{"id":"https://openalex.org/W4315629866","doi":"https://doi.org/10.1109/globecom48099.2022.10001017","title":"Intelligent Ensemble based System for Rare Attacks Dectection in IoT Networks","display_name":"Intelligent Ensemble based System for Rare Attacks Dectection in IoT Networks","publication_year":2022,"publication_date":"2022-12-04","ids":{"openalex":"https://openalex.org/W4315629866","doi":"https://doi.org/10.1109/globecom48099.2022.10001017"},"language":"en","primary_location":{"id":"doi:10.1109/globecom48099.2022.10001017","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/globecom48099.2022.10001017","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021455872","display_name":"Muder Almiani","orcid":"https://orcid.org/0000-0003-0021-2364"},"institutions":[{"id":"https://openalex.org/I179311214","display_name":"Gulf University for Science & Technology","ror":"https://ror.org/04d9rzd67","country_code":"KW","type":"education","lineage":["https://openalex.org/I179311214"]}],"countries":["KW"],"is_corresponding":true,"raw_author_name":"Muder Almiani","raw_affiliation_strings":["Gulf University of Science and Technology,Kuwait,Kuwait","Gulf University of Science and Technology, Kuwait, Kuwait"],"affiliations":[{"raw_affiliation_string":"Gulf University of Science and Technology,Kuwait,Kuwait","institution_ids":["https://openalex.org/I179311214"]},{"raw_affiliation_string":"Gulf University of Science and Technology, Kuwait, Kuwait","institution_ids":["https://openalex.org/I179311214"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060378320","display_name":"Alia AbuGhazleh","orcid":"https://orcid.org/0000-0003-0421-4033"},"institutions":[{"id":"https://openalex.org/I4210164862","display_name":"Artificial Intelligence in Medicine (Canada)","ror":"https://ror.org/05p590m36","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210164862"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Alia AbuGhazleh","raw_affiliation_strings":["Artificial Intellegence and Machine Learning Consultant,Amman,Jordan","Artificial Intellegence and Machine Learning Consultant, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Artificial Intellegence and Machine Learning Consultant,Amman,Jordan","institution_ids":["https://openalex.org/I4210164862"]},{"raw_affiliation_string":"Artificial Intellegence and Machine Learning Consultant, Amman, Jordan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032187551","display_name":"Yaser Jararweh","orcid":"https://orcid.org/0000-0002-4403-3846"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Yaser Jararweh","raw_affiliation_strings":["Jordan University of Science and Technology,Irbid,Jordan","Jordan University of Science and Technology, Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology,Irbid,Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011574113","display_name":"Abdul Razaque","orcid":"https://orcid.org/0000-0003-0409-3526"},"institutions":[{"id":"https://openalex.org/I2801841357","display_name":"Kazakh Ablai Khan University of International Relations and World Languages","ror":"https://ror.org/02q35ve03","country_code":"KZ","type":"education","lineage":["https://openalex.org/I2801841357"]},{"id":"https://openalex.org/I4210143508","display_name":"International Information Technologies University","ror":"https://ror.org/042dtza69","country_code":"KZ","type":"education","lineage":["https://openalex.org/I4210143508"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Abdul Razaque","raw_affiliation_strings":["International IT University,Almaty,Kazakhastan","International IT University, Almaty, Kazakhastan"],"affiliations":[{"raw_affiliation_string":"International IT University,Almaty,Kazakhastan","institution_ids":["https://openalex.org/I4210143508","https://openalex.org/I2801841357"]},{"raw_affiliation_string":"International IT