{"id":"https://openalex.org/W4388821267","doi":"https://doi.org/10.1109/idsta58916.2023.10317861","title":"A Smart Network Intrusion Detection System for Cyber Security of Industrial IoT","display_name":"A Smart Network Intrusion Detection System for Cyber Security of Industrial IoT","publication_year":2023,"publication_date":"2023-10-24","ids":{"openalex":"https://openalex.org/W4388821267","doi":"https://doi.org/10.1109/idsta58916.2023.10317861"},"language":"en","primary_location":{"id":"doi:10.1109/idsta58916.2023.10317861","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta58916.2023.10317861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Fourth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029861716","display_name":"Fadi Alzhouri","orcid":"https://orcid.org/0000-0002-2203-4434"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Fadi Alzhouri","raw_affiliation_strings":["Concordia University,Dept. of Elect. &#x0026; Computer Eng.,Montreal,Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University,Dept. of Elect. &#x0026; Computer Eng.,Montreal,Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017786516","display_name":"Hardik Gunjal","orcid":null},"institutions":[{"id":"https://openalex.org/I72541430","display_name":"Lakehead University","ror":"https://ror.org/023p7mg82","country_code":"CA","type":"education","lineage":["https://openalex.org/I72541430"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hardik Gunjal","raw_affiliation_strings":["Lakehead University,Dept. of Computer Science,Thunder Bay,Canada","Dept. of Computer Science, Lakehead University, Thunder Bay, Canada"],"affiliations":[{"raw_affiliation_string":"Lakehead University,Dept. of Computer Science,Thunder Bay,Canada","institution_ids":["https://openalex.org/I72541430"]},{"raw_affiliation_string":"Dept. of Computer Science, Lakehead University, Thunder Bay, Canada","institution_ids":["https://openalex.org/I72541430"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001836311","display_name":"Preetkumar Patel","orcid":null},"institutions":[{"id":"https://openalex.org/I72541430","display_name":"Lakehead University","ror":"https://ror.org/023p7mg82","country_code":"CA","type":"education","lineage":["https://openalex.org/I72541430"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Preetkumar Patel","raw_affiliation_strings":["Lakehead University,Dept. of Computer Science,Thunder Bay,Canada","Dept. of Computer Science, Lakehead University, Thunder Bay, Canada"],"affiliations":[{"raw_affiliation_string":"Lakehead University,Dept. of Computer Science,Thunder Bay,Canada","institution_ids":["https://openalex.org/I72541430"]},{"raw_affiliation_string":"Dept. of Computer Science, Lakehead University, Thunder Bay, Canada","institution_ids":["https://openalex.org/I72541430"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067974759","display_name":"Hammad Ahmad","orcid":"https://orcid.org/0000-0002-0434-6194"},"institutions":[{"id":"https://openalex.org/I36721946","display_name":"Kuwait University","ror":"https://ror.org/021e5j056","country_code":"KW","type":"education","lineage":["https://openalex.org/I36721946"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Ahmad Hammad","raw_affiliation_strings":["Kuwait University,Dept. of Computer Eng.,Kuwait,Kuwait","Dept. of Computer Eng., Kuwait University, Kuwait, Kuwait"],"affiliations":[{"raw_affiliation_string":"Kuwait University,Dept. of Computer Eng.,Kuwait,Kuwait","institution_ids":["https://openalex.org/I36721946"]},{"raw_affiliation_string":"Dept. of Computer Eng., Kuwait University, Kuwait, Kuwait","institution_ids":["https://openalex.org/I36721946"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022986816","display_name":"Dariush Ebrahimi","orcid":"https://orcid.org/0000-0003-2489-8858"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Dariush Ebrahimi","raw_affiliation_strings":["Concordia University,Dept. of Elect. &#x0026; Computer Eng.,Montreal,Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University,Dept. of Elect. &#x0026; Computer Eng.,Montreal,Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029861716"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":1.4064,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82924286,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"67","last_page":"75"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.8900109529495239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7888875007629395},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.7553108930587769},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6735388040542603},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6106010675430298},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5713408589363098},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5190925598144531},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5064476728439331},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5029866099357605},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4772108197212219},{"id":"https://openalex.org/keywords/multilayer-perceptron","display_name":"Multilayer