{"id":"https://openalex.org/W4411845063","doi":"https://doi.org/10.1007/s43926-025-00156-y","title":"Enhancing cybersecurity in IoT systems: a hybrid deep learning approach for real-time attack detection","display_name":"Enhancing cybersecurity in IoT systems: a hybrid deep learning approach for real-time attack detection","publication_year":2025,"publication_date":"2025-07-01","ids":{"openalex":"https://openalex.org/W4411845063","doi":"https://doi.org/10.1007/s43926-025-00156-y"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00156-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00156-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00156-y.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00156-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100865183","display_name":"Mohammad Zahid","orcid":"https://orcid.org/0009-0001-0915-5434"},"institutions":[{"id":"https://openalex.org/I59475050","display_name":"Jamia Millia Islamia","ror":"https://ror.org/00pnhhv55","country_code":"IN","type":"education","lineage":["https://openalex.org/I59475050"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mohammad Zahid","raw_affiliation_strings":["Department of Computer Science, Jamia Millia Islamia, Jamia Nagar, New Delhi, 110025, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Jamia Millia Islamia, Jamia Nagar, New Delhi, 110025, Delhi, India","institution_ids":["https://openalex.org/I59475050"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027731220","display_name":"Taran Singh Bharati","orcid":null},"institutions":[{"id":"https://openalex.org/I59475050","display_name":"Jamia Millia Islamia","ror":"https://ror.org/00pnhhv55","country_code":"IN","type":"education","lineage":["https://openalex.org/I59475050"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Taran Singh Bharati","raw_affiliation_strings":["Department of Computer Science, Jamia Millia Islamia, Jamia Nagar, New Delhi, 110025, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Jamia Millia Islamia, Jamia Nagar, New Delhi, 110025, Delhi, India","institution_ids":["https://openalex.org/I59475050"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100865183"],"corresponding_institution_ids":["https://openalex.org/I59475050"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":20.3816,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.99328746,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6735125780105591},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6421738862991333},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6142667531967163},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.465829074382782},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.352987676858902},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34976890683174133},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33175647258758545}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6735125780105591},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6421738862991333},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6142667531967163},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.465829074382782},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.352987676858902},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34976890683174133},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33175647258758545}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00156-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00156-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00156-y.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bb7b0022fb444bbfa0216011039fa3cb","is_oa":true,"landing_page_url":"https://doaj.org/article/bb7b0022fb444bbfa0216011039fa3cb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 5, Iss 1, Pp 1-31 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00156-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00156-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00156-y.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411845063.pdf","grobid_xml":"https://content.openalex.org/works/W4411845063.