{"id":"https://openalex.org/W7128437458","doi":"https://doi.org/10.1007/s43926-026-00288-9","title":"A minimalistic yet effective domain adaptation strategy for IoMT network intrusion detection","display_name":"A minimalistic yet effective domain adaptation strategy for IoMT network intrusion detection","publication_year":2026,"publication_date":"2026-02-09","ids":{"openalex":"https://openalex.org/W7128437458","doi":"https://doi.org/10.1007/s43926-026-00288-9"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-026-00288-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00288-9","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s43926-026-00288-9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021974894","display_name":"Mahir Mahbub","orcid":"https://orcid.org/0000-0002-5364-0453"},"institutions":[{"id":"https://openalex.org/I205746353","display_name":"University of Dhaka","ror":"https://ror.org/05wv2vq37","country_code":"BD","type":"education","lineage":["https://openalex.org/I205746353"]},{"id":"https://openalex.org/I59805279","display_name":"Islamic University of Technology","ror":"https://ror.org/057gnqw22","country_code":"BD","type":"education","lineage":["https://openalex.org/I59805279"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Mahir Mahbub","raw_affiliation_strings":["Department of IoT and Robotics Engineering, University of Frontier Technology, Bangladesh, Gazipur, 1750, Bangladesh","Institute of Information Technology, University of Dhaka, Dhaka, 1000, Bangladesh"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of IoT and Robotics Engineering, University of Frontier Technology, Bangladesh, Gazipur, 1750, Bangladesh","institution_ids":["https://openalex.org/I59805279"]},{"raw_affiliation_string":"Institute of Information Technology, University of Dhaka, Dhaka, 1000, Bangladesh","institution_ids":["https://openalex.org/I205746353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125433062","display_name":"Md. Tanjib Riasat","orcid":null},"institutions":[{"id":"https://openalex.org/I59805279","display_name":"Islamic University of Technology","ror":"https://ror.org/057gnqw22","country_code":"BD","type":"education","lineage":["https://openalex.org/I59805279"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Md. Tanjib Riasat","raw_affiliation_strings":["Department of IoT and Robotics Engineering, University of Frontier Technology, Bangladesh, Gazipur, 1750, Bangladesh"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of IoT and Robotics Engineering, University of Frontier Technology, Bangladesh, Gazipur, 1750, Bangladesh","institution_ids":["https://openalex.org/I59805279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038912365","display_name":"Thaier Hamid","orcid":null},"institutions":[{"id":"https://openalex.org/I59805279","display_name":"Islamic University of Technology","ror":"https://ror.org/057gnqw22","country_code":"BD","type":"education","lineage":["https://openalex.org/I59805279"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Tasnima Hamid","raw_affiliation_strings":["Department of IoT and Robotics Engineering, University of Frontier Technology, Bangladesh, Gazipur, 1750, Bangladesh"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of IoT and Robotics Engineering, University of Frontier Technology, Bangladesh, Gazipur, 1750, Bangladesh","institution_ids":["https://openalex.org/I59805279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007216921","display_name":"Sujon Chandra Sutradhar","orcid":null},"institutions":[{"id":"https://openalex.org/I59805279","display_name":"Islamic University of Technology","ror":"https://ror.org/057gnqw22","country_code":"BD","type":"education","lineage":["https://openalex.org/I59805279"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Sujon Chandra Sutradhar","raw_affiliation_strings":["Department of General Education (Mathematics), University of Frontier Technology, Bangladesh, Gazipur, 1750, Bangladesh"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of General Education (Mathematics), University of Frontier Technology, Bangladesh, Gazipur, 1750, Bangladesh","institution_ids":["https://openalex.org/I59805279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100915245","display_name":"Mohammed Shafiul Alam Khan","orcid":"https://orcid.org/0000-0002-8174-4639"},"institutions":[{"id":"https://openalex.org/I205746353","display_name":"University of Dhaka","ror":"https://ror.org/05wv2vq37","country_code":"BD","type":"education","lineage":["https://openalex.org/I205746353"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Mohammed Shafiul Alam Khan","raw_affiliation_strings":["Institute of Information Technology, University of Dhaka, Dhaka, 1000, Bangladesh"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Technology, University of Dhaka, Dhaka, 1000, Bangladesh","institution_ids":["https://openalex.org/I205746353"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100915245"],"corresponding_institution_ids":["https://openalex.org/I205746353"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21264489,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6014999747276306,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6014999747276306,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.10490000247955322,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.05290000140666962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8212000131607056},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5554999709129333},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5370000004768372},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.48750001192092896},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.4869999885559082},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.4300000071525574},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42739999294281006}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8212000131607056},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7882999777793884},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5554999709129333},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5436999797821045},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5370000004768372},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.48750001192092896},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.4869999885559082},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.4300000071525574},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4284999966621399},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42739999294281006},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4004000127315521},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.38769999146461487},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.32420000433921814},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.301800012588501},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.2825999855995178},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.2551000118255615}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-026-00288-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00288-9","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ea56b64773984a24ba2c08d2d74e7be2","is_oa":true,"landing_page_url":"https://doaj.org/article/ea56b64773984a24ba2c08d2d74e7be2","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 6, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-026-00288-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00288-9","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W1594039573","https://openalex.org/W2024399828","https://openalex.org/W2027664152","https://openalex.org/W2034220622","https://openalex.org/W2104068492","https://openalex.org/W2115403315","https://openalex.org/W2152195021","https://openalex.org/W2152586010","https://openalex.org/W2560703481","https://openalex.org/W2584886900","https://openalex.org/W2593768305","https://openalex.org/W2770645414","https://openalex.org/W3009136487","https://openalex.org/W3033120446","https://openalex.org/W3033675321","https://openalex.org/W3159885303","https://openalex.org/W3176234924","https://openalex.org/W3192892322","https://openalex.org/W3197944870","https://openalex.org/W3205084627","https://openalex.org/W3205446974","https://openalex.org/W4206776608","https://openalex.org/W4220846496","https://openalex.org/W4232258220","https://openalex.org/W4307868829","https://openalex.org/W4312958499","https://openalex.org/W4318464922","https://openalex.org/W4320033847","https://openalex.org/W4360993985","https://openalex.org/W4386386840","https://openalex.org/W4388914801","https://openalex.org/W4391305996","https://openalex.org/W4392014284","https://openalex.org/W4399245404","https://openalex.org/W4402035331","https://openalex.org/W4402542170","https://openalex.org/W4402883814","https://openalex.org/W4403094383","https://openalex.org/W4403956651","https://openalex.org/W4404371538","https://openalex.org/W4404563977","https://openalex.org/W4405516371","https://openalex.org/W4405584328","https://openalex.org/W4405957344","https://openalex.org/W4406137943","https://openalex.org/W4407172131","https://openalex.org/W4407574947","https://openalex.org/W4407930042","https://openalex.org/W4408395420","https://openalex.org/W4408791544","https://openalex.org/W4409276848","https://openalex.org/W4409606373","https://openalex.org/W4410059811","https://openalex.org/W4410308958","https://openalex.org/W4410336663","https://openalex.org/W4410351913","https://openalex.org/W4410535181","https://openalex.org/W4412537096","https://openalex.org/W4413003778","https://openalex.org/W4413887371"],"related_works":[],"abstract_inverted_index":{"The":[0,104,210,223],"growing":[1],"complexity":[2],"of":[3,11,34,56,89,136,153,196,237,248],"technology":[4],"heightens":[5],"the":[6,32,54,111,115,121,125,137,197,207,240,245,249],"security":[7],"risks":[8],"for":[9,60,79,96,144],"Internet":[10],"Medical":[12],"Things":[13],"(IoMT)":[14],"systems,":[15],"as":[16,110,120],"many":[17],"IoMT":[18,61,80,97,192],"devices":[19],"were":[20],"originally":[21],"deployed":[22],"with":[23,203],"minimal":[24],"attention":[25],"to":[26],"security.":[27],"Intrusions":[28],"can":[29,76],"critically":[30],"endanger":[31],"safety":[33],"these":[35],"systems.":[36],"Machine":[37],"learning-assisted":[38],"intrusion":[39,62,74,81,98],"detection":[40,184],"systems":[41],"show":[42],"promise":[43],"in":[44,53,190,219,239,244],"detecting":[45],"such":[46],"breaches.":[47],"However,":[48],"a":[49,86,134,150],"significant":[50],"challenge":[51],"exists":[52],"form":[55],"insufficient":[57],"domain-specific":[58],"datasets":[59,75,175],"detection,":[63,99],"particularly":[64],"those":[65],"that":[66,177],"categorise":[67],"detailed":[68],"attack":[69,221,246],"types.":[70],"Therefore,":[71],"extensive":[72],"IoT":[73,102,174],"be":[77],"domain-adapted":[78],"detection.":[82],"This":[83],"research":[84],"provides":[85,149],"comprehensive":[87],"evaluation":[88],"various":[90],"feature-based":[91],"domain":[92],"adaptation":[93],"(FDA)":[94],"techniques":[95],"using":[100,172],"general":[101],"data.":[103],"ACIIoT2023":[105],"network":[106],"dataset":[107,117],"is":[108,118,142],"used":[109,119],"source":[112],"domain,":[113],"while":[114],"CICIoMT2024":[116],"target":[122,250],"domain.":[123],"Using":[124],"proposed":[126,211,224],"FDA":[127,231],"method":[128],"named":[129],"Classwise":[130],"Wasserstein":[131],"Distance":[132],"(CWD),":[133],"modification":[135],"classical":[138],"Wasserstein-2":[139],"distance,":[140],"which":[141],"notable":[143],"its":[145],"geometric":[146],"sophistication":[147],"and":[148,242],"holistic":[151],"measure":[152],"distributional":[154],"mismatch,":[155],"thus":[156],"capturing":[157],"higher-order":[158],"momentum,":[159],"yielded":[160],"optimal":[161],"classification":[162],"outcomes":[163],"through":[164],"lightweight":[165],"Logistic":[166],"Regression":[167],"(LR).":[168],"Our":[169],"empirical":[170],"analysis":[171],"authentic":[173],"indicated":[176],"this":[178],"classwise":[179],"alignment":[180],"significantly":[181,205],"increases":[182],"cross-domain":[183],"precision,":[185],"supporting":[186],"reliable":[187],"model":[188,213,228],"development":[189],"evolving":[191],"contexts.":[193],"Additionally,":[194],"integration":[195],"Particle":[198],"Swarm":[199],"Optimization":[200],"(PSO)":[201],"algorithm":[202],"LR":[204,227],"improved":[206],"optimization":[208],"effectiveness.":[209],"CWD-based":[212,226],"consistently":[214],"outperformed":[215,229],"alternative":[216],"methods,":[217],"especially":[218],"identifying":[220],"classes.":[222],"PSO-adopted":[225],"state-of-the-art":[230],"approaches,":[232],"achieving":[233],"an":[234],"F1":[235],"score":[236],"94.23%":[238],"overall":[241],"96.08%":[243],"category":[247],"dataset.":[251]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-10T00:00:00"}
