{"id":"https://openalex.org/W4406949882","doi":"https://doi.org/10.1109/icaic63015.2025.10848740","title":"Mapping Cyber Threats in IoT-Driven MSPs: An Explainable Machine Learning Approach for Remote Work Security","display_name":"Mapping Cyber Threats in IoT-Driven MSPs: An Explainable Machine Learning Approach for Remote Work Security","publication_year":2025,"publication_date":"2025-01-29","ids":{"openalex":"https://openalex.org/W4406949882","doi":"https://doi.org/10.1109/icaic63015.2025.10848740"},"language":"en","primary_location":{"id":"doi:10.1109/icaic63015.2025.10848740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaic63015.2025.10848740","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056701171","display_name":"J.K. Johnstone","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"James Johnstone","raw_affiliation_strings":["George Washington University,Washington D.C,USA"],"affiliations":[{"raw_affiliation_string":"George Washington University,Washington D.C,USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031669437","display_name":"Adewale Akinfaderin","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adewale Akinfaderin","raw_affiliation_strings":["George Washington University,Washington D.C,USA"],"affiliations":[{"raw_affiliation_string":"George Washington University,Washington D.C,USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056701171"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":1.3852,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.7866459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9416000247001648,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9416000247001648,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9318000078201294,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9070000052452087,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7670482397079468},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6905044317245483},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5794433951377869},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5390597581863403},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.42280739545822144},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.35127609968185425},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12498870491981506}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7670482397079468},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6905044317245483},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5794433951377869},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5390597581863403},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.42280739545822144},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.35127609968185425},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12498870491981506},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaic63015.2025.10848740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaic63015.2025.10848740","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2002639138","https://openalex.org/W2115569246","https://openalex.org/W2295598076","https://openalex.org/W2394932100","https://openalex.org/W2516809705","https://openalex.org/W2789828921","https://openalex.org/W2790845983","https://openalex.org/W2875475762","https://openalex.org/W2887616981","https://openalex.org/W2940895343","https://openalex.org/W2969468102","https://openalex.org/W3005847836","https://openalex.org/W3025204993","https://openalex.org/W3085555518","https://openalex.org/W3093469966","https://openalex.org/W3102359135","https://openalex.org/W3141567114","https://openalex.org/W3141951428","https://openalex.org/W3175217968","https://openalex.org/W3176714582","https://openalex.org/W3195027245","https://openalex.org/W3202801741","https://openalex.org/W3211805421","https://openalex.org/W4200194758","https://openalex.org/W4220843302","https://openalex.org/W4289529959","https://openalex.org/W4320002857","https://openalex.org/W4366310779","https://openalex.org/W4376630313","https://openalex.org/W4386134245","https://openalex.org/W4387490462","https://openalex.org/W6679060694","https://openalex.org/W6770544051","https://openalex.org/W6773172540","https://openalex.org/W6858650245"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Objectives:":[0],"This":[1,153],"study":[2,154],"evaluates":[3],"supervised":[4],"machine":[5],"learning":[6],"(ML)":[7],"models":[8],"for":[9,51,110],"predicting":[10],"and":[11,39,47,53,66,80],"classifying":[12],"cybersecurity":[13,162],"threats":[14],"in":[15,164],"remote":[16,166],"work":[17,167],"environments":[18],"of":[19,138],"U.S.":[20],"Managed":[21],"Service":[22],"Providers":[23],"(MSPs)":[24],"using":[25,35],"IoT":[26],"devices.":[27],"Methods/Statistical":[28],"Analysis:":[29],"A":[30],"comparative":[31],"analysis":[32],"was":[33,74],"conducted":[34],"Random":[36,85],"Forest,":[37],"XGBoost,":[38],"Artificial":[40],"Neural":[41],"Networks":[42],"(ANNs).":[43],"Two":[44],"datasets,":[45],"NF-UQ-NIDS-v2":[46],"CICIDS2017,":[48],"were":[49],"used":[50],"training":[52],"validation.":[54],"Recursive":[55],"Feature":[56,118],"Elimination":[57],"(RFE)":[58],"optimized":[59],"feature":[60],"selection.":[61],"Post":[62],"hoc":[63],"explainability":[64],"techniques-LIME":[65],"SHAP-were":[67],"employed":[68],"to":[69,120,159],"enhance":[70],"interpretability.":[71],"Model":[72],"performance":[73],"measured":[75],"via":[76],"accuracy,":[77],"precision,":[78],"recall,":[79],"false":[81,96],"positive":[82,97],"rates.":[83],"Findings:":[84],"Forest":[86],"achieved":[87],"the":[88,121],"highest":[89],"accuracy":[90],"($\\mathbf{98.98":[91],"\\%}$)":[92],"with":[93],"a":[94,135],"minimal":[95],"rate":[98],"($\\mathbf{(0.0044)":[99],"\\text":[100],"{,":[101],"excelling":[102],"in}}$":[103],"precision-focused":[104],"environments.":[105,168],"XGBoost":[106],"demonstrated":[107],"broader":[108],"generalizability":[109],"diverse":[111],"threats.":[112],"ANN":[113],"classified":[114],"complex":[115],"patterns":[116],"effectively.":[117],"mapping":[119],"Cyber":[122],"Kill":[123],"Chain":[124],"framework":[125],"contextualized":[126],"threat":[127,143],"stages,":[128],"enhancing":[129],"detection":[130],"strategies.":[131],"Results":[132],"indicate":[133],"that":[134],"refined":[136],"set":[137],"features":[139],"can":[140],"achieve":[141],"robust":[142],"predictions,":[144],"minimizing":[145],"computational":[146],"costs":[147],"while":[148],"maintaining":[149],"high":[150],"accuracy.":[151],"Application/Improvements:":[152],"provides":[155],"actionable":[156],"ML":[157],"insights":[158],"improve":[160],"MSP":[161],"defenses":[163],"IoTintegrated":[165]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
