{"id":"https://openalex.org/W4404562154","doi":"https://doi.org/10.1007/s43926-024-00080-7","title":"Adaptive epsilon greedy reinforcement learning method in securing IoT devices in edge computing","display_name":"Adaptive epsilon greedy reinforcement learning method in securing IoT devices in edge computing","publication_year":2024,"publication_date":"2024-11-20","ids":{"openalex":"https://openalex.org/W4404562154","doi":"https://doi.org/10.1007/s43926-024-00080-7"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-024-00080-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00080-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00080-7.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00080-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010313617","display_name":"Anit Kumar","orcid":"https://orcid.org/0000-0002-2974-7429"},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Anit Kumar","raw_affiliation_strings":["Lovely Professional University, Phagwara, 144411, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Lovely Professional University, Phagwara, 144411, India","institution_ids":["https://openalex.org/I110360157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051187845","display_name":"Dhanpratap Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhanpratap Singh","raw_affiliation_strings":["Lovely Professional University, Phagwara, 144411, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Lovely Professional University, Phagwara, 144411, India","institution_ids":["https://openalex.org/I110360157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010313617"],"corresponding_institution_ids":["https://openalex.org/I110360157"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":2.9791,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.91981676,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.95169997215271,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9478999972343445,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7746777534484863},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6396826505661011},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6225384473800659},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6082391738891602},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5641399621963501},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.47695887088775635},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43927842378616333},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3803614675998688},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3617978096008301},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.32458239793777466},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.256896436214447},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23646476864814758},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21092626452445984}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7746777534484863},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6396826505661011},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6225384473800659},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6082391738891602},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5641399621963501},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.47695887088775635},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43927842378616333},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3803614675998688},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3617978096008301},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.32458239793777466},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.256896436214447},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23646476864814758},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21092626452445984}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-024-00080-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00080-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00080-7.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:420ffabaa8ea43e2bc3414dfb9edfea5","is_oa":true,"landing_page_url":"https://doaj.org/article/420ffabaa8ea43e2bc3414dfb9edfea5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 4, Iss 1, Pp 1-23 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-024-00080-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00080-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00080-7.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4404562154.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1557517019","https://openalex.org/W2065776696","https://openalex.org/W2327930618","https://openalex.org/W2344173564","https://openalex.org/W2621932567","https://openalex.org/W2626820647","https://openalex.org/W2752291283","https://openalex.org/W2800726470","https://openalex.org/W2801284618","https://openalex.org/W2896252239","https://openalex.org/W2944361694","https://openalex.org/W2963373072","https://openalex.org/W3003368997","https://openalex.org/W3010064966","https://openalex.org/W3020610382","https://openalex.org/W3039093196","https://openalex.org/W3082989441","https://openalex.org/W3128736325","https://openalex.org/W3173894487","https://openalex.org/W3177669185","https://openalex.org/W3195714424","https://openalex.org/W4214717370","https://openalex.org/W4224452014","https://openalex.org/W4233792721","https://openalex.org/W4281772078","https://openalex.org/W4297675419","https://openalex.org/W4308335451","https://openalex.org/W4312610944","https://openalex.org/W4313591527","https://openalex.org/W4389076875","https://openalex.org/W4390344185","https://openalex.org/W4402941449"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W1531601525","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W4386004629","https://openalex.org/W3023564924","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Attacks":[0],"on":[1,79,159,238],"IoT":[2,10,26,48,57,107,135,240,253],"devices":[3,11,27,58],"are":[4,94,114,257],"increasing":[5],"day":[6],"by":[7,45],"day.":[8],"Since":[9],"nowadays":[12],"have":[13],"become":[14],"an":[15,103],"integral":[16],"part":[17,153],"of":[18,100,102,106,117,185,221,261],"our":[19,209,268],"daily":[20],"lives,":[21],"the":[22,63,70,80,84,88,97,112,138,143,147,151,160,173,183,186,214,239,244,251,258,262],"data":[23,61,93,113,132,155,249],"gathered":[24],"from":[25,134,142,250],"benefits":[28],"intruders":[29],"in":[30,96,219,230],"many":[31,56],"ways.":[32],"Financial":[33],"and":[34,52,66,171,202,224],"Healthcare":[35],"institutions":[36],"also":[37],"allow":[38],"their":[39,43],"customers":[40],"to":[41,59,69,86,124,137,146,156,234,267],"use":[42,55],"services":[44],"using":[46],"handheld":[47],"devices.":[49,254],"Smart":[50],"homes":[51],"autonomous":[53],"vehicles":[54],"gather":[60],"through":[62],"built-in":[64],"sensors":[65,136],"send":[67],"it":[68,121],"Edge":[71,81,139,144,161],"server":[72,82,127,145,242,246],"for":[73,128,154,199],"further":[74],"processing.":[75],"The":[76,131,194,226,255],"computation":[77],"result":[78],"determines":[83],"decision":[85],"fulfill":[87],"user-specific":[89],"needs.":[90],"As":[91],"these":[92],"vital":[95],"future":[98],"cycle":[99],"execution":[101],"intelligent":[104],"algorithm":[105],"device":[108],"software":[109],"program,":[110],"hence":[111],"not":[115],"just":[116],"temporary":[118],"use,":[119],"but":[120],"is":[122,158,182,233],"transferred":[123],"a":[125,166],"Cloud":[126,148],"permanent":[129],"storage.":[130],"flows":[133],"server,":[140],"then":[141],"server.":[149,162],"Here":[150],"riskiest":[152],"stay":[157],"To":[163],"counter":[164],"such":[165],"security":[167,211,217],"risk,":[168],"we":[169],"proposed":[170,195,210,229],"implemented":[172],"Adaptive":[174],"Epsilon":[175,188],"Greedy":[176],"Reinforcement":[177],"Learning":[178],"(AEGRL)":[179],"method":[180,196,212],"which":[181,264],"extension":[184],"traditional":[187],"(\u2107)":[189],"greedy":[190],"reinforcement":[191],"learning":[192],"method.":[193],"works":[197],"efficiently":[198],"both":[200],"static":[201],"dynamic":[203],"environments.":[204],"Experimental":[205],"results":[206],"show":[207],"that":[208],"outperforms":[213],"recent":[215],"similar":[216],"approaches":[218],"terms":[220],"scalability,":[222],"robustness,":[223],"accuracy.":[225],"research":[227,269],"work":[228],"this":[231],"paper":[232],"prevent":[235],"malicious":[236],"attacks":[237],"edge":[241,245],"since":[243],"continuously":[247],"gathers":[248],"surrounding":[252],"following":[256],"main":[259],"highlights":[260],"paper,":[263],"bring":[265],"novelty":[266],"work.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
