{"id":"https://openalex.org/W4398787743","doi":"https://doi.org/10.1109/access.2024.3404778","title":"Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection With Vision Transformers","display_name":"Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection With Vision Transformers","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4398787743","doi":"https://doi.org/10.1109/access.2024.3404778"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3404778","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3404778","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10538333.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10538333.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039787162","display_name":"Laraib Sana","orcid":null},"institutions":[{"id":"https://openalex.org/I161237661","display_name":"Lahore College for Women University","ror":"https://ror.org/02bf6br77","country_code":"PK","type":"education","lineage":["https://openalex.org/I161237661"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Laraib Sana","raw_affiliation_strings":["Department of Computer Science, Lahore College for Women University, Lahore, Punjab, Pakistan","Department of Computer Science, Lahore College for Women University, Jail Rd, near Wapda Flats, Jubilee Town, Lahore, Punjab, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Lahore College for Women University, Lahore, Punjab, Pakistan","institution_ids":["https://openalex.org/I161237661"]},{"raw_affiliation_string":"Department of Computer Science, Lahore College for Women University, Jail Rd, near Wapda Flats, Jubilee Town, Lahore, Punjab, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013274105","display_name":"Mohsin Nazir","orcid":"https://orcid.org/0000-0002-7225-809X"},"institutions":[{"id":"https://openalex.org/I161237661","display_name":"Lahore College for Women University","ror":"https://ror.org/02bf6br77","country_code":"PK","type":"education","lineage":["https://openalex.org/I161237661"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Mohsin Nazir","raw_affiliation_strings":["Department of Computer Science, Lahore College for Women University, Lahore, Punjab, Pakistan","Department of Computer Science, Lahore College for Women University, Jail Rd, near Wapda Flats, Jubilee Town, Lahore, Punjab, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Lahore College for Women University, Lahore, Punjab, Pakistan","institution_ids":["https://openalex.org/I161237661"]},{"raw_affiliation_string":"Department of Computer Science, Lahore College for Women University, Jail Rd, near Wapda Flats, Jubilee Town, Lahore, Punjab, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106484204","display_name":"Jing Yang","orcid":"https://orcid.org/0009-0008-0467-5984"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Jing Yang","raw_affiliation_strings":["Department of Computer System and Technology, Universiti Malaya, Kuala Lumpur, Malaysia"],"raw_orcid":"https://orcid.org/0009-0008-0467-5984","affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064562623","display_name":"Lal Hussain","orcid":"https://orcid.org/0000-0003-1103-4938"},"institutions":[{"id":"https://openalex.org/I146840658","display_name":"University of Azad Jammu and Kashmir","ror":"https://ror.org/015566d55","country_code":"PK","type":"education","lineage":["https://openalex.org/I146840658"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Lal Hussain","raw_affiliation_strings":["Department of Computer Science and IT, Neelum Campus, The University of Azad Jammu and Kashmir, Azad Kashmir, Pakistan","Department of Computer Science & IT, King Abdullah Campus, The University of Azad Jammu and Kashmir, Muzaffarabad, Azad Kashmir, Pakistan","Department of Computer Science & IT, Neelum Campus, The University of Azad Jammu and Kashmir, Athmuqam, Azad Kashmir, Pakistan"],"raw_orcid":"https://orcid.org/0000-0003-1103-4938","affiliations":[{"raw_affiliation_string":"Department of Computer Science and IT, Neelum Campus, The University of Azad Jammu and Kashmir, Azad Kashmir, Pakistan","institution_ids":["https://openalex.org/I146840658"]},{"raw_affiliation_string":"Department of Computer Science & IT, King Abdullah Campus, The University of Azad Jammu and Kashmir, Muzaffarabad, Azad Kashmir, Pakistan","institution_ids":["https://openalex.org/I146840658"]},{"raw_affiliation_string":"Department of Computer Science & IT, Neelum Campus, The University