{"id":"https://openalex.org/W2979344246","doi":"https://doi.org/10.1109/issre.2019.00051","title":"Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD","display_name":"Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2979344246","doi":"https://doi.org/10.1109/issre.2019.00051","mag":"2979344246"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/issre.2019.00051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":"https://flore.unifi.it/bitstream/2158/1169185/5/RELOAD_ISSRE_V7_CameraReady.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027443752","display_name":"Tommaso Zoppi","orcid":"https://orcid.org/0000-0001-9820-6047"},"institutions":[{"id":"https://openalex.org/I45084792","display_name":"University of Florence","ror":"https://ror.org/04jr1s763","country_code":"IT","type":"education","lineage":["https://openalex.org/I45084792"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Tommaso Zoppi","raw_affiliation_strings":["Department of Mathematics and Informatics, University of Florence, Florence, (IT)"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Informatics, University of Florence, Florence, (IT)","institution_ids":["https://openalex.org/I45084792"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037781530","display_name":"Andrea Ceccarelli","orcid":"https://orcid.org/0000-0002-2291-2428"},"institutions":[{"id":"https://openalex.org/I45084792","display_name":"University of Florence","ror":"https://ror.org/04jr1s763","country_code":"IT","type":"education","lineage":["https://openalex.org/I45084792"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Ceccarelli","raw_affiliation_strings":["Department of Mathematics and Informatics, University of Florence, Florence, (IT)"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Informatics, University of Florence, Florence, (IT)","institution_ids":["https://openalex.org/I45084792"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016669256","display_name":"Andrea Bondavalli","orcid":"https://orcid.org/0000-0001-7366-6530"},"institutions":[{"id":"https://openalex.org/I45084792","display_name":"University of Florence","ror":"https://ror.org/04jr1s763","country_code":"IT","type":"education","lineage":["https://openalex.org/I45084792"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Bondavalli","raw_affiliation_strings":["Department of Mathematics and Informatics, University of Florence, Florence, (IT)"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Informatics, University of Florence, Florence, (IT)","institution_ids":["https://openalex.org/I45084792"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.77,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":18,"citation_normalized_percentile":{"value":0.733418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":null,"issue":null,"first_page":"446","last_page":"455"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9967,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6921799},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.66959107},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.45164487},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2675885}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/issre.2019.00051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hdl.handle.net/2158/1169185","pdf_url":"https://flore.unifi.it/bitstream/2158/1169185/5/RELOAD_ISSRE_V7_CameraReady.pdf","source":{"id":"https://openalex.org/S4306402033","display_name":"Florence Research (University of Florence)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45084792","host_organization_name":"University of Florence","host_organization_lineage":["https://openalex.org/I45084792"],"host_organization_lineage_names":["University of Florence"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://hdl.handle.net/2158/1169185","pdf_url":"https://flore.unifi.it/bitstream/2158/1169185/5/RELOAD_ISSRE_V7_CameraReady.pdf","source":{"id":"https://openalex.org/S4306402033","display_name":"Florence Research (University of Florence)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45084792","host_organization_name":"University of Florence","host_organization_lineage":["https://openalex.org/I45084792"],"host_organization_lineage_names":["University of