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W3000480569","https://openalex.org/W3022437389","https://openalex.org/W3041983853","https://openalex.org/W3045734364","https://openalex.org/W3048949301","https://openalex.org/W3049204557","https://openalex.org/W3092415487","https://openalex.org/W3112343206","https://openalex.org/W3115360974","https://openalex.org/W3127433831","https://openalex.org/W3136449072","https://openalex.org/W3186241169","https://openalex.org/W3214529927","https://openalex.org/W4206101301","https://openalex.org/W4220682970","https://openalex.org/W4225916836","https://openalex.org/W4229332384","https://openalex.org/W4302286646","https://openalex.org/W4320008781","https://openalex.org/W4362694844","https://openalex.org/W4390109746","https://openalex.org/W4392167572","https://openalex.org/W4392719416","https://openalex.org/W4393856083","https://openalex.org/W4393930468","https://openalex.org/W4393944503","https://openalex.org/W4394862991","https://openalex.org/W4396581598","https://openalex.org/W4400737507","https://openalex.org/W4401357688","https://openalex.org/W4403137131","https://openalex.org/W4405180175","https://openalex.org/W4405688496"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Cybersecurity":[0],"risks":[1],"have":[2],"increased":[3],"due":[4],"to":[5,44,48,204,226,263,300],"the":[6,93,169,221,280,294],"growing":[7,26],"ubiquity":[8],"of":[9,11,34,38,57,96,133,179,211],"Internet":[10],"Things":[12],"(IoT)":[13],"technology,":[14],"making":[15],"attack":[16,153],"and":[17,54,68,118,129,140,146,163,181,191,217,229,284],"anomaly":[18],"detection":[19,95],"a":[20,77,185,215,239,248],"major":[21],"concern.":[22],"IoT":[23,196,223],"systems":[24],"face":[25],"threats":[27,158],"from":[28],"attacks":[29,98],"such":[30,97,159],"as":[31,64,160],"Distributed":[32],"Denial":[33,37],"Service":[35,39],"(DDoS),":[36],"(DoS),":[40],"Probing,":[41],"R2L":[42],"(Remote":[43],"Local),":[45],"U2R":[46],"(User":[47],"Root),":[49],"Malware,":[50],"Scanning,":[51],"Port":[52],"Scan,":[53],"Bot,":[55],"all":[56,152],"which":[58],"can":[59],"seriously":[60],"jeopardize":[61],"system":[62],"integrity,":[63],"they":[65],"become":[66],"more":[67,69],"integrated":[70],"into":[71,200],"multiple":[72],"domains.":[73],"This":[74,236],"paper":[75],"proposes":[76],"hybrid":[78,103,241],"deep":[79,104,242],"learning":[80,105,243],"model":[81,106,122,275],"(CNN-BiLSTM)":[82,107],"using":[83,279],"CNN":[84],"combined":[85],"with":[86,168,257],"Bidirectional":[87,258],"Long":[88,259],"Short-Term":[89,260],"Memory":[90,261],"(Bi-LSTM)":[91],"for":[92,253],"better":[94],"in":[99,151,177,195,220,232,267,308],"real-time.":[100],"The":[101,120,209],"proposed":[102,121,174],"was":[108],"extensively":[109],"evaluated":[110],"on":[111,126,135,138,142,156],"three":[112],"benchmark":[113],"datasets,":[114],"namely":[115],"KDDCup99,":[116,136],"NSL-KDD,":[117,139],"CIC_IDS_2017.":[119,143],"exhibited":[123],"outstanding":[124],"performance":[125],"these":[127],"datasets":[128],"yielded":[130],"an":[131,304],"accuracy":[132],"99.9%":[134],"99.8%":[137],"98.0%":[141],"Precision,":[144],"recall,":[145],"F1":[147],"scores":[148],"are":[149],"similar":[150],"categories,":[154],"especially":[155],"complex":[157],"DoS,":[161],"DDoS,":[162],"malware.":[164],"A":[165],"comparison":[166],"study":[167,237],"state-of-the-art":[170],"technique":[171],"reflects":[172],"our":[173],"model's":[175],"superiority":[176],"terms":[178],"precision":[180],"recall.":[182],"It":[183],"offers":[184],"good":[186],"lead":[187],"toward":[188],"real-world":[189],"application":[190],"could":[192],"be":[193],"piloted":[194],"environments":[197],"by":[198],"integrating":[199],"real-time":[201],"security":[202,224],"platforms":[203],"mitigate":[205,301],"progressive":[206],"cyber":[207],"threats.":[208],"contribution":[210],"this":[212,274],"work":[213],"is":[214],"robust":[216],"scalable":[218],"solution":[219],"fast-growing":[222],"area":[225],"both":[227],"present":[228],"future":[230],"challenges":[231],"securing":[233],"critical":[234],"infrastructures.":[235],"presents":[238],"novel":[240],"framework":[244],"that":[245],"uniquely":[246],"integrates":[247],"Convolutional":[249],"Neural":[250],"Network":[251],"(CNN)":[252],"high-dimensional":[254],"feature":[255,277],"extraction":[256],"(BiLSTM)":[262],"preserve":[264],"temporal":[265],"dependencies":[266],"network":[268],"traffic":[269],"patterns.":[270],"Unlike":[271],"conventional":[272],"approaches,":[273],"incorporates":[276],"selection":[278],"Least":[281],"Absolute":[282],"Shrinkage":[283],"Selection":[285],"Operator":[286],"(LASSO),":[287],"ensuring":[288],"computational":[289],"efficiency.":[290],"Furthermore,":[291],"we":[292],"employ":[293],"Synthetic":[295],"Minority":[296],"Over-sampling":[297],"Technique":[298],"(SMOTE)":[299],"class":[302],"imbalance,":[303],"issue":[305],"often":[306],"overlooked":[307],"prior":[309],"works.":[310]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":8}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
