{"id":"https://openalex.org/W4406228310","doi":"https://doi.org/10.1002/itl2.642","title":"Anomaly Detection System for Users and Devices Involved in Internet of Things Integrated Cloud Applications Using Machine Algorithms","display_name":"Anomaly Detection System for Users and Devices Involved in Internet of Things Integrated Cloud Applications Using Machine Algorithms","publication_year":2025,"publication_date":"2025-01-08","ids":{"openalex":"https://openalex.org/W4406228310","doi":"https://doi.org/10.1002/itl2.642"},"language":"en","primary_location":{"id":"doi:10.1002/itl2.642","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.642","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.642","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.642","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014583590","display_name":"S. Mirdula","orcid":null},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Mirdula","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Faculty of Engineering and Technology SRM Institute of Science and Technology  Chennai Tamil Nadu India","Department of Electronics and Communication Engineering, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Chennai, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Faculty of Engineering and Technology SRM Institute of Science and Technology  Chennai Tamil Nadu India","institution_ids":["https://openalex.org/I145286018"]},{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Chennai, Tamil Nadu, India","institution_ids":["https://openalex.org/I145286018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109949687","display_name":"M Roopa","orcid":null},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Roopa","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Faculty of Engineering and Technology SRM Institute of Science and Technology  Chennai Tamil Nadu India","Department of Electronics and Communication Engineering, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Chennai, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Faculty of Engineering and Technology SRM Institute of Science and Technology  Chennai Tamil Nadu India","institution_ids":["https://openalex.org/I145286018"]},{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Chennai, Tamil Nadu, India","institution_ids":["https://openalex.org/I145286018"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014583590"],"corresponding_institution_ids":["https://openalex.org/I145286018"],"apc_list":{"value":2630,"currency":"USD","value_usd":2630},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00456224,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8820176124572754},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8344208598136902},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6215061545372009},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5485473871231079},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5110348463058472},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.5093318223953247},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.43787702918052673},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43222230672836304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31252428889274597},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25989699363708496},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24224358797073364},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20798754692077637},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11105403304100037}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8820176124572754},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8344208598136902},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6215061545372009},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5485473871231079},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5110348463058472},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.5093318223953247},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.43787702918052673},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43222230672836304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31252428889274597},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25989699363708496},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24224358797073364},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20798754692077637},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11105403304100037}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/itl2.642","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.642","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.642","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1002/itl2.642","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.642","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.642","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406228310.pdf","grobid_xml":"https://content.openalex.org/works/W4406228310.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2883778034","https://openalex.org/W2910315044","https://openalex.org/W2947330499","https://openalex.org/W3102387010","https://openalex.org/W3160282572","https://openalex.org/W3200845768","https://openalex.org/W4387458975","https://openalex.org/W4387789547","https://openalex.org/W4390748831","https://openalex.org/W4393007161"],"related_works":["https://openalex.org/W2341492732","https://openalex.org/W3187193180","https://openalex.org/W106542691","https://openalex.org/W1699080303","https://openalex.org/W4297799326","https://openalex.org/W3116064965","https://openalex.org/W4287027380","https://openalex.org/W3193760048","https://openalex.org/W4285822516","https://openalex.org/W2505261959"],"abstract_inverted_index":{"ABSTRACT":[0],"Recently,":[1],"due":[2],"to":[3,17,48,99,152,186,210],"their":[4,212],"application":[5],"nature,":[6],"devices":[7,24],"in":[8,20,155,195,204],"the":[9,21,30,34,49,57,72,76,91,126,145,156,160,183,188,193],"Internet":[10,35],"of":[11,29,46,60,75,106,164],"Things":[12],"(IoT)":[13],"networks":[14,94,108],"also":[15,95],"need":[16],"be":[18],"involved":[19],"cloud.":[22],"IoT":[23,65,93,107,127,146,169],"generally":[25],"work":[26],"on":[27],"top":[28],"Internet,":[31],"whereas":[32],"today,":[33],"is":[36,68,78,109,140,171],"called":[37],"a":[38,110],"cloud":[39,61,77,157],"because":[40,80],"it":[41,84,209],"provides":[42],"an":[43,174],"uncountable":[44],"number":[45],"services":[47,62],"public.":[50],"Software,":[51],"Platform,":[52],"Infrastructure,":[53],"and":[54,114,117,150,162,177,206],"Service":[55],"are":[56],"base":[58],"classes":[59],"that":[63,71,191],"support":[64],"devices.":[66],"It":[67],"well":[69],"known":[70],"security":[73,129],"level":[74],"deficient":[79],"anyone":[81],"can":[82],"access":[83],"from":[85,102],"anywhere":[86],"at":[87],"any":[88,97],"strategy.":[89],"Like":[90],"cloud,":[92],"permit":[96],"device":[98],"join":[100],"anytime":[101],"anywhere.":[103],"This":[104,138],"vulnerability":[105],"cause":[111],"for":[112,124,135],"concern,":[113],"various":[115],"conventional":[116],"optimisation":[118],"methods":[119],"have":[120,132],"proposed":[121,166],"multiple":[122],"algorithms":[123,180,201],"increasing":[125],"Cloud's":[128],"level,":[130],"which":[131],"been":[133],"developed":[134],"particular":[136],"applications.":[137],"problem":[139],"solved":[141],"by":[142],"thoroughly":[143],"examining":[144],"devices,":[147],"user":[148],"information,":[149],"meta\u2010information":[151],"detect":[153],"anomalies":[154],"applications,":[158],"ensuring":[159],"validity":[161],"effectiveness":[163],"our":[165],"solution.":[167],"The":[168,198],"network":[170],"analyzed":[172],"using":[173],"NS2":[175],"simulator,":[176],"machine":[178,199],"learning":[179,200],"carry":[181],"out":[182],"data":[184],"analytics":[185],"select":[187],"best":[189],"one":[190],"outperforms":[192],"others":[194],"anomaly":[196],"detection.":[197],"were":[202],"implemented":[203],"Python":[205],"experimented":[207],"with":[208],"check":[211],"efficiency.":[213]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-10T00:00:00"}
