{"id":"https://openalex.org/W4415786975","doi":"https://doi.org/10.1007/s12083-025-02151-0","title":"AI-driven intrusion detection and mitigation framework for software-defined IoT networks","display_name":"AI-driven intrusion detection and mitigation framework for software-defined IoT networks","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4415786975","doi":"https://doi.org/10.1007/s12083-025-02151-0"},"language":"en","primary_location":{"id":"doi:10.1007/s12083-025-02151-0","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12083-025-02151-0","pdf_url":null,"source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069734642","display_name":"Jamal Alotaibi","orcid":"https://orcid.org/0009-0006-6000-6799"},"institutions":[{"id":"https://openalex.org/I4210092650","display_name":"Buraydah Colleges","ror":"https://ror.org/00j0krs40","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210092650"]},{"id":"https://openalex.org/I156216236","display_name":"Qassim University","ror":"https://ror.org/01wsfe280","country_code":"SA","type":"education","lineage":["https://openalex.org/I156216236"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Jamal Alotaibi","raw_affiliation_strings":["Department of Computer Engineering, College of Computer, Qassim University, Buraydah, 52571, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer, Qassim University, Buraydah, 52571, Saudi Arabia","institution_ids":["https://openalex.org/I4210092650","https://openalex.org/I156216236"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5069734642"],"corresponding_institution_ids":["https://openalex.org/I156216236","https://openalex.org/I4210092650"],"apc_list":{"value":2790,"currency":"EUR","value_usd":3590},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39013191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.6786999702453613,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.6786999702453613,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.16269999742507935,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.026599999517202377,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7728999853134155},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.527899980545044},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.499099999666214},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.47540000081062317},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4108000099658966},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3612000048160553},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3474000096321106},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.3264999985694885},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.32190001010894775}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7925000190734863},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7728999853134155},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.527899980545044},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.499099999666214},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.47540000081062317},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45179998874664307},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4180999994277954},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4108000099658966},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3626999855041504},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3612000048160553},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3564999997615814},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3474000096321106},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.3264999985694885},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.32190001010894775},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.31450000405311584},{"id":"https://openalex.org/C2986087404","wikidata":"https://www.wikidata.org/wiki/Q15946010","display_name":"Online learning","level":2,"score":0.3133000135421753},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.31220000982284546},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.27889999747276306},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2678999900817871},{"id":"https://openalex.org/C74750220","wikidata":"https://www.wikidata.org/wiki/Q2662197","display_name":"Differential evolution","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C2780150128","wikidata":"https://www.wikidata.org/wiki/Q21948731","display_name":"Extreme learning machine","level":3,"score":0.26510000228881836},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2558000087738037},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C2778067643","wikidata":"https://www.wikidata.org/wiki/Q166507","display_name":"Interval (graph theory)","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12083-025-02151-0","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12083-025-02151-0","pdf_url":null,"source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W3128699734","https://openalex.org/W3141567114","https://openalex.org/W3186684121","https://openalex.org/W3188220908","https://openalex.org/W4205194038","https://openalex.org/W4211244664","https://openalex.org/W4213012766","https://openalex.org/W4214752923","https://openalex.org/W4220935909","https://openalex.org/W4221140561","https://openalex.org/W4285506366","https://openalex.org/W4293051376","https://openalex.org/W4306827119","https://openalex.org/W4309080560","https://openalex.org/W4310541177","https://openalex.org/W4311970550","https://openalex.org/W4313891707","https://openalex.org/W4323979650","https://openalex.org/W4360584536","https://openalex.org/W4361010174","https://openalex.org/W4378365142","https://openalex.org/W4384525647","https://openalex.org/W4385948398","https://openalex.org/W4389559571","https://openalex.org/W4390906246","https://openalex.org/W4391046411","https://openalex.org/W4391478629","https://openalex.org/W4391558054","https://openalex.org/W4393231642","https://openalex.org/W4393346275","https://openalex.org/W4397292167","https://openalex.org/W4400835021","https://openalex.org/W4402511068","https://openalex.org/W4402632648","https://openalex.org/W4403079902","https://openalex.org/W4404055433","https://openalex.org/W4404517085","https://openalex.org/W4410248928","https://openalex.org/W4411142828","https://openalex.org/W4413279526"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-11-03T00:00:00"}
