{"id":"https://openalex.org/W2972289424","doi":"https://doi.org/10.1109/sahcn.2019.8824811","title":"Real Time Attack Detection with Deep Learning","display_name":"Real Time Attack Detection with Deep Learning","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2972289424","doi":"https://doi.org/10.1109/sahcn.2019.8824811","mag":"2972289424"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2019.8824811","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079097534","display_name":"Christian Callegari","orcid":"https://orcid.org/0000-0001-7323-8069"},"institutions":[],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Christian Callegari","raw_affiliation_strings":["RaSS National Laboratory \u2013 CNIT, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"RaSS National Laboratory \u2013 CNIT, Pisa, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050410672","display_name":"Elena Bucchianeri","orcid":null},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"funder","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Elena Bucchianeri","raw_affiliation_strings":["Dept. of Information Engineering, University of Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Engineering, University of Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021026284","display_name":"Stefano Giordano","orcid":"https://orcid.org/0000-0002-1408-7528"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"funder","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Giordano","raw_affiliation_strings":["Dept. of Information Engineering, University of Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Engineering, University of Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065635344","display_name":"Michele Pagano","orcid":"https://orcid.org/0000-0003-1706-4994"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"funder","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Michele Pagano","raw_affiliation_strings":["Dept. of Information Engineering, University of Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Engineering, University of Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.983,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":12,"citation_normalized_percentile":{"value":0.811983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.6144044}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80698115},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.76564586},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.75696254},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6676835},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.625336},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.6144044},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.52300566},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4896055},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4887769},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48561373},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.47681612},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4443785},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.44155756},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.4106395},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3907578},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37317687},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33086506},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10307258},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2019.8824811","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1642161394","https://openalex.org/W2468151085","https://openalex.org/W2735635925","https://openalex.org/W2762176006","https://openalex.org/W2762776925","https://openalex.org/W2766315530","https://openalex.org/W2771644755","https://openalex.org/W2883778034","https://openalex.org/W4243177562"],"related_works":["https://openalex.org/W3112374511","https://openalex.org/W2938728536","https://openalex.org/W2393267898","https://openalex.org/W2392864074","https://openalex.org/W2383301100","https://openalex.org/W2369874171","https://openalex.org/W2352639800","https://openalex.org/W2280598164","https://openalex.org/W2189092700","https://openalex.org/W2013909972"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,10,16,22,38,144,150],"Things":[3],"(IoT)":[4],"significantly":[5],"extends":[6],"the":[7,11,14,27,36,103,121],"attack":[8,43],"surface":[9],"Internet,":[12],"making":[13],"use":[15],"an":[17,45,57,83,148],"Anomaly-based":[18],"Intrusion":[19,84],"Detection":[20,85],"System":[21,86],"paramount":[23],"importance.":[24],"Despite":[25],"in":[26,67,78,100,106],"last":[28],"years":[29],"big":[30],"research":[31],"efforts":[32],"have":[33],"focused":[34],"on":[35,89],"application":[37],"Deep":[39,94],"Learning":[40],"techniques":[41],"to":[42,50,72,98,126],"detection,":[44],"ultimate":[46],"real-time":[47],"solution,":[48],"able":[49,97],"provide":[51],"a":[52,107,135],"high":[53],"detection":[54,113,145],"rate":[55,61],"with":[56,134,147],"acceptable":[58],"false":[59,117],"alarm":[60,118],"while":[62],"processing":[63],"raw":[64],"network":[65],"traffic":[66,104],"real":[68,101],"time,":[69],"has":[70],"still":[71],"be":[73],"identified.":[74],"For":[75],"this":[76,79],"reason,":[77],"paper":[80],"we":[81,139],"propose":[82],"that,":[87,133],"leveraging":[88],"probabilistic":[90],"data":[91],"structures":[92],"and":[93,115,128],"Learning,":[95],"is":[96],"process":[99],"time":[102],"collected":[105],"backbone":[108],"network,":[109],"offering":[110],"almost":[111],"optimal":[112],"performance":[114],"low":[116],"rate.":[119],"Indeed,":[120],"extensive":[122],"experimental":[123],"tests,":[124],"run":[125],"validate":[127],"evaluate":[129],"our":[130],"system,":[131],"confirm":[132],"proper":[136],"parameter":[137],"setting,":[138],"can":[140],"achieve":[141],"about":[142],"90%":[143],"rate,":[146],"accuracy":[149],"0.871.":[151]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2972289424","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-04-20T04:21:26.955501","created_date":"2019-09-12"}