of Azad Jammu and Kashmir, Athmuqam, Azad Kashmir, Pakistan","institution_ids":["https://openalex.org/I146840658"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100670010","display_name":"Yen\u2010Lin Chen","orcid":"https://orcid.org/0000-0001-7717-9393"},"institutions":[{"id":"https://openalex.org/I118292597","display_name":"National Taipei University of Technology","ror":"https://ror.org/00cn92c09","country_code":"TW","type":"education","lineage":["https://openalex.org/I118292597"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yen-Lin Chen","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taipei University of Technology, Taipei, Taiwan"],"raw_orcid":"https://orcid.org/0000-0001-7717-9393","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taipei University of Technology, Taipei, Taiwan","institution_ids":["https://openalex.org/I118292597"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068782746","display_name":"Chin Soon Ku","orcid":"https://orcid.org/0000-0003-0793-3308"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Chin Soon Ku","raw_affiliation_strings":["Department of Computer Science, Universiti Tunku Abdul Rahman, Kampar, Malaysia"],"raw_orcid":"https://orcid.org/0000-0003-0793-3308","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universiti Tunku Abdul Rahman, Kampar, Malaysia","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029359504","display_name":"Mohammed Alatiyyah","orcid":"https://orcid.org/0000-0003-1199-9932"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed Alatiyyah","raw_affiliation_strings":["Department of Computer Science, College of Sciences and Humanities-Aflaj, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Sciences and Humanities-Aflaj, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061118834","display_name":"Sulaiman Abdullah Alateyah","orcid":"https://orcid.org/0000-0001-7369-147X"},"institutions":[{"id":"https://openalex.org/I156216236","display_name":"Qassim University","ror":"https://ror.org/01wsfe280","country_code":"SA","type":"education","lineage":["https://openalex.org/I156216236"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sulaiman Abdullah Alateyah","raw_affiliation_strings":["Department of Computer Engineering, College of Computer, Qassim University, Buraydah, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer, Qassim University, Buraydah, Saudi Arabia","institution_ids":["https://openalex.org/I156216236"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003091988","display_name":"Lip Yee Por","orcid":"https://orcid.org/0000-0001-5865-1533"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Lip Yee Por","raw_affiliation_strings":["Department of Computer System and Technology, Universiti Malaya, Kuala Lumpur, Malaysia"],"raw_orcid":"https://orcid.org/0000-0001-5865-1533","affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5039787162"],"corresponding_institution_ids":["https://openalex.org/I161237661"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":19.4497,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.99588073,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"12","issue":null,"first_page":"82443","last_page":"82468"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8498595952987671},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7047417163848877},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6623920202255249},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6332857608795166},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6193788647651672},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6114501357078552},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5449288487434387},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5246520042419434},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.44721463322639465},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.41779518127441406},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4150775969028473}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8498595952987671},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7047417163848877},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6623920202255249},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6332857608795166},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6193788647651672},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6114501357078552},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5449288487434387},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5246520042419434},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.44721463322639465},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.41779518127441406},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4150775969028473}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3404778","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3404778","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10538333.