{"id":"https://openalex.org/W3128369983","doi":"https://doi.org/10.1007/978-981-33-6835-4_8","title":"DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector","display_name":"DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3128369983","doi":"https://doi.org/10.1007/978-981-33-6835-4_8","mag":"3128369983"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-33-6835-4_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-33-6835-4_8","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004093410","display_name":"Minhaz Bin Farukee","orcid":null},"institutions":[{"id":"https://openalex.org/I17477748","display_name":"Rajshahi University of Engineering and Technology","ror":"https://ror.org/049ysg747","country_code":"BD","type":"education","lineage":["https://openalex.org/I17477748"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Minhaz Bin Farukee","raw_affiliation_strings":["Department of Computer Science and Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh","institution_ids":["https://openalex.org/I17477748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035823728","display_name":"M. S. Zaman Shabit","orcid":null},"institutions":[{"id":"https://openalex.org/I17477748","display_name":"Rajshahi University of Engineering and Technology","ror":"https://ror.org/049ysg747","country_code":"BD","type":"education","lineage":["https://openalex.org/I17477748"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"M. S. Zaman Shabit","raw_affiliation_strings":["Department of Computer Science and Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh","institution_ids":["https://openalex.org/I17477748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101566844","display_name":"Md. Rakibul Haque","orcid":null},"institutions":[{"id":"https://openalex.org/I17477748","display_name":"Rajshahi University of Engineering and Technology","ror":"https://ror.org/049ysg747","country_code":"BD","type":"education","lineage":["https://openalex.org/I17477748"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Md. Rakibul Haque","raw_affiliation_strings":["Department of Computer Science and Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh","institution_ids":["https://openalex.org/I17477748"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111001685","display_name":"A.H.M. Sarowar Sattar","orcid":"https://orcid.org/0000-0001-5149-9954"},"institutions":[{"id":"https://openalex.org/I17477748","display_name":"Rajshahi University of Engineering and Technology","ror":"https://ror.org/049ysg747","country_code":"BD","type":"education","lineage":["https://openalex.org/I17477748"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"A. H. M. Sarowar Sattar","raw_affiliation_strings":["Department of Computer Science and Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh","institution_ids":["https://openalex.org/I17477748"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004093410"],"corresponding_institution_ids":["https://openalex.org/I17477748"],"apc_list":null,"apc_paid":null,"fwci":9.8065,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.98581225,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"118","last_page":"134"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8841297626495361},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8126097917556763},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5368011593818665},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5004129409790039},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4958978593349457},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.49171262979507446},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.4858052730560303},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4629685878753662},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4483201205730438},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.43460613489151},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42830416560173035},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.4246007204055786},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.36620962619781494},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3238855004310608},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1290685534477234},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.11374819278717041}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8841297626495361},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8126097917556763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5368011593818665},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5004129409790039},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4958978593349457},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.49171262979507446},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.4858052730560303},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4629685878753662},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4483201205730438},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.43460613489151},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42830416560173035},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.4246007204055786},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.36620962619781494},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3238855004310608},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1290685534477234},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.11374819278717041},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-33-6835-4_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-33-6835-4_8","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1584308190","https://openalex.org/W1875061881","https://openalex.org/W2031163547","https://openalex.org/W2054717882","https://openalex.org/W2104692292","https://openalex.org/W2111619626","https://openalex.org/W2116873850","https://openalex.org/W2125283600","https://openalex.org/W2135293965","https://openalex.org/W2343448572","https://openalex.org/W2606537796","https://openalex.org/W2653102497","https://openalex.org/W2733765803","https://openalex.org/W2761181345","https://openalex.org/W2765736339","https://openalex.org/W2766585573","https://openalex.org/W2786075294","https://openalex.org/W2889885925","https://openalex.org/W2892341857","https://openalex.org/W2919115771","https://openalex.org/W2929803724","https://openalex.org/W2942653132","https://openalex.org/W2946445608","https://openalex.org/W2958285686","https://openalex.org/W2987485128","https://openalex.org/W2989230867","https://openalex.org/W3008535060","https://openalex.org/W4297957988","https://openalex.org/W6668491742","https://openalex.org/W6767379182","https://openalex.org/W6922685328"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2898696280","https://openalex.org/W2958385475","https://openalex.org/W2921433547","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2370216173","https://openalex.org/W3091388705"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