perceptron","score":0.45472657680511475},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4298563599586487},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4112759828567505},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4021160304546356},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35806915163993835},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3187040090560913},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3073746860027313},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11913144588470459},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08889830112457275}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.8900109529495239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7888875007629395},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.7553108930587769},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6735388040542603},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6106010675430298},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5713408589363098},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5190925598144531},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5064476728439331},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5029866099357605},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4772108197212219},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.45472657680511475},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4298563599586487},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4112759828567505},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4021160304546356},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35806915163993835},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3187040090560913},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3073746860027313},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11913144588470459},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08889830112457275},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idsta58916.2023.10317861","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta58916.2023.10317861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Fourth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1570459469","https://openalex.org/W2062789233","https://openalex.org/W2295598076","https://openalex.org/W2296509296","https://openalex.org/W2561935797","https://openalex.org/W2903294440","https://openalex.org/W2973024821","https://openalex.org/W2991034715","https://openalex.org/W3000225415","https://openalex.org/W3015836684","https://openalex.org/W3022006982","https://openalex.org/W3215694718","https://openalex.org/W4225696264","https://openalex.org/W4314446179","https://openalex.org/W4321497442"],"related_works":["https://openalex.org/W2516092834","https://openalex.org/W2309980522","https://openalex.org/W2187618570","https://openalex.org/W4252573951","https://openalex.org/W2902958991","https://openalex.org/W1980447405","https://openalex.org/W2615554433","https://openalex.org/W2804225172","https://openalex.org/W2769409236","https://openalex.org/W2801513872"],"abstract_inverted_index":{"In":[0,50,107],"the":[1,13,19,29,51,139,147,178],"industrial":[2],"sectors,":[3],"machines":[4],"and":[5,11,55,65,82,90,112,128],"sensors":[6],"communicate":[7],"with":[8,12,155],"each":[9],"other":[10,163],"control":[14,56],"or":[15],"central":[16],"units":[17],"through":[18,61],"Internet;":[20],"this":[21,108],"forms":[22],"a":[23,62,74,101],"network":[24,88],"of":[25,32,141,177],"Industrial":[26,30],"devices":[27,84],"called":[28],"Internet":[31],"Things":[33],"(IIoT).":[34],"IIoT":[35,52,83],"is":[36,157],"an":[37],"emerging":[38],"trend":[39],"that":[40,153],"generates":[41],"big":[42],"data":[43,54],"which":[44],"could":[45],"be":[46,98,174],"vulnerable":[47],"to":[48,72,85,166,173],"cyber-attacks.":[49,92],"network,":[53],"instructions":[57],"are":[58],"usually":[59],"flown":[60],"Supervisory":[63],"Control":[64],"Data":[66],"Acquisition":[67],"(SCADA)":[68],"system.":[69],"We":[70],"propose":[71],"install":[73],"Network":[75,126,131],"Intrusion":[76],"Detection":[77],"System":[78],"(NIDS)":[79],"between":[80],"SCADA":[81],"monitor":[86],"real-time":[87],"traffic":[89],"detect":[91],"Several":[93],"deep":[94,115],"learning":[95,116],"algorithms":[96],"can":[97],"used":[99],"on":[100,133],"large":[102],"dataset":[103],"for":[104,144],"intrusion":[105],"detection.":[106],"paper,":[109],"we":[110],"implement":[111],"compare":[113],"three":[114],"algorithms,":[117],"namely,":[118],"MultiLayer":[119],"Perceptron":[120],"(MLP),":[121],"Fully":[122],"Connected":[123],"Deep":[124],"Neural":[125,130],"(FCNN),":[127],"Convolutional":[129],"(CNN),":[132],"two":[134],"different":[135],"datasets":[136],"by":[137],"varying":[138],"number":[140],"selected":[142],"features":[143],"classifications":[145],"using":[146],"XGBoost":[148,156],"algorithm.":[149],"The":[150],"study":[151],"shows":[152],"CNN":[154],"superior":[158],"in":[159],"its":[160],"performance":[161],"over":[162],"methods":[164],"applied":[165],"NIDS.":[167],"Our":[168],"proposed":[169],"methodology":[170],"has":[171],"proven":[172],"effective":[175],"regardless":[176],"highly":[179],"unbalanced":[180],"dataset.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
