{"id":"https://openalex.org/W4320008781","doi":"https://doi.org/10.1109/access.2023.3238664","title":"Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures","display_name":"Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4320008781","doi":"https://doi.org/10.1109/access.2023.3238664"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3238664","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3238664","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10023499.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10023499.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071165858","display_name":"Irfan Ali Kandhro","orcid":"https://orcid.org/0000-0001-9003-1043"},"institutions":[{"id":"https://openalex.org/I1281802846","display_name":"Sindh Madressatul Islam University","ror":"https://ror.org/00467a196","country_code":"PK","type":"education","lineage":["https://openalex.org/I1281802846"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Irfan Ali Kandhro","raw_affiliation_strings":["Department of Computer Science, Sindh Madressatul Islam University, Karachi, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Sindh Madressatul Islam University, Karachi, Pakistan","institution_ids":["https://openalex.org/I1281802846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090295471","display_name":"Sultan M. Alanazi","orcid":"https://orcid.org/0000-0002-8827-9290"},"institutions":[{"id":"https://openalex.org/I118590987","display_name":"Northern Border University","ror":"https://ror.org/03j9tzj20","country_code":"SA","type":"education","lineage":["https://openalex.org/I118590987"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sultan M. Alanazi","raw_affiliation_strings":["Department of Computer Science, Northern Border University, Arar, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-8827-9290","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Northern Border University, Arar, Saudi Arabia","institution_ids":["https://openalex.org/I118590987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101556383","display_name":"Fayyaz Ali","orcid":"https://orcid.org/0000-0003-3232-5363"},"institutions":[{"id":"https://openalex.org/I34478861","display_name":"Sir Syed University of Engineering and Technology","ror":"https://ror.org/02n4kqn31","country_code":"PK","type":"education","lineage":["https://openalex.org/I34478861"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Fayyaz Ali","raw_affiliation_strings":["Department of Software Engineering, Sir Syed University of Engineering and Technology, Karachi Sindh, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Sir Syed University of Engineering and Technology, Karachi Sindh, Pakistan","institution_ids":["https://openalex.org/I34478861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085956666","display_name":"Asadullah Kehar","orcid":"https://orcid.org/0009-0009-7689-776X"},"institutions":[{"id":"https://openalex.org/I45164037","display_name":"Shah Abdul Latif University","ror":"https://ror.org/02s232b27","country_code":"PK","type":"education","lineage":["https://openalex.org/I45164037"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Asadullah Kehar","raw_affiliation_strings":["Institute of Computer Science, Shah Abdul Latif University, Khairpur, Karachi Sindh, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Shah Abdul Latif University, Khairpur, Karachi Sindh, Pakistan","institution_ids":["https://openalex.org/I45164037"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110823452","display_name":"Kanwal Fatima","orcid":null},"institutions":[{"id":"https://openalex.org/I1281802846","display_name":"Sindh Madressatul Islam University","ror":"https://ror.org/00467a196","country_code":"PK","type":"education","lineage":["https://openalex.org/I1281802846"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Kanwal Fatima","raw_affiliation_strings":["Department of Computer Science, Sindh Madressatul Islam University, Karachi, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Sindh Madressatul Islam University, Karachi, Pakistan","institution_ids":["https://openalex.org/I1281802846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009473482","display_name":"Mueen Uddin","orcid":"https://orcid.org/0000-0003-1919-3407"},"institutions":[{"id":"https://openalex.org/I4210105992","display_name":"Qatar Science and Technology Park","ror":"https://ror.org/01gshyb58","country_code":"QA","type":"archive","lineage":["https://openalex.org/I4210105992"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mueen Uddin","raw_affiliation_strings":["College of Computing and Information Technology, University of Doha For Science and Technology, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0003-1919-3407","affiliations":[{"raw_affiliation_string":"College of Computing and Information Technology, University of Doha For Science and Technology, Doha, Qatar","institution_ids":["https://openalex.org/I4210105992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054341757","display_name":"Shankar Karuppayah","orcid":"https://orcid.org/0000-0003-4801-6370"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shankar Karuppayah","raw_affiliation_strings":["National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor, Penang, Malaysia"],"raw_orcid":"https://orcid.org/0000-0003-4801-6370","affiliations":[{"raw_affiliation_string":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5071165858"],"corresponding_institution_ids":["https://openalex.org/I1281802846"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":23.6757,"has_fulltext":true,"cited_by_count":122,"citation_normalized_percentile":{"value":0.99774669,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":null,"first_page":"9136","last_page":"9148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7958368062973022},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7290968894958496},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5930282473564148},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4569540321826935}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7958368062973022},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7290968894958496},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5930282473564148},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4569540321826935}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2023.3238664","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3238664","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10023499.