{ "labelLang" : "hun", "responseDate" : "2024-03-28 14:50", "content" : { "otype" : "JournalArticle", "mtid" : 32709613, "status" : "APPROVED", "published" : true, "unhandledTickets" : 0, "deleted" : false, "lastRefresh" : "2022-11-30T07:29:29.262+0000", "lastModified" : "2022-11-29T18:17:36.354+0000", "created" : "2022-02-28T10:46:25.188+0000", "creator" : { "otype" : "Author", "mtid" : 10002275, "link" : "/api/author/10002275", "label" : "Kovács Szilveszter (Intelligens rendszerek)", "familyName" : "Kovács", "givenName" : "Szilveszter", "published" : true, "oldId" : 10002275, "snippet" : true }, "lastDuplumOK" : "2022-11-30T07:28:00.728+0000", "lastDuplumSearch" : "2022-11-30T07:28:00.728+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000059, "link" : "/api/subtype/10000059", "label" : "Szakcikk (Folyóiratcikk)", "name" : "Szakcikk", "nameEng" : "Article", "docType" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "listPosition" : 101, "published" : true, "oldId" : 10000059, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Kumar, Kapil", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 100846116, "link" : "/api/authorship/100846116", "label" : "Kumar, Kapil", "listPosition" : 1, "share" : 1.0, "first" : true, "last" : false, "corresponding" : false, "familyName" : "Kumar", "givenName" : "Kapil", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true } ], "title" : "Comprehensive Composition to Spot Intrusions by Optimized Gaussian Kernel SVM", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 20702345, "link" : "/api/publicationidentifier/20702345", "label" : "DOI: 10.4018/IJKBO.291689", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "idValue" : "10.4018/IJKBO.291689", "realUrl" : "https://doi.org/10.4018/IJKBO.291689", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 20702346, "link" : "/api/publicationidentifier/20702346", "label" : "Egyéb URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJKBO.291689", "source" : { "otype" : "PlainSource", "mtid" : 40, "link" : "/api/publicationsource/40", "label" : "Egyéb URL", "type" : { "otype" : "PublicationSourceType", "mtid" : 10006, "link" : "/api/publicationsourcetype/10006", "label" : "Link", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "Egyéb URL", "nameEng" : "Egyéb URL", "linkPattern" : "@@@", "publiclyVisible" : true, "published" : true, "oldId" : 40, "snippet" : true }, "idValue" : "http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJKBO.291689", "realUrl" : "http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJKBO.291689", "published" : false, "snippet" : true } ], "journal" : { "otype" : "Journal", "mtid" : 20061536, "link" : "/api/journal/20061536", "label" : "INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED ORGANIZATIONS 2155-6393 2155-6407", "pIssn" : "2155-6393", "eIssn" : "2155-6407", "reviewType" : "REVIEWED", "noIF" : false, "sciIndexed" : false, "scopusIndexed" : false, "hungarian" : false, "published" : true, "snippet" : true }, "volume" : "12", "issue" : "1", "firstPage" : "1", "lastPage" : "27", "firstPageOrInternalIdForSort" : "1", "pageLength" : 27, "publishedYear" : 2022, "digital" : true, "printed" : true, "sourceYear" : 2022, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : false, "nationalOrigin" : false, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2022-11-30", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 1, "citedCount" : 1, "references" : [ { "otype" : "Reference", "mtid" : 28648347, "link" : "/api/reference/28648347", "label" : "1. , DOI: 10.1002/ett.4150", "listPosition" : 1, "doi" : "10.1002/ett.4150", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648348, "link" : "/api/reference/28648348", "label" : "2. A.Mishra 2017: An effective intrusion detection framework is based on a support vector machine using NSL-KDD DATASET., International Journal on Computer Science and Engineering, p. 1", "listPosition" : 2, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648349, "link" : "/api/reference/28648349", "label" : "3. A.Alabdallah 2018: Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System., TIIS, 12, p. 5143", "listPosition" : 3, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648350, "link" : "/api/reference/28648350", "label" : "4. , DOI: 10.14569/IJACSA.2019.0100574", "listPosition" : 4, "doi" : "10.14569/IJACSA.2019.0100574", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648351, "link" : "/api/reference/28648351", "label" : "5. , DOI: 10.1155/2020/9024726", "listPosition" : 5, "doi" : "10.1155/2020/9024726", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648352, "link" : "/api/reference/28648352", "label" : "6. , DOI: 10.1109/ICMLA.2016.0040", "listPosition" : 6, "doi" : "10.1109/ICMLA.2016.0040", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648353, "link" : "/api/reference/28648353", "label" : "7. , DOI: 10.1109/SISY.2017.8080566", "listPosition" : 7, "doi" : "10.1109/SISY.2017.8080566", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648354, "link" : "/api/reference/28648354", "label" : "8. , DOI: 10.1016/j.eswa.2020.113249", "listPosition" : 8, "doi" : "10.1016/j.eswa.2020.113249", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648355, "link" : "/api/reference/28648355", "label" : "9. Arthur, D., & Vassilvitskii, S. (2007). k-means++: the advantages of careful seeding. In SODA'07: proceedings of the eighteenth annual ACM-SIAM symposium on discrete algorithms. Society for Industrial and Applied Mathematics.", "listPosition" : 9, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648356, "link" : "/api/reference/28648356", "label" : "10. , DOI: 10.1080/03610927408827101", "listPosition" : 10, "doi" : "10.1080/03610927408827101", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648357, "link" : "/api/reference/28648357", "label" : "11. , DOI: 10.5120/ijca2017913762", "listPosition" : 11, "doi" : "10.5120/ijca2017913762", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648358, "link" : "/api/reference/28648358", "label" : "12. , DOI: 10.1109/GCWCN.2018.8668618", "listPosition" : 12, "doi" : "10.1109/GCWCN.2018.8668618", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648359, "link" : "/api/reference/28648359", "label" : "13. , DOI: 10.1155/2018/8243905", "listPosition" : 13, "doi" : "10.1155/2018/8243905", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648360, "link" : "/api/reference/28648360", "label" : "14. Ferrag, M. A., Maglaras, L., Ahmim, A., Derdour, M., & Janicke, H. (2020). Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future Internet, 12(3), 44., DOI: 10.3390/fi12030044", "listPosition" : 14, "doi" : "10.3390/fi12030044", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648361, "link" : "/api/reference/28648361", "label" : "15. , DOI: 10.1080/01621459.1983.10478008", "listPosition" : 15, "doi" : "10.1080/01621459.1983.10478008", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648362, "link" : "/api/reference/28648362", "label" : "16. , DOI: 10.1155/2012/850259", "listPosition" : 16, "doi" : "10.1155/2012/850259", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648363, "link" : "/api/reference/28648363", "label" : "17. , DOI: 10.1109/ISNCC.2016.7746067", "listPosition" : 17, "doi" : "10.1109/ISNCC.2016.7746067", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648364, "link" : "/api/reference/28648364", "label" : "18. Hoque, M. S., Mukit, M., Bikas, M., & Naser, A. (2012). An implementation of an intrusion detection system using genetic algorithm. arXiv preprint arXiv:1204.1336", "listPosition" : 18, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648365, "link" : "/api/reference/28648365", "label" : "19. , DOI: 10.1007/BF01908075", "listPosition" : 19, "doi" : "10.1007/BF01908075", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648366, "link" : "/api/reference/28648366", "label" : "20. , DOI: 10.1145/3055635.3056595", "listPosition" : 20, "doi" : "10.1145/3055635.3056595", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648367, "link" : "/api/reference/28648367", "label" : "21. , DOI: 10.1002/(SICI)1097-0266(199606)17:6<441::AID-SMJ819>3.0.CO;2-G", "listPosition" : 21, "doi" : "10.1002/(SICI)1097-0266(199606)17:6<441::AID-SMJ819>3.0.CO;2-G", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648368, "link" : "/api/reference/28648368", "label" : "22. , DOI: 10.1007/s00778-006-0002-5", "listPosition" : 22, "doi" : "10.1007/s00778-006-0002-5", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648369, "link" : "/api/reference/28648369", "label" : "23. , DOI: 10.3390/app9112375", "listPosition" : 23, "doi" : "10.3390/app9112375", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648370, "link" : "/api/reference/28648370", "label" : "24. , DOI: 10.1109/ICICCT.2017.7975246", "listPosition" : 24, "doi" : "10.1109/ICICCT.2017.7975246", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648371, "link" : "/api/reference/28648371", "label" : "25. , DOI: 10.1007/s10115-016-1004-2", "listPosition" : 25, "doi" : "10.1007/s10115-016-1004-2", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648372, "link" : "/api/reference/28648372", "label" : "26. , DOI: 10.1145/3234698.3234733", "listPosition" : 26, "doi" : "10.1145/3234698.3234733", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648373, "link" : "/api/reference/28648373", "label" : "27. , DOI: 10.1155/2019/8124254", "listPosition" : 27, "doi" : "10.1155/2019/8124254", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648374, "link" : "/api/reference/28648374", "label" : "28. P.Lemenkova 2019: Processing oceanographic data by Python libraries NumPy, SciPy and Pandas. Aquatic Research., 2, p. 73", "listPosition" : 28, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648375, "link" : "/api/reference/28648375", "label" : "29. , DOI: 10.1155/2019/1574749", "listPosition" : 29, "doi" : "10.1155/2019/1574749", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648376, "link" : "/api/reference/28648376", "label" : "30. , DOI: 10.3390/app9204396", "listPosition" : 30, "doi" : "10.3390/app9204396", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648377, "link" : "/api/reference/28648377", "label" : "31. , DOI: 10.1155/2018/1578314", "listPosition" : 31, "doi" : "10.1155/2018/1578314", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648378, "link" : "/api/reference/28648378", "label" : "32. , DOI: 10.1155/2018/4943509", "listPosition" : 32, "doi" : "10.1155/2018/4943509", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648379, "link" : "/api/reference/28648379", "label" : "33. Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80-88., DOI: 10.1016/j.jisa.2018.11.007", "listPosition" : 33, "doi" : "10.1016/j.jisa.2018.11.007", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648380, "link" : "/api/reference/28648380", "label" : "34. , DOI: 10.1109/RTEICT.2016.7808050", "listPosition" : 34, "doi" : "10.1109/RTEICT.2016.7808050", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648381, "link" : "/api/reference/28648381", "label" : "35. , DOI: 10.1186/s40537-018-0145-4", "listPosition" : 35, "doi" : "10.1186/s40537-018-0145-4", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648382, "link" : "/api/reference/28648382", "label" : "36. S.Otoum 2018: Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures. In 2018 IEEE international conference on communications", "listPosition" : 36, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648383, "link" : "/api/reference/28648383", "label" : "37. , DOI: 10.1109/ACCESS.2018.2810267", "listPosition" : 37, "doi" : "10.1109/ACCESS.2018.2810267", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648384, "link" : "/api/reference/28648384", "label" : "38. A. S.Qureshi 2019: Intrusion detection using deep sparse auto-encoder and self-taught learning., Neural Computing & Applications, p. 1", "listPosition" : 38, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648385, "link" : "/api/reference/28648385", "label" : "39. , DOI: 10.1016/j.procs.2015.03.174", "listPosition" : 39, "doi" : "10.1016/j.procs.2015.03.174", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648386, "link" : "/api/reference/28648386", "label" : "40. , DOI: 10.1016/0377-0427(87)90125-7", "listPosition" : 40, "doi" : "10.1016/0377-0427(87)90125-7", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648387, "link" : "/api/reference/28648387", "label" : "41. , DOI: 10.1016/j.cose.2018.11.005", "listPosition" : 41, "doi" : "10.1016/j.cose.2018.11.005", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648388, "link" : "/api/reference/28648388", "label" : "42. , DOI: 10.1155/2018/9706706", "listPosition" : 42, "doi" : "10.1155/2018/9706706", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648389, "link" : "/api/reference/28648389", "label" : "43. , DOI: 10.1093/ietisy/e91-d.5.1282", "listPosition" : 43, "doi" : "10.1093/ietisy/e91-d.5.1282", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648390, "link" : "/api/reference/28648390", "label" : "44. , DOI: 10.1007/BF02289263", "listPosition" : 44, "doi" : "10.1007/BF02289263", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648391, "link" : "/api/reference/28648391", "label" : "45. , DOI: 10.1016/j.procs.2017.12.091", "listPosition" : 45, "doi" : "10.1016/j.procs.2017.12.091", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648392, "link" : "/api/reference/28648392", "label" : "46. S.Visa 2011: Confusion Matrix-based Feature Selection., MAICS, 710, p. 120", "listPosition" : 46, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648393, "link" : "/api/reference/28648393", "label" : "47. , DOI: 10.1016/j.commatsci.2018.05.018", "listPosition" : 47, "doi" : "10.1016/j.commatsci.2018.05.018", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648394, "link" : "/api/reference/28648394", "label" : "48. , DOI: 10.1109/ACCESS.2018.2868993", "listPosition" : 48, "doi" : "10.1109/ACCESS.2018.2868993", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648395, "link" : "/api/reference/28648395", "label" : "49. , DOI: 10.3390/app9020238", "listPosition" : 49, "doi" : "10.3390/app9020238", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648396, "link" : "/api/reference/28648396", "label" : "50. Yu, Long, & Cai. (2017). Network intrusion-detection through Stacking Dilated Convolutional Autoencoders. Hindawi, 1-11., DOI: 10.1155/2017/4184196", "listPosition" : 50, "doi" : "10.1155/2017/4184196", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648397, "link" : "/api/reference/28648397", "label" : "51. , DOI: 10.1155/2018/6026878", "listPosition" : 51, "doi" : "10.1155/2018/6026878", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648398, "link" : "/api/reference/28648398", "label" : "52. , DOI: 10.1155/2018/4678746", "listPosition" : 52, "doi" : "10.1155/2018/4678746", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648399, "link" : "/api/reference/28648399", "label" : "53. , DOI: 10.1109/ACCESS.2017.2762418", "listPosition" : 53, "doi" : "10.1109/ACCESS.2017.2762418", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 28648400, "link" : "/api/reference/28648400", "label" : "54. , DOI: 10.1155/2017/8439706", "listPosition" : 54, "doi" : "10.1155/2017/8439706", "published" : false, "snippet" : true } ], "hasCitationDuplums" : false, "userChangeableUntil" : "2022-05-29T09:46:26.046+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 3, "ownerInstituteCount" : 7, "directInstituteCount" : 0, "authorCount" : 1, "contributorCount" : 0, "hasQualityFactor" : false, "link" : "/api/publication/32709613", "label" : "Kumar Kapil. Comprehensive Composition to Spot Intrusions by Optimized Gaussian Kernel SVM. (2022) INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED ORGANIZATIONS 2155-6393 2155-6407 12 1 1-27", "template" : "