{"id":"https://openalex.org/W4413253419","doi":"https://doi.org/10.1007/s10791-025-09689-w","title":"Machine learning: enhanced dynamic clustering for privacy preservation and malicious node detection in industrial internet of things","display_name":"Machine learning: enhanced dynamic clustering for privacy preservation and malicious node detection in industrial internet of things","publication_year":2025,"publication_date":"2025-08-08","ids":{"openalex":"https://openalex.org/W4413253419","doi":"https://doi.org/10.1007/s10791-025-09689-w"},"language":"en","primary_location":{"id":"doi:10.1007/s10791-025-09689-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09689-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09689-w.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09689-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006535884","display_name":"Nabeela Hasan","orcid":"https://orcid.org/0000-0003-3081-9941"},"institutions":[{"id":"https://openalex.org/I283854653","display_name":"Machine Intelligence Research Institute","ror":"https://ror.org/01h4ass90","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I283854653"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nabeela Hasan","raw_affiliation_strings":["Artififcial Intelligence and Machine Learning Department, New Delhi Institute of Management, New Delhi, Delhi, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Artififcial Intelligence and Machine Learning Department, New Delhi Institute of Management, New Delhi, Delhi, India","institution_ids":["https://openalex.org/I283854653"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005695392","display_name":"Saima Saleem","orcid":"https://orcid.org/0000-0002-2788-7284"},"institutions":[{"id":"https://openalex.org/I105454292","display_name":"Guru Gobind Singh Indraprastha University","ror":"https://ror.org/034q1za58","country_code":"IN","type":"education","lineage":["https://openalex.org/I105454292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Saima Saleem","raw_affiliation_strings":["Institute of Information Technology and Management, GGSIPU, New Delhi, Delhi, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Technology and Management, GGSIPU, New Delhi, Delhi, India","institution_ids":["https://openalex.org/I105454292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026503691","display_name":"Mudassir Khan","orcid":"https://orcid.org/0000-0002-8184-3557"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]},{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["IN","SA"],"is_corresponding":false,"raw_author_name":"Mudassir Khan","raw_affiliation_strings":["Center for Research Impact and Outcome, Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, 140401, Punjab, India","Department of Computer Science, College of Computer Science, Applied College Tanumah, King Khalid University, Abha, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center for Research Impact and Outcome, Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, 140401, Punjab, India","institution_ids":["https://openalex.org/I74319210"]},{"raw_affiliation_string":"Department of Computer Science, College of Computer Science, Applied College Tanumah, King Khalid University, Abha, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113171986","display_name":"Abdulatif Alabdultif","orcid":null},"institutions":[{"id":"https://openalex.org/I156216236","display_name":"Qassim University","ror":"https://ror.org/01wsfe280","country_code":"SA","type":"education","lineage":["https://openalex.org/I156216236"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdulatif Alabdultif","raw_affiliation_strings":["Department of Computer Science, College of Computer, Qassim University, 52571, Buraydah, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer, Qassim University, 52571, Buraydah, Saudi Arabia","institution_ids":["https://openalex.org/I156216236"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057749568","display_name":"Mohammad Nezami","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammad Mazhar Nezami","raw_affiliation_strings":["Department of Computer Science and Artificial Intelligence, College of Computer Science and Information Technology, University of Bisha, 67714, Bisha, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Artificial Intelligence, College of Computer Science and Information Technology, University of Bisha, 67714, Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019854470","display_name":"Mansaf Alam","orcid":"https://orcid.org/0000-0002-6293-7005"},"institutions":[{"id":"https://openalex.org/I59475050","display_name":"Jamia Millia Islamia","ror":"https://ror.org/00pnhhv55","country_code":"IN","type":"education","lineage":["https://openalex.org/I59475050"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mansaf Alam","raw_affiliation_strings":["Department of Computer Science, Jamia Millia Islamia, New Delhi, Delhi, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Jamia Millia Islamia, New Delhi, Delhi, India","institution_ids":["https://openalex.org/I59475050"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5006535884"],"corresponding_institution_ids":["https://openalex.org/I283854653"],"apc_list":null,"apc_paid":null,"fwci":3.8114,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.93718116,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"28","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7648166418075562},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6719596982002258},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5663872361183167},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5516610145568848},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5265275239944458},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42799198627471924},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.42476242780685425},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4120996594429016},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3913343846797943},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2228897213935852},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21034765243530273},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13020256161689758},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11095628142356873}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7648166418075562},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6719596982002258},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5663872361183167},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5516610145568848},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5265275239944458},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42799198627471924},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.42476242780685425},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4120996594429016},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3913343846797943},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2228897213935852},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21034765243530273},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13020256161689758},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11095628142356873},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10791-025-09689-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09689-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09689-w.