University, Almaty, Kazakhastan","institution_ids":["https://openalex.org/I4210143508"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021455872"],"corresponding_institution_ids":["https://openalex.org/I179311214"],"apc_list":null,"apc_paid":null,"fwci":0.2162,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.39535531,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"98","issue":null,"first_page":"1990","last_page":"1995"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8066611289978027},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6865012049674988},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6340119242668152},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5311421751976013},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5105022192001343},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4833204746246338},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41695523262023926},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41525357961654663},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35399091243743896},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33860746026039124}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8066611289978027},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6865012049674988},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6340119242668152},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5311421751976013},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5105022192001343},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4833204746246338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41695523262023926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41525357961654663},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35399091243743896},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33860746026039124},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom48099.2022.10001017","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/globecom48099.2022.10001017","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1994040401","https://openalex.org/W2059939031","https://openalex.org/W2075964268","https://openalex.org/W2099940443","https://openalex.org/W2557450880","https://openalex.org/W2967459865","https://openalex.org/W3136161312","https://openalex.org/W4221124169","https://openalex.org/W4293155325"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4238100021"],"abstract_inverted_index":{"The":[0,139,181],"lack":[1,111],"of":[2,9,15,20,30,58,84,96,108,112,143,150,166,222],"security":[3],"techniques":[4],"that":[5,25,99,185],"assures":[6],"the":[7,13,21,27,65,92,106,163,174,186,218,223],"integrity":[8],"data":[10,46],"generated":[11],"by":[12,157],"Internet":[14],"Things":[16],"networks":[17],"is":[18,141],"one":[19],"major":[22,152],"stumbling":[23],"blocks":[24],"hinders":[26],"whole":[28],"development":[29],"these":[31,44,97,167],"networks.":[32,138,231],"As":[33],"smart":[34],"devices":[35],"generate":[36],"and":[37,40,64,67,88,110,134,198,202,214,220],"transmit":[38],"confidential":[39],"sensitive":[41],"data,":[42],"in":[43,50,136,229],"cases,":[45],"leakage":[47],"can":[48],"lead":[49],"many":[51,83],"cases":[52],"to":[53,91,128,172,196,212,226],"drastic":[54],"consequences.":[55],"These":[56],"types":[57],"attacks":[59,63,98,132],"are":[60,70,86,170],"called":[61],"compromised":[62,81],"U2R":[66,203],"R2L":[68,201],"subcategories":[69],"typical":[71],"examples.":[72],"Despite":[73],"various":[74],"intrusion":[75,125],"detection":[76,126,168,176,192],"systems":[77],"designed":[78],"for":[79,178,200],"detecting":[80],"attacks,":[82],"them":[85],"deficient":[87],"suboptimum":[89],"due":[90],"highly":[93],"sophisticated":[94],"behavior":[95],"mimic":[100],"normal":[101],"ones,":[102],"as":[103,105],"well":[104],"rarity":[107],"occurrence,":[109],"training":[113],"records":[114],"keep":[115],"this":[116,120],"area":[117],"inconclusive.":[118],"Therefore,":[119],"paper":[121],"presents":[122],"an":[123],"ensemble-based":[124],"system":[127,188,225],"identify":[129],"rare":[130],"hard-to-detect":[131],"(U2R":[133],"R2L)":[135],"IoT":[137],"ensemble":[140],"composed":[142],"two":[144],"main":[145],"tiers.":[146],"Each":[147],"tier":[148],"consists":[149],"a":[151,190],"improved":[153],"KNN":[154,161],"classifier":[155],"driven":[156],"multiple":[158],"auxiliary":[159],"classical":[160],"classifiers.":[162],"combined":[164],"responses":[165],"tires":[169],"fused":[171],"provide":[173],"optimal":[175],"performance":[177],"minority":[179],"attacks.":[180],"experimental":[182],"analysis":[183],"unveiled":[184],"proposed":[187,224],"achieved":[189],"high":[191],"accuracy":[193],"reaches":[194,210],"up":[195,211],"96.65%":[197],"100%":[199],"respectively":[204],"along":[205],"with":[206],"Cohen's":[207],"kappa":[208],"coefficient":[209],"0.9778":[213],"0.996,":[215],"which":[216],"confirms":[217],"reliability":[219],"robustness":[221],"be":[227],"deployed":[228],"loT":[230]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
