{"id":"https://openalex.org/W7128736771","doi":"https://doi.org/10.1007/s43926-026-00284-z","title":"Intrusion detection in industrial internet of things network using feature optimization and hybrid deep learning","display_name":"Intrusion detection in industrial internet of things network using feature optimization and hybrid deep learning","publication_year":2026,"publication_date":"2026-02-12","ids":{"openalex":"https://openalex.org/W7128736771","doi":"https://doi.org/10.1007/s43926-026-00284-z"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-026-00284-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00284-z","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s43926-026-00284-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004065267","display_name":"F.M.A. Salam","orcid":"https://orcid.org/0000-0002-1025-7868"},"institutions":[{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]},{"id":"https://openalex.org/I2799651553","display_name":"City University Ajman","ror":"https://ror.org/00zb4qh40","country_code":"AE","type":"education","lineage":["https://openalex.org/I2799651553"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Salam Fraihat","raw_affiliation_strings":["Department of Information Technology, College of Engineering and Information Technology, Artificial Intelligence Research Center (AIRC), Ajman University, Ajman, 346, United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Engineering and Information Technology, Artificial Intelligence Research Center (AIRC), Ajman University, Ajman, 346, United Arab Emirates","institution_ids":["https://openalex.org/I182000528","https://openalex.org/I2799651553"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066389287","display_name":"Qussai Yaseen","orcid":"https://orcid.org/0000-0003-0777-1871"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]},{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]},{"id":"https://openalex.org/I2799651553","display_name":"City University Ajman","ror":"https://ror.org/00zb4qh40","country_code":"AE","type":"education","lineage":["https://openalex.org/I2799651553"]}],"countries":["AE","JO"],"is_corresponding":false,"raw_author_name":"Qussai Yaseen","raw_affiliation_strings":["Department of Computer Information Systems, College of Computer and Information Technology, Jordan University of Science and Technology, Irbid, 22110, Jordan","Department of Information Technology, College of Engineering and Information Technology, Artificial Intelligence Research Center (AIRC), Ajman University, Ajman, 346, United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Information Systems, College of Computer and Information Technology, Jordan University of Science and Technology, Irbid, 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Department of Information Technology, College of Engineering and Information Technology, Artificial Intelligence Research Center (AIRC), Ajman University, Ajman, 346, United Arab Emirates","institution_ids":["https://openalex.org/I182000528","https://openalex.org/I2799651553"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062565743","display_name":"Yousef Sanjalawe","orcid":"https://orcid.org/0000-0002-4442-1865"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]},{"id":"https://openalex.org/I2800358669","display_name":"King Abdullah University Hospital","ror":"https://ror.org/02f6hdc06","country_code":"JO","type":"healthcare","lineage":["https://openalex.org/I2800358669"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Yousef Sanjalawe","raw_affiliation_strings":["Department of Information Technology, King Abdullah II School for Information Technology, University of Jordan, Amman, 11942, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, King Abdullah II School for Information Technology, University of Jordan, Amman, 11942, Jordan","institution_ids":["https://openalex.org/I114972647","https://openalex.org/I2800358669"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044188430","display_name":"Aymen Abu-Errub","orcid":null},"institutions":[{"id":"https://openalex.org/I27570832","display_name":"Jadara University","ror":"https://ror.org/001drnv35","country_code":"JO","type":"education","lineage":["https://openalex.org/I27570832"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Aymen Abu-Errub","raw_affiliation_strings":["Department of Computer Science, Faculty of Information Technology, Jadara University, Irbid, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Information Technology, Jadara University, Irbid, Jordan","institution_ids":["https://openalex.org/I27570832"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024473397","display_name":"Sharif Naser Makhadmeh","orcid":"https://orcid.org/0000-0002-2894-7998"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]},{"id":"https://openalex.org/I2800358669","display_name":"King Abdullah University Hospital","ror":"https://ror.org/02f6hdc06","country_code":"JO","type":"healthcare","lineage":["https://openalex.org/I2800358669"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Sharif Naser Makhadmeh","raw_affiliation_strings":["Department of Information Technology, King Abdullah II School for Information Technology, University of Jordan, Amman, 11942, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, King Abdullah II School for Information Technology, University of Jordan, Amman, 11942, Jordan","institution_ids":["https://openalex.org/I114972647","https://openalex.org/I2800358669"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103220819","display_name":"Mohammed Azmi Al-Betar","orcid":"https://orcid.org/0000-0003-4117-9687"},"institutions":[{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]},{"id":"https://openalex.org/I2799651553","display_name":"City University Ajman","ror":"https://ror.org/00zb4qh40","country_code":"AE","type":"education","lineage":["https://openalex.org/I2799651553"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohammed Azmi Al-Betar","raw_affiliation_strings":["Department of Information Technology, College of Engineering and Information Technology, Artificial Intelligence Research Center (AIRC), Ajman University, Ajman, 346, United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Engineering and Information Technology, Artificial Intelligence Research Center (AIRC), Ajman University, Ajman, 346, United Arab