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a72f21383ddc4a8db975be298fe39db3","is_oa":true,"landing_page_url":"https://doaj.org/article/a72f21383ddc4a8db975be298fe39db3","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 82443-82468 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3404778","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3404778","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10538333.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4398787743.pdf"},"referenced_works_count":103,"referenced_works":["https://openalex.org/W1966294459","https://openalex.org/W1970674491","https://openalex.org/W1973267124","https://openalex.org/W2032620230","https://openalex.org/W2072171094","https://openalex.org/W2086540457","https://openalex.org/W2122859962","https://openalex.org/W2134295053","https://openalex.org/W2162969618","https://openalex.org/W2165998933","https://openalex.org/W2590373591","https://openalex.org/W2596143930","https://openalex.org/W2601980902","https://openalex.org/W2757196798","https://openalex.org/W2764255236","https://openalex.org/W2772511931","https://openalex.org/W2875475762","https://openalex.org/W2891452743","https://openalex.org/W2892077825","https://openalex.org/W2896457183","https://openalex.org/W2897514040","https://openalex.org/W2898322183","https://openalex.org/W2955014922","https://openalex.org/W2963073179","https://openalex.org/W2963532813","https://openalex.org/W2986887468","https://openalex.org/W2990268365","https://openalex.org/W2991140181","https://openalex.org/W2998722477","https://openalex.org/W3004752684","https://openalex.org/W3008143116","https://openalex.org/W3010184667","https://openalex.org/W3011206963","https://openalex.org/W3013798241","https://openalex.org/W3027095011","https://openalex.org/W3037310712","https://openalex.org/W3090111074","https://openalex.org/W3121972055","https://openalex.org/W3125218802","https://openalex.org/W3125387313","https://openalex.org/W3126744215","https://openalex.org/W3131438039","https://openalex.org/W3131541364","https://openalex.org/W3155995009","https://openalex.org/W3163519230","https://openalex.org/W3185746581","https://openalex.org/W3189548043","https://openalex.org/W3216277073","https://openalex.org/W3216614472","https://openalex.org/W4200042272","https://openalex.org/W4205145068","https://openalex.org/W4213019189","https://openalex.org/W4214767582","https://openalex.org/W4220823460","https://openalex.org/W4223489035","https://openalex.org/W4224921329","https://openalex.org/W4225133798","https://openalex.org/W4226020628","https://openalex.org/W4232834185","https://openalex.org/W4283069166","https://openalex.org/W4284899818","https://openalex.org/W4285227013","https://openalex.org/W4290996887","https://openalex.org/W4292156668","https://openalex.org/W4292968960","https://openalex.org/W4293226665","https://openalex.org/W4295832431","https://openalex.org/W4306645406","https://openalex.org/W4306827119","https://openalex.org/W4309074809","https://openalex.org/W4310125503","https://openalex.org/W4310699669","https://openalex.org/W4312204879","https://openalex.org/W4313898457","https://openalex.org/W4317821550","https://openalex.org/W4318261440","https://openalex.org/W4318828758","https://openalex.org/W4321020991","https://openalex.org/W4321497036","https://openalex.org/W4323314880","https://openalex.org/W4323980368","https://openalex.org/W4327568850","https://openalex.org/W4362544699","https://openalex.org/W4378365142","https://openalex.org/W4378976223","https://openalex.org/W4380085580","https://openalex.org/W4385423342","https://openalex.org/W4386645116","https://openalex.org/W4387376803","https://openalex.org/W4387973268","https://openalex.org/W4388210537","https://openalex.org/W4388676625","https://openalex.org/W4388988295","https://openalex.org/W4389154745","https://openalex.org/W4389383717","https://openalex.org/W4390697652","https://openalex.org/W4392908