{"id":"https://openalex.org/W4403191928","doi":"https://doi.org/10.1007/s43926-024-00074-5","title":"Enhancing IoT intrusion detection through machine learning with AN-SFS: a novel approach to high performing adaptive feature selection","display_name":"Enhancing IoT intrusion detection through machine learning with AN-SFS: a novel approach to high performing adaptive feature selection","publication_year":2024,"publication_date":"2024-10-07","ids":{"openalex":"https://openalex.org/W4403191928","doi":"https://doi.org/10.1007/s43926-024-00074-5"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-024-00074-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00074-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00074-5.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00074-5.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048059926","display_name":"Supongmen Walling","orcid":"https://orcid.org/0000-0002-5840-9429"},"institutions":[{"id":"https://openalex.org/I3131484930","display_name":"National Institute of Technology Nagaland","ror":"https://ror.org/04cbvzp68","country_code":"IN","type":"education","lineage":["https://openalex.org/I3131484930"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Supongmen Walling","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology, Dimapur, Nagaland, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology, Dimapur, Nagaland, India","institution_ids":["https://openalex.org/I3131484930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056704537","display_name":"Sibesh Lodh","orcid":null},"institutions":[{"id":"https://openalex.org/I3131484930","display_name":"National Institute of Technology Nagaland","ror":"https://ror.org/04cbvzp68","country_code":"IN","type":"education","lineage":["https://openalex.org/I3131484930"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sibesh Lodh","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology, Dimapur, Nagaland, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology, Dimapur, Nagaland, India","institution_ids":["https://openalex.org/I3131484930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048059926"],"corresponding_institution_ids":["https://openalex.org/I3131484930"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":7.4747,"has_fulltext":true,"cited_by_count":23,"citation_normalized_percentile":{"value":0.9767299,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.8137017488479614},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6894108057022095},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6792433261871338},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.6429983377456665},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6409703493118286},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6122152805328369},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5374866724014282},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5322473049163818},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5036994814872742},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4362082779407501},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.19599518179893494},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.09646600484848022}],"concepts":[{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.8137017488479614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6894108057022095},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6792433261871338},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.6429983377456665},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6409703493118286},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6122152805328369},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5374866724014282},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5322473049163818},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5036994814872742},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4362082779407501},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.19599518179893494},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.09646600484848022},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-024-00074-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00074-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00074-5.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b6bb335951be42cdbf29145630516f25","is_oa":false,"landing_page_url":"https://doaj.org/article/b6bb335951be42cdbf29145630516f25","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 4, Iss 1, Pp 1-26 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-024-00074-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00074-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00074-5.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403191928.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1971673042","https://openalex.org/W2099940443","https://openalex.org/W2296509296","https://openalex.org/W2523827785","https://openalex.org/W2529525882","https://openalex.org/W2765929837","https://openalex.org/W2801256139","https://openalex.org/W2810550035","https://openalex.org/W2911627187","https://openalex.org/W2958285686","https://openalex.org/W2981372033","https://openalex.org/W3001675796","https://openalex.org/W3005805195","https://openalex.org/W3025363454","https://openalex.org/W3036517673","https://openalex.org/W3047526793","https://openalex.org/W3082458522","https://openalex.org/W3111758288","https://openalex.org/W3134696756","https://openalex.org/W3141567114","https://openalex.org/W3174736870","https://openalex.org/W3194730353","https://openalex.org/W3206674745","https://openalex.org/W4200484600","https://openalex.org/W4213361588","https://openalex.org/W4220668406","https://openalex.org/W4220982217","https://openalex.org/W4224220262","https://openalex.org/W4281817087"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W2133389611","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"The":[0],"vast":[1],"volume":[2],"of":[3,80,94,103,146,163,172],"redundant":[4],"and":[5,28,46,99,109,118,125,140,150,182],"irrelevant":[6,23],"network":[7],"traffic":[8],"data":[9],"poses":[10],"significant":[11],"hurdles":[12],"for":[13,21],"intrusion":[14],"detection.":[15],"Effective":[16],"feature":[17,48,71,97,120,165],"selection":[18,49,72,121,166],"is":[19],"crucial":[20],"eliminating":[22],"information.":[24],"Presently,":[25],"most":[26],"filtering":[27],"embedded":[29],"methods":[30,42,50],"rely":[31],"on":[32,91,148,152],"fixed":[33],"thresholds":[34],"or":[35],"ratios,":[36],"necessitating":[37],"prior":[38],"knowledge.":[39],"Conversely,":[40],"wrapper":[41],"are":[43],"computationally":[44],"intensive,":[45],"individual":[47],"may":[51],"introduce":[52],"biases":[53],"in":[54,136],"evaluation.":[55],"To":[56,158],"address":[57],"these":[58,193],"challenges,":[59],"this":[60],"study":[61],"introduces":[62],"Adaptive":[63],"Neighborhood":[64],"based":[65,90],"Feature":[66],"Selection":[67],"(AN-SFS),":[68],"a":[69,170],"dynamic":[70],"approach":[73,190],"that":[74],"adapts":[75],"to":[76,115],"local":[77],"statistical":[78,101,176],"properties":[79],"the":[81,92,95,161,183],"data.":[82],"Unlike":[83],"traditional":[84],"methods,":[85,177],"AN-SFS":[86,114],"adjusts":[87],"its":[88,196],"threshold":[89],"characteristics":[93],"current":[96],"subset":[98],"incorporates":[100],"measures":[102],"neighboring":[104],"features,":[105],"capturing":[106],"subtle":[107],"relationships":[108],"dependencies.":[110],"This":[111],"adaptability":[112],"enables":[113],"achieve":[116],"robust":[117],"effective":[119],"outcomes.":[122],"Using":[123],"NSL-KDD":[124,149],"UNSW-NB15":[126],"datasets,":[127],"our":[128,164,189],"model":[129],"demonstrates":[130],"superiority":[131],"over":[132],"conventional":[133],"ML":[134],"classifiers":[135],"detection":[137],"rate,":[138],"precision,":[139],"recall,":[141],"achieving":[142],"outstanding":[143],"accuracy":[144],"rates":[145],"99.3%":[147],"97.5%":[151],"UNSW-NB15,":[153],"significantly":[154],"outperforming":[155],"contemporary":[156],"methods.":[157],"further":[159],"demonstrate":[160],"effectiveness":[162],"approach,":[167],"we":[168],"conducted":[169],"series":[171],"comparisons":[173],"with":[174],"other":[175],"including":[178],"ANOVA,":[179],"Pearson":[180],"correlation,":[181],"chi-square":[184],"test.":[185],"In":[186],"each":[187],"comparison,":[188],"consistently":[191],"outperformed":[192],"alternatives,":[194],"underscoring":[195],"superior":[197],"efficacy.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-15T08:27:34.491423","created_date":"2025-10-10T00:00:00"}