Emirates","institution_ids":["https://openalex.org/I182000528","https://openalex.org/I2799651553"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5004065267"],"corresponding_institution_ids":["https://openalex.org/I182000528","https://openalex.org/I2799651553"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23919916,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.36559998989105225,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.36559998989105225,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.34380000829696655,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.08429999649524689,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7727000117301941},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6690999865531921},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5687999725341797},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5458999872207642},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.4449000060558319},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.439300000667572},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.40369999408721924},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.40070000290870667},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3955000042915344}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7727000117301941},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.717199981212616},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6690999865531921},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6564000248908997},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5687999725341797},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5458999872207642},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5260000228881836},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5040000081062317},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.4449000060558319},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.439300000667572},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.40369999408721924},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.40070000290870667},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3955000042915344},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3937999904155731},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3849000036716461},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.36970001459121704},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.3345000147819519},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.33070001006126404},{"id":"https://openalex.org/C3018790387","wikidata":"https://www.wikidata.org/wiki/Q869010","display_name":"Hybrid learning","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.2800000011920929},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2556000053882599}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-026-00284-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00284-z","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5227c12f2705425eadee412e91c6d082","is_oa":true,"landing_page_url":"https://doaj.org/article/5227c12f2705425eadee412e91c6d082","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 6, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-026-00284-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00284-z","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5984023809432983,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G8120495885","display_name":null,"funder_award_id":"2024-IRG-ENIT-8","funder_id":"https://openalex.org/F4320330328","funder_display_name":"Ajman University"}],"funders":[{"id":"https://openalex.org/F4320330328","display_name":"Ajman University","ror":"https://ror.org/01j1rma10"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1976744965","https://openalex.org/W2010059576","https://openalex.org/W2811266402","https://openalex.org/W3041121917","https://openalex.org/W3127432888","https://openalex.org/W4212993228","https://openalex.org/W4226319939","https://openalex.org/W4320472617","https://openalex.org/W4385766770","https://openalex.org/W4386608804","https://openalex.org/W4387168854","https://openalex.org/W4388626146","https://openalex.org/W4390692351","https://openalex.org/W4393255241","https://openalex.org/W4396760747","https://openalex.org/W4399154845","https://openalex.org/W4399615703","https://openalex.org/W4399768575","https://openalex.org/W4399985961","https://openalex.org/W4401023138","https://openalex.org/W4402274395","https://openalex.org/W4402632648","https://openalex.org/W4402924078","https://openalex.org/W4403446022","https://openalex.org/W4405758217","https://openalex.org/W4406208235","https://openalex.org/W4406591863","https://openalex.org/W4407597636","https://openalex.org/W4407937271","https://openalex.org/W4407958888","https://openalex.org/W4409153671","https://openalex.org/W6925970967"],"related_works":[],"abstract_inverted_index":{"The":[0,54,162],"rapid":[1],"growth":[2],"of":[3,7,138,141,144,147,151],"the":[4,68,131],"Industrial":[5],"Internet":[6],"Things":[8],"(IIoT)":[9],"has":[10],"introduced":[11],"complex":[12],"security":[13],"challenges":[14],"requiring":[15],"accurate,":[16],"scalable,":[17,195],"and":[18,76,90,96,127,149,177,188,196],"privacy-preserving":[19],"intrusion":[20,198],"detection":[21,41,199],"solutions.":[22],"This":[23],"paper":[24],"presents":[25],"a":[26,39,45,50,62,80,183],"hybrid":[27,186],"framework":[28,191],"that":[29,66,84,103,130,192],"combines":[30],"Hunting":[31],"Gradient":[32],"Snake\u2013Cuckoo":[33],"Search":[34],"(HGS\u2013CS)":[35],"feature":[36],"optimization":[37,187],"with":[38],"Transformer\u2013LSTM":[40,82],"model":[42,108,133,163],"enhanced":[43],"by":[44,72,157],"gated":[46,81],"fusion":[47],"mechanism":[48],"under":[49],"federated":[51],"learning":[52,190],"setup.":[53],"proposed":[55,132],"system":[56],"comprises":[57],"three":[58],"main":[59],"components:":[60],"(1)":[61],"dual-phase":[63],"HGS\u2013CS":[64],"optimizer":[65],"selects":[67],"most":[69],"informative":[70],"features":[71],"balancing":[73],"global":[74],"exploration":[75],"local":[77],"refinement;":[78],"(2)":[79],"architecture":[83],"effectively":[85],"captures":[86],"both":[87],"temporal":[88],"dependencies":[89],"spatial":[91],"correlations":[92],"in":[93],"IIoT":[94,122,202],"traffic;":[95],"(3)":[97],"an":[98,135],"attention-weighted":[99],"SwarmFed":[100],"aggregation":[101],"protocol":[102],"enables":[104],"decentralized":[105],"yet":[106],"coordinated":[107],"training":[109],"across":[110,159,171],"multiple":[111],"clients":[112],"while":[113],"preserving":[114],"data":[115],"privacy.":[116],"Experimental":[117],"evaluations":[118],"on":[119],"four":[120],"benchmark":[121],"datasets,":[123],"CICAPT-IIoT,":[124],"Edge-IIoTset,":[125],"WUSTL-IIoT,":[126],"ToN-IoT,":[128],"show":[129],"achieves":[134],"average":[136],"accuracy":[137],"99.27%,":[139],"precision":[140],"99.25%,":[142],"recall":[143],"99.17%,":[145],"F1-score":[146],"99.21%,":[148],"AUC":[150],"99.35%,":[152],"surpassing":[153],"recent":[154],"state-of-the-art":[155],"methods":[156],"0.8\u20131.3%":[158],"all":[160],"metrics.":[161],"also":[164],"exhibits":[165],"low":[166],"standard":[167],"deviation":[168],"($$\\le":[169],"$$0.22%)":[170],"independent":[172],"runs,":[173],"confirming":[174],"its":[175],"robustness":[176],"stability.":[178],"Overall,":[179],"this":[180],"study":[181],"introduces":[182],"numerically":[184],"validated,":[185],"deep":[189],"delivers":[193],"reliable,":[194],"privacy-aware":[197],"for":[200],"next-generation":[201],"environments.":[203]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-13T00:00:00"}
