{ "labelLang" : "hun", "responseDate" : "2024-03-28 18:24", "content" : { "otype" : "BookChapter", "mtid" : 31915340, "status" : "APPROVED", "published" : true, "unhandledTickets" : 0, "deleted" : false, "lastRefresh" : "2022-06-21T11:07:13.648+0000", "lastModified" : "2021-03-14T10:10:42.862+0000", "created" : "2021-03-14T10:10:34.826+0000", "creator" : { "otype" : "Author", "mtid" : 10002275, "link" : "/api/author/10002275", "label" : "Kovács Szilveszter (Intelligens rendszerek)", "familyName" : "Kovács", "givenName" : "Szilveszter", "published" : true, "oldId" : 10002275, "snippet" : true }, "lastDuplumOK" : "2021-03-14T10:10:36.512+0000", "lastDuplumSearch" : "2021-03-14T10:10:36.512+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000398, "link" : "/api/subtype/10000398", "label" : "Könyvfejezet (Könyvrészlet)", "name" : "Könyvfejezet", "nameEng" : "Chapter", "docType" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "listPosition" : 220, "published" : true, "oldId" : 10000398, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Shahriar, Hossain", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 95691008, "link" : "/api/authorship/95691008", "label" : "Shahriar, Hossain", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "corresponding" : false, "familyName" : "Shahriar", "givenName" : "Hossain", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 95691009, "link" : "/api/authorship/95691009", "label" : "Nimmagadda, Sravya", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : true, "corresponding" : false, "familyName" : "Nimmagadda", "givenName" : "Sravya", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true } ], "title" : "Network Intrusion Detection for TCP/IP Packets with Machine Learning Techniques", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 18528934, "link" : "/api/publicationidentifier/18528934", "label" : "DOI: 10.1007/978-3-030-57024-8_10", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "idValue" : "10.1007/978-3-030-57024-8_10", "realUrl" : "https://doi.org/10.1007%2F978-3-030-57024-8_10", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 18528936, "link" : "/api/publicationidentifier/18528936", "label" : "Scopus: 85097905043", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "idValue" : "85097905043", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097905043", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 18528935, "link" : "/api/publicationidentifier/18528935", "label" : "Egyéb URL: http://link.springer.com/10.1007/978-3-030-57024-8_10", "source" : { "otype" : "PlainSource", "mtid" : 40, "link" : "/api/publicationsource/40", "label" : "Egyéb URL", "type" : { "otype" : "PublicationSourceType", "mtid" : 10006, "link" : "/api/publicationsourcetype/10006", "label" : "Link", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "Egyéb URL", "nameEng" : "Egyéb URL", "linkPattern" : "@@@", "publiclyVisible" : true, "published" : true, "oldId" : 40, "snippet" : true }, "idValue" : "http://link.springer.com/10.1007/978-3-030-57024-8_10", "realUrl" : "http://link.springer.com/10.1007/978-3-030-57024-8_10", "published" : false, "snippet" : true } ], "firstPage" : "231", "lastPage" : "247", "internalId" : "Chapter 10", "firstPageOrInternalIdForSort" : "231, Chapter 10", "pageLength" : 17, "publishedYear" : 2021, "digital" : true, "printed" : true, "sourceYear" : 2021, "foreignEdition" : null, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : false, "nationalOrigin" : null, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2022-06-21", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 1, "citedCount" : 1, "references" : [ { "otype" : "Reference", "mtid" : 18991588, "link" : "/api/reference/18991588", "label" : "1. Almseidin M, Alzubi M, Kovacs S Evaluation of machine learning algorithm for intrusion detection system. Department of Information Technology,University of Miskolc, H-3515", "listPosition" : 1, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991589, "link" : "/api/reference/18991589", "label" : "2. Paloalto, Cyberpedia, What is denial of service attack? https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos", "listPosition" : 2, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991590, "link" : "/api/reference/18991590", "label" : "3. Oke G, Loukas G Distributed defense against denial of service attacks: a practical view, Dept. of Electrical and Electronic Engineering Imperial College London SW72BT", "listPosition" : 3, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991591, "link" : "/api/reference/18991591", "label" : "4. Felter B, Vxchange, May 31 2019, 5 most famous recent DDos Attacks.", "listPosition" : 4, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991592, "link" : "/api/reference/18991592", "label" : "5. Veeremreddy J, Prasad KM, Anomaly-based Intrusion Detection System, June 2019.", "listPosition" : 5, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991593, "link" : "/api/reference/18991593", "label" : "6. Wikipedia, Anomaly- based Intrusion detection System", "listPosition" : 6, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991594, "link" : "/api/reference/18991594", "label" : "7. Basarsian MS, Bakir H (2019) Fuzzy logic and correlation- based hybrid classification on hepatitis disease data set. In: 2019 International Conference on Artificial Intelligience., DOI: 10.1007/978-3-030-36178-5_68", "listPosition" : 7, "doi" : "10.1007/978-3-030-36178-5_68", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991595, "link" : "/api/reference/18991595", "label" : "8. Alsharafat W (2013) Applying artificial neural network and extended classifier system for network intrusion detection. Int Arab J Inf Technol (IAJIT), 10(3)", "listPosition" : 8, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991596, "link" : "/api/reference/18991596", "label" : "9. Bhargava, Sharma G, Bhargava R, Mathuria M (2013) Decision tree analysis on j48 algorithm for data mining. Proce Int J Adv Res Comput Sci Softw Eng 3(6)", "listPosition" : 9, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991597, "link" : "/api/reference/18991597", "label" : "10. LaRoche P, Zincir-Heywood N (2009) Evolving TCP/IP packets: a case study pf port scans. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Application., DOI: 10.1109/CISDA.2009.5356541", "listPosition" : 10, "doi" : "10.1109/CISDA.2009.5356541", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991598, "link" : "/api/reference/18991598", "label" : "11. Alkasassbeh M, Al-Naymat G, Hassanat AB, Almseidin M (2016) Detecting distributed denial of service attacks using data mining techniques. Int J Adv Comput Sci Appl 1(7):436–445", "listPosition" : 11, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991599, "link" : "/api/reference/18991599", "label" : "12. Bay SD (1999) The uci kdd archive [http://kdd. ics. uci. edu]. irvine, ca: University of california. Department of Information and Computer Science, vol 404, pp 405", "listPosition" : 12, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991600, "link" : "/api/reference/18991600", "label" : "13. Zaman S, Karray F TCP/IP Model and Intrusion Detection Systems, IEEE", "listPosition" : 13, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991601, "link" : "/api/reference/18991601", "label" : "14. Gervais H, Munif A, Ahmad T (2016) Using quality thersold distance to detect intrusion in TCP/IP network. In: 2016 IEEE International Conference on Communication, Network and Satellite., DOI: 10.1109/COMNETSAT.2016.7907421", "listPosition" : 14, "doi" : "10.1109/COMNETSAT.2016.7907421", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991602, "link" : "/api/reference/18991602", "label" : "15. Fleizach, Fukushima S (1998) A naive bayes classifier on 1998 kdd cup", "listPosition" : 15, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991603, "link" : "/api/reference/18991603", "label" : "16. Bahrololum M, Salahi E (2009) Machine learning techniques for feature reduction in intrusion detection systems. In: Fourth International Conference on Computer Science and Convergence Information Technology, DOI: 10.1109/ICCIT.2009.89", "listPosition" : 16, "doi" : "10.1109/ICCIT.2009.89", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 18991604, "link" : "/api/reference/18991604", "label" : "17. Sahu S, Mehtra BM (2015) Network intrusion detection system using J48 decision tree. In: 2015 IEEE International Conference On Advance In Computing, Communication and Informatics., DOI: 10.1109/ICACCI.2015.7275914", "listPosition" : 17, "doi" : "10.1109/ICACCI.2015.7275914", "published" : false, "snippet" : true } ], "hasCitationDuplums" : false, "userChangeableUntil" : "2021-06-12T09:10:36.131+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 3, "ownerInstituteCount" : 7, "directInstituteCount" : 0, "authorCount" : 2, "contributorCount" : 0, "book" : { "otype" : "Book", "mtid" : 31915341, "link" : "/api/publication/31915341", "label" : "Baddi Youssef. Machine Intelligence and Big Data Analytics for Cybersecurity Applications. (2021) ISBN:9783030570248; 9783030570231", "core" : false, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "Machine Intelligence and Big Data Analytics for Cybersecurity Applications", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 18528933, "link" : "/api/publicationidentifier/18528933", "label" : "ISBN: 9783030570248", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9783030570248", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9783030570248", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 18528932, "link" : "/api/publicationidentifier/18528932", "label" : "ISBN: 9783030570231", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9783030570231", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9783030570231", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 18528931, "link" : "/api/publicationidentifier/18528931", "label" : "Egyéb URL: http://link.springer.com/10.1007/978-3-030-57024-8", "source" : { "otype" : "PlainSource", "mtid" : 40, "link" : "/api/publicationsource/40", "label" : "Egyéb URL", "type" : { "otype" : "PublicationSourceType", "mtid" : 10006, "link" : "/api/publicationsourcetype/10006", "label" : "Link", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "Egyéb URL", "nameEng" : "Egyéb URL", "linkPattern" : "@@@", "publiclyVisible" : true, "published" : true, "oldId" : 40, "snippet" : true }, "idValue" : "http://link.springer.com/10.1007/978-3-030-57024-8", "realUrl" : "http://link.springer.com/10.1007/978-3-030-57024-8", "published" : false, "snippet" : true } ], "publishedAt" : [ ], "publishedYear" : 2021, "foreignLanguage" : true, "fullPublication" : false, "published" : true, "snippet" : true }, "hasQualityFactor" : false, "link" : "/api/publication/31915340", "label" : "Shahriar Hossain et al. Network Intrusion Detection for TCP/IP Packets with Machine Learning Techniques. (2021) Megjelent: Machine Intelligence and Big Data Analytics for Cybersecurity Applications pp. 231-247", "template" : "