661","https://openalex.org/W4393277865","https://openalex.org/W4394565032","https://openalex.org/W4394603481","https://openalex.org/W4394625155","https://openalex.org/W6744331365","https://openalex.org/W6755207826"],"related_works":["https://openalex.org/W3193043704","https://openalex.org/W4386259002","https://openalex.org/W1546989560","https://openalex.org/W4366990902","https://openalex.org/W4317732970","https://openalex.org/W4388550696","https://openalex.org/W4321636153","https://openalex.org/W2122022187","https://openalex.org/W4313289487","https://openalex.org/W2115529843"],"abstract_inverted_index":{"ABSTRACT":[0],"Background":[1],"and":[2,66,88,104,146,154,167,181,210,224,264,281,298],"Motivation:":[3],"The":[4,55,199],"ever-expanding":[5],"Internet":[6],"of":[7,22,129,148,176,189,216,220,231,243,254,262,274],"Things":[8],"(IoT)":[9],"landscape":[10],"presents":[11],"a":[12,29,114,149,193,225,259],"double-edged":[13],"sword.":[14],"While":[15,233],"it":[16],"fosters":[17],"interconnectedness,":[18],"the":[19,70,79,127,144,172,187,234,245,272,275],"vast":[20],"amount":[21],"data":[23,56],"generated":[24],"by":[25,58],"IoT":[26,303],"devices":[27],"creates":[28],"larger":[30],"attack":[31,60,280],"surface":[32],"for":[33,97,278],"cybercriminals.":[34],"Intrusions":[35],"in":[36,102,291,302],"these":[37,190],"environments":[38],"can":[39,288],"have":[40,92],"severe":[41],"consequences.":[42],"To":[43,68],"combat":[44],"this":[45,59,74],"growing":[46],"threat,":[47],"robust":[48,194],"intrusion":[49,282],"detection":[50,137,286],"systems":[51],"(IDS)":[52],"are":[53],"crucial.":[54],"comprised":[57],"is":[61],"multivariate,":[62],"highly":[63],"complex,":[64],"non-stationary,":[65],"nonlinear.":[67],"extract":[69],"complex":[71,75],"patterns":[72],"from":[73,119],"data,":[76,131],"we":[77,132],"require":[78],"most":[80],"robust,":[81],"optimized":[82,186],"tools.":[83],"Methods:":[84],"Machine":[85],"learning":[86,90,237],"(ML)":[87],"deep":[89,236],"(DL)":[91],"emerged":[93],"as":[94],"powerful":[95],"tools":[96],"IDSs,":[98],"offering":[99],"high":[100],"accuracy":[101,242,261],"detecting":[103],"preventing":[105],"security":[106],"breaches.":[107],"This":[108,141,284],"research":[109,142],"delves":[110],"into":[111],"anomaly":[112,130],"detection,":[113],"technique":[115],"that":[116],"identifies":[117],"deviations":[118],"normal":[120],"system":[121,293,300],"behavior,":[122],"potentially":[123],"indicating":[124],"attacks.":[125],"Given":[126],"complexity":[128],"explore":[133],"methods":[134,158,277],"to":[135],"improve":[136],"performance.":[138],"Proposed":[139],"Approach:":[140],"investigates":[143],"design":[145],"evaluation":[147],"novel":[150],"IDS.":[151],"We":[152,185],"leverage":[153],"optimize":[155],"supervised":[156],"ML":[157,201],"like":[159],"tree-based":[160],"Support":[161],"Vector":[162],"Machines":[163],"(SVM),":[164],"ensemble":[165],"methods,":[166],"neural":[168],"networks":[169],"(NN)":[170],"alongside":[171],"cutting-edge":[173],"DL":[174],"approach":[175],"long":[177],"short-term":[178],"memory":[179],"(LSTM)":[180],"vision":[182],"transformers":[183],"(ViT).":[184],"hyperparameters":[188],"algorithms":[191],"using":[192],"Bayesian":[195],"optimization":[196],"approach.":[197],"Results:":[198],"implemented":[200],"models":[202],"achieved":[203],"impressive":[204],"training":[205,266],"accuracy,":[206,217],"with":[207,252,258],"Random":[208],"Forest":[209],"Ensemble":[211],"Bagged":[212],"Tree":[213],"surpassing":[214],"99.90%":[215],"an":[218,222,241],"AUC":[219],"1.00,":[221],"F1-score,":[223],"balanced":[226],"Matthews":[227],"Correlation":[228],"Coefficient":[229],"(MCC)":[230],"99.78%.":[232],"initial":[235],"LSTM":[238],"model":[239],"yielded":[240],"99.97%,":[244],"proposed":[246,276],"ViT":[247],"architecture":[248],"significantly":[249],"boosted":[250],"performance":[251,301],"100%":[253],"all":[255],"metrics,":[256],"along":[257],"validation":[260],"78.70%":[263],"perfect":[265],"accuracy.":[267],"Conclusion:":[268],"Our":[269],"findings":[270],"demonstrate":[271],"potential":[273],"enhanced":[279],"detection.":[283],"improved":[285],"capability":[287],"be":[289],"instrumental":[290],"safeguarding":[292],"integrity,":[294],"identifying":[295],"fraudulent":[296],"activity,":[297],"optimizing":[299],"networks.":[304]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":50},{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
