such":[17],"growth":[18],"comes":[19],"with":[20,93],"a":[21,75,101],"significant":[22],"increase":[23],"cyber":[25],"threats":[26],"accompanied":[27],"by":[28],"delays":[29],"detection.":[31],"Most":[32],"Intrusion":[34],"Detection":[35],"Systems":[36],"(IDSs)":[37],"do":[38],"not":[39,114],"employ":[40],"feature":[41,53,69,86,105],"selection":[42,54,70,87,106],"approaches":[43],"to":[44,78],"reduce":[45],"data":[47],"dimensionality.":[48],"This":[49],"research":[50],"applied":[51],"several":[52],"methods":[55,88],"detection":[57,117],"models":[58],"on":[59],"four":[60],"different":[61],"datasets.":[62],"We":[63],"also":[64],"proposed":[65,74,84,98],"an":[66],"ensemble-based":[67,85],"reliable":[68],"method.":[71],"Additionally,":[72],"we":[73],"novel":[76],"mechanism":[77],"nominate":[79],"features":[80],"dynamically.":[81],"Notably,":[82],"reduced":[89],"evaluated":[91],"dataset":[92],"66%":[94],"confidence.":[95],"Furthermore,":[96,109],"approach":[99],"showed":[100],"noticeable":[102],"improvement":[103],"methods'":[107],"efficiency.":[108],"gained":[111],"efficiency":[112],"did":[113],"compromise":[115],"models'":[118],"performance.":[119]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3129455871","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-01-03T09:43:04.146823","created_date":"2021-03-01"}