{"id":"https://openalex.org/W4401751706","doi":"https://doi.org/10.1109/icccn61486.2024.10637611","title":"Edge Computing Network Intrusion Detection System in IoT Using Deep Learning","display_name":"Edge Computing Network Intrusion Detection System in IoT Using Deep Learning","publication_year":2024,"publication_date":"2024-07-29","ids":{"openalex":"https://openalex.org/W4401751706","doi":"https://doi.org/10.1109/icccn61486.2024.10637611"},"language":"en","primary_location":{"id":"doi:10.1109/icccn61486.2024.10637611","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn61486.2024.10637611","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106662302","display_name":"Andres Hinojosa","orcid":null},"institutions":[{"id":"https://openalex.org/I226560621","display_name":"California State University, San Marcos","ror":"https://ror.org/01j8e0j24","country_code":"US","type":"education","lineage":["https://openalex.org/I226560621"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andres Hinojosa","raw_affiliation_strings":["California State University,Department of Computer Science and Information Systems,San Marcos,United States"],"affiliations":[{"raw_affiliation_string":"California State University,Department of Computer Science and Information Systems,San Marcos,United States","institution_ids":["https://openalex.org/I226560621"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045582103","display_name":"Nahid Ebrahimi Majd","orcid":null},"institutions":[{"id":"https://openalex.org/I226560621","display_name":"California State University, San Marcos","ror":"https://ror.org/01j8e0j24","country_code":"US","type":"education","lineage":["https://openalex.org/I226560621"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nahid Ebrahimi Majd","raw_affiliation_strings":["California State University,Department of Computer Science and Information Systems,San Marcos,United States"],"affiliations":[{"raw_affiliation_string":"California State University,Department of Computer Science and Information Systems,San Marcos,United States","institution_ids":["https://openalex.org/I226560621"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5106662302"],"corresponding_institution_ids":["https://openalex.org/I226560621"],"apc_list":null,"apc_paid":null,"fwci":1.502,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83472736,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7764041423797607},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7569926381111145},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6779766082763672},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6450334191322327},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5753771662712097},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49136224389076233},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4894041121006012},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.363949716091156},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3297230005264282},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.2980526089668274},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14811325073242188},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.13533490896224976}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7764041423797607},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7569926381111145},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6779766082763672},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6450334191322327},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5753771662712097},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49136224389076233},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4894041121006012},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.363949716091156},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3297230005264282},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2980526089668274},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14811325073242188},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13533490896224976}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn61486.2024.10637611","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn61486.2024.10637611","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W4382281941","https://openalex.org/W4386963944","https://openalex.org/W4387010514","https://openalex.org/W4388966623","https://openalex.org/W4390483481","https://openalex.org/W4390670372","https://openalex.org/W4390913672","https://openalex.org/W4392502545","https://openalex.org/W6735544239"],"related_works":["https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W4313339048","https://openalex.org/W3111395152","https://openalex.org/W4313526662","https://openalex.org/W4386004629","https://openalex.org/W2942586735"],"abstract_inverted_index":{"A":[0],"Network":[1],"Intrusion":[2],"Detection":[3],"System":[4],"(NIDS)":[5],"is":[6,48,70,139,143],"a":[7,23,30,71,112,123,180],"technology":[8,138],"to":[9,53,76,89,129,145,170],"monitor":[10],"the":[11,18,36,44,55,63,77,81,90,93,102,107,119,130,133,167,186,198,232,240,254],"network":[12,37,124,168,190],"traffic":[13,57,169],"and":[14,16,39,86,99,104,125,149,153,211,226],"detect":[15],"classify":[17,166],"possible":[19],"cyber":[20],"threats":[21],"towards":[22],"computer":[24],"network.":[25,64],"In":[26,109,156],"case":[27],"it":[28,33,142],"detects":[29],"potential":[31],"cyberattack,":[32],"will":[34,95],"alert":[35],"prevent":[38],"defeat":[40],"security":[41],"system.":[42],"Identifying":[43],"type":[45],"of":[46,67,73,83,114,176,188,200,234,242],"attack":[47],"invaluable":[49],"for":[50,80],"such":[51,219],"system":[52,72],"block":[54],"malicious":[56],"or":[58],"mitigate":[59],"its":[60],"impacts":[61],"on":[62,101,182,204,239],"The":[65],"Internet":[66],"Things":[68],"(IoT)":[69],"devices":[74,116],"connected":[75],"Internet,":[78],"mainly":[79],"purpose":[82],"acquiring":[84],"data":[85,94,128,209,212,216],"transmitting":[87],"that":[88,165,249],"cloud,":[91],"where":[92],"be":[96],"processed,":[97],"analyzed,":[98],"stored":[100],"cloud":[103,131],"used":[105],"by":[106,191],"user.":[108],"many":[110],"cases,":[111],"group":[113],"IoT":[115,137,177,189],"located":[117],"at":[118,185],"same":[120],"place":[121],"form":[122],"send":[126],"their":[127],"through":[132],"network\u2019s":[134],"gateway.":[135],"As":[136],"rapidly":[140],"growing,":[141],"crucial":[144],"develop":[146],"more":[147],"accurate":[148],"efficient":[150,161],"intrusion":[151,205],"detection":[152,206],"classification":[154],"systems.":[155],"this":[157],"paper,":[158],"we":[159],"propose":[160],"deep":[162,202],"learning":[163,203],"models":[164],"benign":[171],"vs":[172],"seven":[173],"main":[174],"types":[175],"attacks":[178],"with":[179,256],"focus":[181],"CICIoT2023":[183],"dataset":[184],"edge":[187,193],"leveraging":[192],"computing.":[194],"This":[195],"research":[196],"addresses":[197],"challenges":[199],"applying":[201],"datasets,":[207],"including":[208],"imbalance":[210],"distribution":[213],"discrepancy":[214],"using":[215],"preprocessing":[217],"techniques,":[218],"as":[220],"random":[221],"under":[222],"sampling,":[223],"class":[224],"weighting,":[225],"feature":[227,236],"scaling.":[228],"We":[229],"also":[230],"study":[231],"impact":[233],"different":[235],"selection":[237],"techniques":[238],"efficiencies":[241],"our":[243,250],"models.":[244],"Our":[245],"experimental":[246],"results":[247],"showed":[248],"1D-CNN":[251],"model":[252],"outperforms":[253],"state-of-the-art":[255],"93.8%":[257],"F1-score.":[258]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
