{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:50:25Z","timestamp":1757778625655,"version":"3.40.5"},"reference-count":35,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1080\/24751839.2023.2214976","type":"journal-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T16:33:56Z","timestamp":1684946036000},"page":"409-436","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Towards data fusion-based big data analytics for intrusion detection"],"prefix":"10.1080","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1221","authenticated-orcid":false,"given":"Farah","family":"Jemili","sequence":"first","affiliation":[{"name":"University of Sousse, ISITCom, Mars Research Laboratory, Hammam, Sousse, Tunisia"}]}],"member":"301","published-online":{"date-parts":[[2023,5,24]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16210-7_39"},{"key":"e_1_3_5_3_1","unstructured":"Abraham M. A. & Koppen M. M. (2018). \u201cIntelligent Systems Design and Applications\u201d pp: 240-245."},{"key":"e_1_3_5_4_1","first-page":"103006","article-title":"A new feature selection approach for intrusion detection using machine learning algorithms","volume":"184","author":"Ahmadian A.","year":"2021","unstructured":"Ahmadian, A., & Yazdi, H. S. (2021). A new feature selection approach for intrusion detection using machine learning algorithms. Journal of Network and Computer Applications, 184, 103006.","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1027-3"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21144941"},{"key":"e_1_3_5_7_1","unstructured":"Ankur G. (2021a). \u201cBook : Neo4j Cookbook\u201d pp: 2 2021."},{"key":"e_1_3_5_8_1","unstructured":"Ankur G. (2021b). \u201cBook : Neo4j Cookbook\u201d pp: 51-52 2021."},{"key":"e_1_3_5_9_1","first-page":"27","volume-title":"Proceedings of the 2021 3rd international conference on computer science and artificial intelligence","author":"Arachchilage D. D. P. C.","year":"2021","unstructured":"Arachchilage, D. D. P. C., & Wijekoon, K. M. K. (2021). Improving the performance of intrusion detection systems by ensemble learning. Proceedings of the 2021 3rd international conference on computer science and artificial intelligence (pp. 27\u201333)."},{"key":"e_1_3_5_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11604-6"},{"key":"e_1_3_5_11_1","volume-title":"8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT 2018)","author":"Ben Fekih R.","year":"2018","unstructured":"Ben Fekih, R., & Jemili, F. (2018). Distributed architecture of an Intrusion detection system based on cloud computing and big data techniques. 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT 2018)."},{"issue":"10","key":"e_1_3_5_12_1","article-title":"Intrusion detection system using fuzzy genetic approach","volume":"1","author":"Ben Sujitha B.","year":"2020","unstructured":"Ben Sujitha, B., Roja Ramani, R., & Wari, P. (2020). Intrusion detection system using fuzzy genetic approach. International Journal of Advanced Research in Computer and Communication Engineering, 1(10).","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"e_1_3_5_13_1","unstructured":"DARPA. (1999). DATA: (https:\/\/web.cs.dal.ca\/~riyad\/Site\/Download.html)."},{"key":"e_1_3_5_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2016.7844977"},{"key":"e_1_3_5_15_1","first-page":"164","volume-title":"2021 5th international conference on computing methodologies and communication (ICCMC)","author":"Farhan H.","year":"2021","unstructured":"Farhan, H., Sattar, S., Raza, H., & Ali, S. (2021). Intrusion detection system using hybrid machine learning techniques. 2021 5th international conference on computing methodologies and communication (ICCMC), pp. 164\u2013170. IEEE."},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410352.3410817"},{"key":"e_1_3_5_17_1","unstructured":"Group BDW. (2020). \u201cBig Data Analytics for Security Intelligence\u201d. https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/bdwg\/Big_Data_Analytics_for_Security_Intelligence.pdf."},{"key":"e_1_3_5_18_1","unstructured":"Hadoop. (2020). https:\/\/hadoop.apache.org\/."},{"key":"e_1_3_5_19_1","unstructured":"Hadoop Architecture. (2020). https:\/\/hadoop.apache.org\/."},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959131"},{"key":"e_1_3_5_21_1","unstructured":"Islam M. S. S. & Islam A. R. (2021). Deep convolutional neural networks for network intrusion detection: A review. arXiv preprint arXiv:2101.10301."},{"key":"e_1_3_5_22_1","volume-title":"International journal of computational intelligence and information security December 2019","author":"Jeyepalan D. P.","year":"2019","unstructured":"Jeyepalan, D. P., & Kirubakaran, E. (2019). High performance network intrusion detection model using graph databases. International journal of computational intelligence and information security December 2019."},{"key":"e_1_3_5_23_1","unstructured":"KDD Cup. (1999). Data :(http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/)."},{"key":"e_1_3_5_24_1","article-title":"Use of genetic algorithm with fuzzy class association rule mining for intrusion detection","author":"Kharche D.","year":"2020","unstructured":"Kharche, D., & Patil, R. (2020). Use of genetic algorithm with fuzzy class association rule mining for intrusion detection. International Journal of Computer Science and Information Technologies.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010173"},{"issue":"5","key":"e_1_3_5_26_1","first-page":"118","article-title":"Intrusion detection system based on random forest with feature selection","volume":"9","author":"Li D.","year":"2021","unstructured":"Li, D., & Li, Y. (2021). Intrusion detection system based on random forest with feature selection. Journal of Computer and Communications, 9(5), 118\u2013128.","journal-title":"Journal of Computer and Communications"},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.001"},{"key":"e_1_3_5_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2022.2086784"},{"issue":"1","key":"e_1_3_5_29_1","first-page":"1","article-title":"An intrusion detection system using hybrid approach of rule-based and machine learning","volume":"4","author":"Pradhan A. B.","year":"2021","unstructured":"Pradhan, A. B., & Das, A. K. (2021). An intrusion detection system using hybrid approach of rule-based and machine learning. Journal of Cybersecurity and Information Management, 4(1), 1\u201314.","journal-title":"Journal of Cybersecurity and Information Management"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-020-00239-9"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330463"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2022.3210331"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2022.3173427"},{"key":"e_1_3_5_34_1","volume-title":"Proceedings of the 2019 IEEE symposium on computational intelligence in security and defense applications (CISDA 2019)","author":"Tavallaee M.","year":"2019","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. (2019). A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2019 IEEE symposium on computational intelligence in security and defense applications (CISDA 2019)."},{"key":"e_1_3_5_35_1","volume-title":"Proceedings of the thirty-second international florida artificial intelligence research society conference (FLAIRS-32)","author":"Velampalli S.","year":"2019","unstructured":"Velampalli, S., Mookiah, L., & Eberle, W. (2019). Discovering suspicious patterns using a graph based approach. Proceedings of the thirty-second international florida artificial intelligence research society conference (FLAIRS-32)."},{"key":"e_1_3_5_36_1","first-page":"1","article-title":"Intrusion detection system based on support vector machine and recursive feature elimination","author":"Yang X.","year":"2021","unstructured":"Yang, X., Yu, Y., & Hu, L. (2021). Intrusion detection system based on support vector machine and recursive feature elimination. Journal of Ambient Intelligence and Humanized Computing, 1\u201312.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2023.2214976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T09:17:37Z","timestamp":1698398257000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2023.2214976"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,24]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10,2]]}},"alternative-id":["10.1080\/24751839.2023.2214976"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2023.2214976","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"type":"print","value":"2475-1839"},{"type":"electronic","value":"2475-1847"}],"subject":[],"published":{"date-parts":[[2023,5,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-02-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}