Florence"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":38,"referenced_works":["https://openalex.org/W1489073918","https://openalex.org/W1584412742","https://openalex.org/W172260869","https://openalex.org/W1847058802","https://openalex.org/W1970978220","https://openalex.org/W1977869556","https://openalex.org/W1981565525","https://openalex.org/W1981738628","https://openalex.org/W1986332411","https://openalex.org/W2017524370","https://openalex.org/W2031163547","https://openalex.org/W2049551352","https://openalex.org/W2053262037","https://openalex.org/W2070493638","https://openalex.org/W2096868856","https://openalex.org/W2099940443","https://openalex.org/W2122379760","https://openalex.org/W2122646361","https://openalex.org/W2134490011","https://openalex.org/W2137576376","https://openalex.org/W2144182447","https://openalex.org/W2158143121","https://openalex.org/W2164463086","https://openalex.org/W2165250079","https://openalex.org/W2170988853","https://openalex.org/W2293385817","https://openalex.org/W2296509296","https://openalex.org/W2336788611","https://openalex.org/W2337344967","https://openalex.org/W2470039937","https://openalex.org/W2522718524","https://openalex.org/W2560021099","https://openalex.org/W2575139381","https://openalex.org/W2942578132","https://openalex.org/W2947869719","https://openalex.org/W3141656312","https://openalex.org/W4253461361","https://openalex.org/W42722137"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2478288626","https://openalex.org/W2390279801","https://openalex.org/W2382290278","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2350741829","https://openalex.org/W2073681303","https://openalex.org/W2051487156","https://openalex.org/W2001405890"],"abstract_inverted_index":{"Anomaly":[0,97],"detection":[1,18,66,72,126,196],"aims":[2],"at":[3],"identifying":[4],"patterns":[5],"in":[6],"data":[7,55,107,111,121],"that":[8],"do":[9],"not":[10],"conform":[11],"to":[12,29,77,103,138,167,192],"the":[13,25,37,51,93,115,120,170,177,180],"expected":[14],"behavior.":[15],"Despite":[16],"anomaly":[17,65,125],"has":[19],"been":[20],"arising":[21],"as":[22],"one":[23],"of":[24,54,119,153,158,179,187],"most":[26,116],"powerful":[27],"techniques":[28],"suspect":[30],"attacks":[31],"or":[32],"failures,":[33],"dedicated":[34],"support":[35,76],"for":[36,50,63,68,92],"experimental":[38],"evaluation":[39],"is":[40,101],"actually":[41],"scarce.":[42],"In":[43],"fact,":[44],"existing":[45,110],"frameworks":[46],"are":[47,80],"mostly":[48],"intended":[49],"broad":[52],"purposes":[53],"mining":[56],"and":[57,70,89,140,144,172,182,185,208],"machine":[58],"learning.":[59],"Intuitive":[60],"tools":[61],"tailored":[62],"evaluating":[64],"algorithms":[67,159],"failure":[69],"attack":[71],"with":[73,156],"an":[74,109,150,194],"intuitive":[75,90],"sliding":[78,132],"windows":[79],"currently":[81],"missing.":[82],"This":[83],"paper":[84],"presents":[85],"RELOAD,":[86,188],"a":[87,164,200],"flexible":[88],"tool":[91,181],"Rapid":[94],"EvaLuation":[95],"Of":[96],"Detection":[98],"algorithms.":[99],"RELOAD":[100,162,191],"able":[102],"automatically":[104],"i)":[105],"fetch":[106],"from":[108],"set,":[112,122],"ii)":[113],"identify":[114],"informative":[117],"features":[118,139],"iii)":[123],"run":[124],"algorithms,":[127],"including":[128],"those":[129],"based":[130],"on":[131,142,199],"windows,":[133],"iv)":[134],"apply":[135],"multiple":[136],"strategies":[137],"decide":[141],"anomalies,":[143],"v)":[145],"provide":[146],"conclusive":[147],"results":[148],"following":[149],"extensive":[151],"set":[152,168],"metrics,":[154],"along":[155],"plots":[157],"scores.":[160],"Finally,":[161],"includes":[163],"simple":[165],"GUI":[166],"up":[169],"experiments":[171],"examine":[173],"results.":[174],"After":[175],"describing":[176],"structure":[178],"detailing":[183],"inputs":[184],"outputs":[186],"we":[189],"exercise":[190],"analyze":[193],"intrusion":[195],"dataset":[197],"available":[198],"public":[201],"platform,":[202],"showing":[203],"its":[204],"setup,":[205],"metric":[206],"scores":[207],"plots.":[209]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2979344246","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5}],"updated_date":"2024-12-31T12:03:27.902933","created_date":"2019-10-18"}