{"id":"https://openalex.org/W3164159410","doi":"https://doi.org/10.1007/978-3-030-75075-6_17","title":"A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques","display_name":"A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3164159410","doi":"https://doi.org/10.1007/978-3-030-75075-6_17","mag":"3164159410"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-75075-6_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-75075-6_17","pdf_url":null,"source":{"id":"https://openalex.org/S4210169156","display_name":"Lecture notes in networks and systems","issn_l":"2367-3370","issn":["2367-3370","2367-3389"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Networks and Systems","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064785400","display_name":"Mehdi Houichi","orcid":"https://orcid.org/0009-0008-0255-9904"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mehdi Houichi","raw_affiliation_strings":["Higher School of Communication of Tunis (Sup\u2019Com), LR18TIC01 Digital Security Research Lab, University of Carthage, Tunis, Tunisia","Higher School of Communication of Tunis (Sup'Com), LR18TIC01 Digital Security Research Lab, University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communication of Tunis (Sup\u2019Com), LR18TIC01 Digital Security Research Lab, University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Higher School of Communication of Tunis (Sup'Com), LR18TIC01 Digital Security Research Lab, University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002514441","display_name":"Faouzi Ja\u00efdi","orcid":"https://orcid.org/0000-0001-5893-5296"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Faouzi Jaidi","raw_affiliation_strings":["Higher School of Communication of Tunis (Sup\u2019Com), LR18TIC01 Digital Security Research Lab, University of Carthage, Tunis, Tunisia","National School of Engineers of Carthage, University of Carthage, Tunis, Tunisia","Higher School of Communication of Tunis (Sup'Com), LR18TIC01 Digital Security Research Lab, University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communication of Tunis (Sup\u2019Com), LR18TIC01 Digital Security Research Lab, University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"National School of Engineers of Carthage, University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Higher School of Communication of Tunis (Sup'Com), LR18TIC01 Digital Security Research Lab, University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075259756","display_name":"Adel Bouhoula","orcid":"https://orcid.org/0000-0003-2920-2338"},"institutions":[{"id":"https://openalex.org/I53218197","display_name":"Arabian Gulf University","ror":"https://ror.org/04gd4wn47","country_code":"BH","type":"education","lineage":["https://openalex.org/I53218197"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Manama, Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Manama, Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064785400"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":6.3477,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.97269826,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"215","last_page":"228"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.8163934946060181},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6823513507843018},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6695680618286133},{"id":"https://openalex.org/keywords/smart-city","display_name":"Smart city","score":0.6458664536476135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5790106058120728},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3176232576370239}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.8163934946060181},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6823513507843018},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6695680618286133},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.6458664536476135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5790106058120728},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3176232576370239}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-75075-6_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-75075-6_17","pdf_url":null,"source":{"id":"https://openalex.org/S4210169156","display_name":"Lecture notes in networks and systems","issn_l":"2367-3370","issn":["2367-3370","2367-3389"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Networks and Systems","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.6399999856948853,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1518563014","https://openalex.org/W1976262362","https://openalex.org/W1992025196","https://openalex.org/W2003544295","https://openalex.org/W2072641892","https://openalex.org/W2100537916","https://openalex.org/W2103414007","https://openalex.org/W2107867209","https://openalex.org/W2278186031","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2534270843","https://openalex.org/W2562908385","https://openalex.org/W2754987233","https://openalex.org/W2770372744","https://openalex.org/W2786075294","https://openalex.org/W2790513427","https://openalex.org/W2808266701","https://openalex.org/W2885569475","https://openalex.org/W2887408574","https://openalex.org/W2887555757","https://openalex.org/W2963683434","https://openalex.org/W3014732532","https://openalex.org/W3040937085","https://openalex.org/W4247902913","https://openalex.org/W6743493502"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W1939054760","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W4296618677"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