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d564e8fcae4a483cad2c140a65736e02","is_oa":true,"landing_page_url":"https://doaj.org/article/d564e8fcae4a483cad2c140a65736e02","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Computing, Vol 28, Iss 1, Pp 1-27 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s10791-025-09689-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09689-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09689-w.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6200000047683716}],"awards":[{"id":"https://openalex.org/G2186466424","display_name":null,"funder_award_id":"QU-APC-2025","funder_id":"https://openalex.org/F4320324403","funder_display_name":"Qassim University"}],"funders":[{"id":"https://openalex.org/F4320324403","display_name":"Qassim University","ror":"https://ror.org/01wsfe280"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413253419.pdf"},"referenced_works_count":54,"referenced_works":["https://openalex.org/W2598976192","https://openalex.org/W2769903624","https://openalex.org/W2803414046","https://openalex.org/W2940895343","https://openalex.org/W2959397500","https://openalex.org/W2964156143","https://openalex.org/W2974429275","https://openalex.org/W2979473545","https://openalex.org/W2990502541","https://openalex.org/W3008569902","https://openalex.org/W3017209816","https://openalex.org/W3057898108","https://openalex.org/W3083829175","https://openalex.org/W3112314931","https://openalex.org/W3125002451","https://openalex.org/W3128946327","https://openalex.org/W3136901928","https://openalex.org/W3159968328","https://openalex.org/W3162713913","https://openalex.org/W3169383506","https://openalex.org/W3194015233","https://openalex.org/W3201530369","https://openalex.org/W3202123766","https://openalex.org/W3202603325","https://openalex.org/W3203140391","https://openalex.org/W3213524376","https://openalex.org/W4206250038","https://openalex.org/W4210434788","https://openalex.org/W4229008987","https://openalex.org/W4283373744","https://openalex.org/W4285262410","https://openalex.org/W4285483409","https://openalex.org/W4313466938","https://openalex.org/W4317728309","https://openalex.org/W4381054313","https://openalex.org/W4381622506","https://openalex.org/W4382281941","https://openalex.org/W4385611204","https://openalex.org/W4386519176","https://openalex.org/W4386850845","https://openalex.org/W4387010514","https://openalex.org/W4389087247","https://openalex.org/W4391023335","https://openalex.org/W4392518990","https://openalex.org/W4394843758","https://openalex.org/W4394923514","https://openalex.org/W4396896687","https://openalex.org/W4401880165","https://openalex.org/W4402486641","https://openalex.org/W4403313129","https://openalex.org/W4405993426","https://openalex.org/W4406026431","https://openalex.org/W4406778919","https://openalex.org/W4410397834"],"related_works":["https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2558166297","https://openalex.org/W2734500670","https://openalex.org/W2315671126","https://openalex.org/W798507144","https://openalex.org/W2964481303","https://openalex.org/W1751413323","https://openalex.org/W1970141429","https://openalex.org/W4391095118"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"Industrial":[2],"Internet":[3],"of":[4,148],"Things":[5],"(IIoT)continues":[6],"to":[7,20,40,104,132,139],"redefine":[8],"industrial":[9,175],"automation":[10],"through":[11,55],"connected":[12],"smart":[13],"devices,":[14],"yet":[15],"it":[16,167],"remains":[17],"highly":[18,114],"vulnerable":[19],"privacy":[21,91,155],"breaches":[22],"and":[23,35,60,70,81,97,142,156,163,170],"malicious":[24,106],"intrusions.":[25],"This":[26],"research":[27],"introduces":[28],"ML-DCPP,":[29],"a":[30,98,113,128,168],"Machine":[31],"Learning-based":[32],"Dynamic":[33],"Clustering":[34],"Privacy":[36,67],"Preservation":[37],"framework":[38,76],"tailored":[39],"safeguard":[41],"IIoT":[42],"ecosystems.":[43],"By":[44],"integrating":[45],"adaptive":[46],"clustering":[47],"via":[48],"the":[49,65,75,88],"LEACH":[50],"protocol,":[51],"secure":[52],"key":[53],"distribution":[54],"Public":[56],"Key":[57],"Generators":[58],"(PKGs),":[59],"private":[61],"data":[62,82],"aggregation":[63],"using":[64],"Location":[66],"Tree":[68],"(LPT)":[69],"Chinese":[71],"Remainder":[72],"Theorem":[73],"(CRT),":[74],"addresses":[77],"both":[78],"communication":[79],"efficiency":[80],"confidentiality.":[83],"To":[84],"enhance":[85],"security":[86,157],"at":[87],"edge,":[89],"differential":[90],"with":[92,108],"Laplace":[93],"noise":[94],"is":[95,102],"incorporated,":[96],"Random":[99],"Forest":[100],"model":[101],"employed":[103],"detect":[105],"behavior":[107],"99.89%":[109],"accuracy,":[110],"validated":[111],"by":[112],"significant":[115],"t-test":[116],"(\u20137.87,":[117],"p":[118],"&lt;":[119],"0.0001).":[120],"Experimental":[121],"results":[122],"reveal":[123],"notable":[124],"system":[125],"improvements,":[126],"including":[127],"reduction":[129],"in":[130,137],"latency":[131],"0.45":[133],"s,":[134],"an":[135,143],"increase":[136],"throughput":[138],"280":[140],"tps,":[141],"optimized":[144],"cluster":[145],"convergence":[146],"time":[147],"4.91":[149],"s.":[150],"ML-DCPP":[151],"not":[152],"only":[153],"reinforces":[154],"measures":[158],"but":[159],"also":[160],"demonstrates":[161],"scalability":[162],"low":[164],"overhead,":[165],"making":[166],"practical":[169],"forward-looking":[171],"solution":[172],"for":[173],"securing":[174],"IoT":[176],"infrastructures.":[177]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