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7347519d62c04ce89462998f35d398ee","is_oa":true,"landing_page_url":"https://doaj.org/article/7347519d62c04ce89462998f35d398ee","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 9136-9148 (2023)","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/24717438","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Detection_of_Real-Time_Malicious_Intrusions_and_Attacks_in_IoT_Empowered_Cybersecurity_Infrastructures/24717438","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3238664","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3238664","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10023499.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4632307078","display_name":null,"funder_award_id":"04/PNAV/6315576","funder_id":"https://openalex.org/F4320322757","funder_display_name":"Universiti Sains Malaysia"}],"funders":[{"id":"https://openalex.org/F4320322757","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4320008781.pdf","grobid_xml":"https://content.openalex.org/works/W4320008781.grobid-xml"},"referenced_works_count":77,"referenced_works":["https://openalex.org/W111228695","https://openalex.org/W1544329015","https://openalex.org/W1664274010","https://openalex.org/W1966124573","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2271053476","https://openalex.org/W2399941526","https://openalex.org/W2414564754","https://openalex.org/W2467076512","https://openalex.org/W2541841318","https://openalex.org/W2560162835","https://openalex.org/W2585582797","https://openalex.org/W2618530766","https://openalex.org/W2734718015","https://openalex.org/W2736937187","https://openalex.org/W2755146079","https://openalex.org/W2762776925","https://openalex.org/W2783190965","https://openalex.org/W2783741806","https://openalex.org/W2789420469","https://openalex.org/W2803881474","https://openalex.org/W2886427086","https://openalex.org/W2887063112","https://openalex.org/W2891001213","https://openalex.org/W2891700561","https://openalex.org/W2893263387","https://openalex.org/W2896303598","https://openalex.org/W2906714766","https://openalex.org/W2911505293","https://openalex.org/W2913497771","https://openalex.org/W2914502888","https://openalex.org/W2914510789","https://openalex.org/W2919115771","https://openalex.org/W2962621836","https://openalex.org/W2969863169","https://openalex.org/W2991507433","https://openalex.org/W3000367805","https://openalex.org/W3093410479","https://openalex.org/W3102259344","https://openalex.org/W3118220620","https://openalex.org/W3126814579","https://openalex.org/W3143021555","https://openalex.org/W3161599138","https://openalex.org/W3163495485","https://openalex.org/W3173285125","https://openalex.org/W3185895012","https://openalex.org/W3186684121","https://openalex.org/W3189548043","https://openalex.org/W3203038611","https://openalex.org/W3209912688","https://openalex.org/W3210361010","https://openalex.org/W3211805421","https://openalex.org/W3216835679","https://openalex.org/W3217748719","https://openalex.org/W4200550593","https://openalex.org/W4206209637","https://openalex.org/W4212795178","https://openalex.org/W4214754765","https://openalex.org/W4226458407","https://openalex.org/W4245460974","https://openalex.org/W4253190906","https://openalex.org/W4280535971","https://openalex.org/W4283030397","https://openalex.org/W4283792068","https://openalex.org/W4287729881","https://openalex.org/W4288064683","https://openalex.org/W4292387448","https://openalex.org/W4292506131","https://openalex.org/W4296710399","https://openalex.org/W4310184554","https://openalex.org/W4312543091","https://openalex.org/W6637210399","https://openalex.org/W6682132143","https://openalex.org/W6754717347","https://openalex.org/W6758947735","https://openalex.org/W6759841327"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W4391913857","https://openalex.org/W2358668433"],"abstract_inverted_index":{"Computer":[0],"viruses,":[1],"malicious,":[2],"and":[3,44,68,79,115,129,148,161,167,175,179,186],"other":[4],"hostile":[5],"attacks":[6,122],"can":[7],"affect":[8],"a":[9,15,38,59,87,102,124],"computer":[10],"network.":[11],"Intrusion":[12],"detection":[13,28,150],"is":[14],"key":[16],"component":[17],"of":[18,41,51,105,112,121,127,133,137,177],"network":[19,90],"security":[20],"as":[21],"an":[22,45,130],"active":[23],"defence":[24],"technology.":[25],"Traditional":[26],"intrusion":[27],"systems":[29],"struggle":[30],"with":[31,123],"issues":[32],"like":[33],"poor":[34],"accuracy,":[35,113],"ineffective":[36],"detection,":[37],"high":[39],"percentage":[40],"false":[42],"positives,":[43],"inability":[46],"to":[47,64,91,108],"handle":[48],"new":[49],"types":[50,120],"intrusions.":[52],"To":[53],"address":[54],"these":[55],"issues,":[56],"we":[57],"propose":[58],"deep":[60,80],"learning-based":[61,81],"novel":[62],"method":[63],"detect":[65,92],"cybersecurity":[66],"vulnerabilities":[67],"breaches":[69],"in":[70,95,110,117],"cyber-physical":[71],"systems.":[72],"The":[73,99,135],"proposed":[74],"framework":[75],"contrasts":[76],"the":[77,143,155,164,173,184],"unsupervised":[78],"discriminative":[82],"approaches.":[83],"This":[84],"paper":[85],"presents":[86],"generative":[88],"adversarial":[89],"cyber":[93],"threats":[94],"IoT-driven":[96],"IICs":[97],"networks.":[98],"results":[100],"demonstrate":[101],"performance":[103],"increase":[104],"approximately":[106],"95%":[107],"97%":[109],"terms":[111],"reliability,":[114],"efficiency":[116],"detecting":[118,154],"all":[119],"dropout":[125],"value":[126,132],"0.2":[128],"epoch":[131],"25.":[134],"output":[136],"well-known":[138],"state-of-the-art":[139],"DL":[140],"classifiers":[141],"achieved":[142],"highest":[144,149],"true":[145],"rate":[146,151],"(TNR)":[147],"(HDR)":[152],"when":[153],"following":[156],"attacks:":[157],"(BruteForceXXS,":[158],"BruteForceWEB,":[159],"DoS_Hulk_Attack,":[160],"DOS_LOIC_HTTP_Attack)":[162],"on":[163],"NSL-KDD,":[165],"KDDCup99,":[166],"UNSW-NB15":[168],"datasets.":[169],"It":[170],"also":[171],"maintained":[172],"confidentiality":[174],"integrity":[176],"users\u2019":[178],"systems\u2019":[180],"sensitive":[181],"information":[182],"during":[183],"training":[185],"testing":[187],"phases.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":19},{"year":2025,"cited_by_count":51},{"year":2024,"cited_by_count":41},{"year":2023,"cited_by_count":11}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-10-10T00:00:00"}
