{"id":"https://openalex.org/W4311597031","doi":"https://doi.org/10.1080/01969722.2022.2145660","title":"IoT Attack Detection and Mitigation with Optimized Deep Learning Techniques","display_name":"IoT Attack Detection and Mitigation with Optimized Deep Learning Techniques","publication_year":2022,"publication_date":"2022-12-05","ids":{"openalex":"https://openalex.org/W4311597031","doi":"https://doi.org/10.1080/01969722.2022.2145660"},"language":"en","primary_location":{"id":"doi:10.1080/01969722.2022.2145660","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01969722.2022.2145660","pdf_url":null,"source":{"id":"https://openalex.org/S117436046","display_name":"Cybernetics & Systems","issn_l":"0196-9722","issn":["0196-9722","1087-6553"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybernetics and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079223951","display_name":"V. Brindha Devi","orcid":"https://orcid.org/0000-0001-6254-7309"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"V. Brindha Devi","raw_affiliation_strings":["Department of Information Technology, Sri Sai Ram Institute of Technology, Chennai, Tamil Nadu, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Sri Sai Ram Institute of Technology, Chennai, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028395739","display_name":"Nihar M. Ranjan","orcid":"https://orcid.org/0000-0002-4946-5824"},"institutions":[{"id":"https://openalex.org/I878213199","display_name":"Savitribai Phule Pune University","ror":"https://ror.org/044g6d731","country_code":"IN","type":"education","lineage":["https://openalex.org/I878213199"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nihar M. Ranjan","raw_affiliation_strings":["Department of Information Technology, JSPM'S Rajarshi Shahu College of Engineering, Pune, Maharashtra, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, JSPM'S Rajarshi Shahu College of Engineering, Pune, Maharashtra, India","institution_ids":["https://openalex.org/I878213199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100702904","display_name":"Himanshu Sharma","orcid":"https://orcid.org/0000-0001-5299-6143"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Himanshu Sharma","raw_affiliation_strings":["Department of Electronics and Communication Engineering, J B Institute of Engineering and Technology, Hyderabad, Telangana, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, J B Institute of Engineering and Technology, Hyderabad, Telangana, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079223951"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.4215,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.92761809,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"55","issue":"7","first_page":"1702","last_page":"1728"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8147648572921753},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.6039790511131287},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5382546782493591},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.5335913896560669},{"id":"https://openalex.org/keywords/long-short-term-memory","display_name":"Long short term memory","score":0.5219944715499878},{"id":"https://openalex.org/keywords/kurtosis","display_name":"Kurtosis","score":0.5115102529525757},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45889022946357727},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.44489967823028564},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4148060381412506},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3986222445964813},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.37889304757118225},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.36893022060394287},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3576141893863678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3238946795463562},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07456427812576294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8147648572921753},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.6039790511131287},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5382546782493591},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.5335913896560669},{"id":"https://openalex.org/C133488467","wikidata":"https://www.wikidata.org/wiki/Q6673524","display_name":"Long short term memory","level":4,"score":0.5219944715499878},{"id":"https://openalex.org/C166963901","wikidata":"https://www.wikidata.org/wiki/Q287251","display_name":"Kurtosis","level":2,"score":0.5115102529525757},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45889022946357727},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.44489967823028564},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4148060381412506},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3986222445964813},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37889304757118225},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.36893022060394287},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3576141893863678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3238946795463562},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07456427812576294},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/01969722.2022.2145660","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01969722.2022.2145660","pdf_url":null,"source":{"id":"https://openalex.org/S117436046","display_name":"Cybernetics & Systems","issn_l":"0196-9722","issn":["0196-9722","1087-6553"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybernetics and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.8600000143051147,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W2094689349","https://openalex.org/W2802252153","https://openalex.org/W2810749629","https://openalex.org/W2902711202","https://openalex.org/W2945594226","https://openalex.org/W2957142416","https://openalex.org/W2969022468","https://openalex.org/W2972133454","https://openalex.org/W2980435792","https://openalex.org/W2990495437","https://openalex.org/W3002827238","https://openalex.org/W3005260862","https://openalex.org/W3006526650","https://openalex.org/W3009884292","https://openalex.org/W3017752721","https://openalex.org/W3022437389","https://openalex.org/W3022550689","https://openalex.org/W3023797995","https://openalex.org/W3023865355","https://openalex.org/W3024436883","https://openalex.org/W3024476475","https://openalex.org/W3025804100","https://openalex.org/W3026481078","https://openalex.org/W3028069824","https://openalex.org/W3035037193","https://openalex.org/W3035318349","https://openalex.org/W3035366542","https://openalex.org/W3039539327","https://openalex.org/W3048529935","https://openalex.org/W3082884334","https://openalex.org/W3086698253","https://openalex.org/W3092415487","https://openalex.org/W3112187930","https://openalex.org/W3121912665","https://openalex.org/W3128554395","https://openalex.org/W3189033801","https://openalex.org/W3193266292","https://openalex.org/W3196661916","https://openalex.org/W3205451351","https://openalex.org/W3207409855","https://openalex.org/W4206823948","https://openalex.org/W4244455039","https://openalex.org/W4249680802","https://openalex.org/W4283019189","https://openalex.org/W4289687823","https://openalex.org/W4295832059"],"related_works":["https://openalex.org/W2912153778","https://openalex.org/W4387163678","https://openalex.org/W4288108708","https://openalex.org/W2973430807","https://openalex.org/W4385280324","https://openalex.org/W2984436043","https://openalex.org/W4390245176","https://openalex.org/W2912831041","https://openalex.org/W2890685186","https://openalex.org/W3173606726"],"abstract_inverted_index":{"The":[0,105,115],"high":[1],"count":[2],"of":[3,39,117,126,129],"IoT":[4],"device":[5],"and":[6,52,80,91,141,149],"poorer":[7],"security":[8],"are":[9,94,158,187],"extremely":[10],"probable":[11],"to":[12,48,160,169,189],"be":[13],"snatched":[14],"that":[15],"resulted":[16],"in":[17,156],"DDOS":[18],"attacks.":[19],"By":[20],"depleting":[21],"the":[22,27,32,37,112,124,153,171,175,183,191],"node":[23],"battery":[24],"or":[25,36],"disrupting":[26],"signal,":[28],"this":[29],"assault":[30,61],"taints":[31],"network\u2019s":[33],"overall":[34],"accessibility":[35,38],"specific":[40],"nodes.":[41],"This":[42,55],"article":[43,56],"introduces":[44],"a":[45,58,127],"DL-oriented":[46],"approach":[47],"recognize":[49],"such":[50],"attacks":[51,118],"mitigate":[53],"them.":[54],"proposes":[57],"new,":[59],"four-stage":[60],"detection":[62],"system":[63],"for":[64],"IOT.":[65],"Data":[66],"normalization":[67],"is":[68,119,167,180],"initially":[69],"carried":[70],"out":[71],"during":[72],"pre-processing.":[73],"Then,":[74],"\u201cenhanced":[75],"Recursive":[76],"Feature":[77],"Elimination":[78],"(RFE),":[79],"improved":[81,92],"second":[82],"order":[83,99],"technical":[84],"indicator":[85],"based":[86],"features":[87,101,107],"(ATR,":[88],"CMF,":[89],"CTI,":[90],"EMA)":[93],"extracted,\u201d":[95],"along":[96],"with":[97],"\u201chigher":[98],"statistical":[100],"(kurtosis,":[102],"variance,":[103],"skewness).":[104],"best":[106],"were":[108],"also":[109],"chosen":[110],"using":[111],"CMIHBO":[113],"method.":[114],"existence":[116],"then":[120],"determined":[121],"by":[122],"averaging":[123],"outputs":[125],"group":[128],"classifiers,":[130],"including":[131],"\u201cRecurrent":[132],"Neural":[133],"Network":[134],"(RNN),":[135],"Bidirectional":[136,142],"Gated":[137],"Recurrent":[138],"Unit":[139],"(BI-GRU),":[140],"Long":[143],"Short-Term":[144],"Memory":[145],"(BI-LSTM).\u201d":[146],"With":[147],"Cat":[148],"Mouse":[150],"Integrated":[151],"HBO,":[152],"Bi-LSTM":[154],"weights":[155],"particular":[157],"calibrated":[159],"perfection":[161],"(CMIHBO).":[162],"\u201cRecommended":[163],"BAIT":[164],"focused":[165],"mitigation\u201d":[166],"applied":[168],"eliminate":[170],"offender":[172],"nodes":[173],"from":[174],"networks":[176],"if":[177],"an":[178],"incident":[179],"discovered.":[181],"In":[182],"end,":[184],"many":[185],"measures":[186],"established":[188],"improve":[190],"deployed":[192],"approach.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":3}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
