{"id":"https://openalex.org/W7133132445","doi":"https://doi.org/10.1007/s43926-026-00285-y","title":"A review of artificial intelligence-based intrusion detection in industrial internet of things","display_name":"A review of artificial intelligence-based intrusion detection in industrial internet of things","publication_year":2026,"publication_date":"2026-03-01","ids":{"openalex":"https://openalex.org/W7133132445","doi":"https://doi.org/10.1007/s43926-026-00285-y"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-026-00285-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00285-y","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s43926-026-00285-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062565743","display_name":"Yousef Sanjalawe","orcid":"https://orcid.org/0000-0002-4442-1865"},"institutions":[{"id":"https://openalex.org/I2800358669","display_name":"King Abdullah University Hospital","ror":"https://ror.org/02f6hdc06","country_code":"JO","type":"healthcare","lineage":["https://openalex.org/I2800358669"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Yousef Sanjalawe","raw_affiliation_strings":["Department of Information Technology, King Abdullah II School for Information Technology, Amman, 11942, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, King Abdullah II School for Information Technology, Amman, 11942, Jordan","institution_ids":["https://openalex.org/I2800358669"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004065267","display_name":"F.M.A. Salam","orcid":"https://orcid.org/0000-0002-1025-7868"},"institutions":[{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]},{"id":"https://openalex.org/I2799651553","display_name":"City University Ajman","ror":"https://ror.org/00zb4qh40","country_code":"AE","type":"education","lineage":["https://openalex.org/I2799651553"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Salam Fraihat","raw_affiliation_strings":["Department of Information Technology, College of Engineering and Information Technology, Artificial Intelligence Research Center (AIRC), Ajman, 346, United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Engineering and Information Technology, Artificial Intelligence Research Center (AIRC), Ajman, 346, United Arab Emirates","institution_ids":["https://openalex.org/I2799651553","https://openalex.org/I182000528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027575640","display_name":"Salam Al-E\u2019mari","orcid":"https://orcid.org/0000-0002-2134-4158"},"institutions":[{"id":"https://openalex.org/I36622005","display_name":"Petra University","ror":"https://ror.org/039d9es10","country_code":"JO","type":"education","lineage":["https://openalex.org/I36622005"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Salam Al-E\u2019mari","raw_affiliation_strings":["Department of Information Security, Faculty of Information Technology, University of Petra, Amman, 11196, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Security, Faculty of Information Technology, University of Petra, Amman, 11196, Jordan","institution_ids":["https://openalex.org/I36622005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024473397","display_name":"Sharif Naser Makhadmeh","orcid":"https://orcid.org/0000-0002-2894-7998"},"institutions":[{"id":"https://openalex.org/I2800358669","display_name":"King Abdullah University Hospital","ror":"https://ror.org/02f6hdc06","country_code":"JO","type":"healthcare","lineage":["https://openalex.org/I2800358669"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Sharif Naser Makhadmeh","raw_affiliation_strings":["Department of Information Technology, King Abdullah II School for Information Technology, Amman, 11942, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, King Abdullah II School for Information Technology, Amman, 11942, Jordan","institution_ids":["https://openalex.org/I2800358669"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004065267"],"corresponding_institution_ids":["https://openalex.org/I182000528","https://openalex.org/I2799651553"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38539394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.49869999289512634,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.49869999289512634,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.21170000731945038,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.06340000033378601,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7386000156402588},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6851000189781189},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.6051999926567078},{"id":"https://openalex.org/keywords/transformative-learning","display_name":"Transformative learning","score":0.5515000224113464},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5318999886512756},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4771000146865845},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.46619999408721924},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4343999922275543}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7386000156402588},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6851000189781189},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6766999959945679},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.6051999926567078},{"id":"https://openalex.org/C70587473","wikidata":"https://www.wikidata.org/wiki/Q7834111","display_name":"Transformative learning","level":2,"score":0.5515000224113464},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5318999886512756},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.526199996471405},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4771000146865845},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.46619999408721924},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4343999922275543},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3862999975681305},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3831000030040741},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3718000054359436},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.335999995470047},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.3075000047683716},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.2549000084400177},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2513999938964844},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2502000033855438}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-026-00285-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00285-y","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9e7fbbc5f859434788aeff74092ee59b","is_oa":true,"landing_page_url":"https://doaj.org/article/9e7fbbc5f859434788aeff74092ee59b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 6, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-026-00285-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00285-y","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6308170557022095}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":118,"referenced_works":["https://openalex.org/W1489073918","https://openalex.org/W2282821441","https://openalex.org/W2407991977","https://openalex.org/W2535690855","https://openalex.org/W2604247107","https://openalex.org/W2755148105","https://openalex.org/W2811266402","https://openalex.org/W2896370767","https://openalex.org/W2902264868","https://openalex.org/W2940895343","https://openalex.org/W2942255051","https://openalex.org/W2943086164","https://openalex.org/W2962858109","https://openalex.org/W3007937051","https://openalex.org/W3037174305","https://openalex.org/W3037237724","https://openalex.org/W3085854806","https://openalex.org/W3085955590","https://openalex.org/W3108643162","https://openalex.org/W3129061468","https://openalex.org/W3135091917","https://openalex.org/W3160751182","https://openalex.org/W3189249326","https://openalex.org/W3189826552","https://openalex.org/W3191884578","https://openalex.org/W3196299211","https://openalex.org/W3197213531","https://openalex.org/W3213574824","https://openalex.org/W4210680043","https://openalex.org/W4212879646","https://openalex.org/W4220685868","https://openalex.org/W4220810976","https://openalex.org/W4226319939","https://openalex.org/W4249286264","https://openalex.org/W4285138763","https://openalex.org/W4285309754","https://openalex.org/W4297201486","https://openalex.org/W4307631568","https://openalex.org/W4310699669","https://openalex.org/W4312256567","https://openalex.org/W4312494597","https://openalex.org/W4313225168","https://openalex.org/W4318486183","https://openalex.org/W4319754153","https://openalex.org/W4366133297","https://openalex.org/W4366378779","https://openalex.org/W4366446713","https://openalex.org/W4376456879","https://openalex.org/W4380995531","https://openalex.org/W4383098233","https://openalex.org/W4384835155","https://openalex.org/W4385338452","https://openalex.org/W4386214606","https://openalex.org/W4386220180","https://openalex.org/W4386514352","https://openalex.org/W4386850845","https://openalex.org/W4387005798","https://openalex.org/W4387490462","https://openalex.org/W4387745904","https://openalex.org/W4388638017","https://openalex.org/W4388676543","https://openalex.org/W4389057519","https://openalex.org/W4389306074","https://openalex.org/W4389487930","https://openalex.org/W4389934412","https://openalex.org/W4391582407","https://openalex.org/W4392158281","https://openalex.org/W4392905534","https://openalex.org/W4393065931","https://openalex.org/W4394565876","https://openalex.org/W4394744648","https://openalex.org/W4395029214","https://openalex.org/W4396605089","https://openalex.org/W4400235143","https://openalex.org/W4400510913","https://openalex.org/W4400574640","https://openalex.org/W4401052926","https://openalex.org/W4401056366","https://openalex.org/W4401247565","https://openalex.org/W4401567321","https://openalex.org/W4401897659","https://openalex.org/W4402157422","https://openalex.org/W4402356832","https://openalex.org/W4402924078","https://openalex.org/W4404307710","https://openalex.org/W4405113743","https://openalex.org/W4405758217","https://openalex.org/W4406615276","https://openalex.org/W4406698048","https://openalex.org/W4406858510","https://openalex.org/W4407128226","https://openalex.org/W4407276027","https://openalex.org/W4407900983","https://openalex.org/W4408100398","https://openalex.org/W4408410698","https://openalex.org/W4408793049","https://openalex.org/W4409153671","https://openalex.org/W4409321544","https://openalex.org/W4409331529","https://openalex.org/W4409566979","https://openalex.org/W4409603439","https://openalex.org/W4409623316","https://openalex.org/W4410191145","https://openalex.org/W4410226682","https://openalex.org/W4410358717","https://openalex.org/W4411048088","https://openalex.org/W4411112203","https://openalex.org/W4411142543","https://openalex.org/W4411154362","https://openalex.org/W4411515564","https://openalex.org/W4411710505","https://openalex.org/W4411864204","https://openalex.org/W4411939312","https://openalex.org/W4411957384","https://openalex.org/W4411980431","https://openalex.org/W4412195293","https://openalex.org/W4412437954","https://openalex.org/W4412537506"],"related_works":[],"abstract_inverted_index":{"The":[0,129,163],"Industrial":[1],"Internet":[2],"of":[3,64,78,113,123,137,158,206,213],"Things":[4],"(IIoT)":[5],"has":[6],"brought":[7],"transformative":[8],"changes":[9],"to":[10,38,115,133,232],"industrial":[11,234],"sectors":[12],"by":[13,68],"enabling":[14],"intelligent":[15,240],"automation,":[16],"real-time":[17],"monitoring,":[18],"and":[19,26,61,117,120,150,153,161,178,192,210,229,239],"data-driven":[20],"decision-making.":[21],"However,":[22],"this":[23,72],"increased":[24],"connectivity":[25],"system":[27],"integration":[28,205],"have":[29,53],"expanded":[30],"the":[31,58,84,135,156,204,211],"cybersecurity":[32,235],"threat":[33],"landscape,":[34],"exposing":[35],"critical":[36],"infrastructure":[37],"sophisticated":[39],"cyberattacks.":[40],"Traditional":[41],"Intrusion":[42],"Detection":[43],"Systems":[44],"(IDS),":[45],"particularly":[46],"those":[47],"relying":[48],"on":[49,91,108],"static":[50],"signature-based":[51],"detection,":[52,203],"proven":[54],"inadequate":[55],"in":[56,101,198,236],"addressing":[57],"dynamic,":[59],"heterogeneous,":[60],"resource-constrained":[62],"nature":[63],"IIoT":[65,92,241],"environments.":[66],"Motivated":[67],"these":[69],"emerging":[70],"challenges,":[71],"paper":[73,220],"presents":[74],"a":[75,88,111,124,141,185,222],"comprehensive":[76],"review":[77,164],"AI-based":[79],"IDS":[80,138,197],"solutions":[81],"developed":[82],"over":[83],"past":[85],"decade,":[86],"with":[87],"specific":[89],"focus":[90,107],"contexts.":[93],"In":[94],"doing":[95],"so,":[96],"it":[97,183],"addresses":[98],"key":[99],"limitations":[100],"prior":[102],"literature,":[103],"including":[104],"an":[105,121],"insufficient":[106],"industry-specific":[109],"constraints,":[110,152],"lack":[112],"attention":[114],"explainability":[116],"adversarial":[118],"robustness,":[119],"absence":[122],"structured,":[125],"future-oriented":[126],"research":[127,187],"agenda.":[128],"primary":[130],"objectives":[131],"are":[132],"synthesize":[134],"evolution":[136],"methodologies,":[139],"provide":[140],"multidimensional":[142],"taxonomy":[143],"that":[144],"incorporates":[145],"learning":[146,171,180],"paradigms,":[147],"deployment":[148],"layers,":[149],"resource":[151],"critically":[154],"assess":[155],"suitability":[157],"available":[159],"datasets":[160],"benchmarks.":[162],"highlights":[165],"significant":[166],"shifts":[167],"from":[168],"conventional":[169],"machine":[170],"techniques":[172],"toward":[173],"more":[174],"adaptive,":[175],"lightweight,":[176],"explainable,":[177],"federated":[179],"approaches.":[181],"Additionally,":[182],"proposes":[184],"structured":[186],"roadmap":[188],"outlining":[189],"short-,":[190],"mid-,":[191],"long-term":[193],"directions":[194],"for":[195,226],"enhancing":[196],"IIoT,":[199],"such":[200],"as":[201],"edge-based":[202],"explainable":[207],"AI":[208],"(XAI),":[209],"development":[212],"resilient,":[214],"self-adaptive":[215],"intrusion":[216],"detection":[217],"architectures.":[218],"This":[219],"offers":[221],"unified,":[223],"actionable":[224],"reference":[225],"researchers,":[227],"practitioners,":[228],"policymakers":[230],"seeking":[231],"strengthen":[233],"increasingly":[237],"complex":[238],"systems.":[242]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-03-02T00:00:00"}
