{"id":"https://openalex.org/W4403391321","doi":"https://doi.org/10.1109/iotsms62296.2024.10710299","title":"CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution","display_name":"CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4403391321","doi":"https://doi.org/10.1109/iotsms62296.2024.10710299"},"language":"en","primary_location":{"id":"doi:10.1109/iotsms62296.2024.10710299","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms62296.2024.10710299","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079151833","display_name":"Ali Deveci","orcid":"https://orcid.org/0000-0002-4990-0785"},"institutions":[{"id":"https://openalex.org/I66514158","display_name":"Hacettepe University","ror":"https://ror.org/04kwvgz42","country_code":"TR","type":"education","lineage":["https://openalex.org/I66514158"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Ali Deveci","raw_affiliation_strings":["Hacettepe University,WISE Lab.,Ankara,Turkey"],"affiliations":[{"raw_affiliation_string":"Hacettepe University,WISE Lab.,Ankara,Turkey","institution_ids":["https://openalex.org/I66514158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016700180","display_name":"Selim Y\u0131lmaz","orcid":"https://orcid.org/0000-0002-9516-6892"},"institutions":[{"id":"https://openalex.org/I66514158","display_name":"Hacettepe University","ror":"https://ror.org/04kwvgz42","country_code":"TR","type":"education","lineage":["https://openalex.org/I66514158"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Selim Y\u0131lmaz","raw_affiliation_strings":["Hacettepe University,WISE Lab.,Ankara,Turkey"],"affiliations":[{"raw_affiliation_string":"Hacettepe University,WISE Lab.,Ankara,Turkey","institution_ids":["https://openalex.org/I66514158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024272295","display_name":"Sevil \u015een","orcid":"https://orcid.org/0000-0001-5814-9973"},"institutions":[{"id":"https://openalex.org/I66514158","display_name":"Hacettepe University","ror":"https://ror.org/04kwvgz42","country_code":"TR","type":"education","lineage":["https://openalex.org/I66514158"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Sevil Sen","raw_affiliation_strings":["Hacettepe University,WISE Lab.,Ankara,Turkey"],"affiliations":[{"raw_affiliation_string":"Hacettepe University,WISE Lab.,Ankara,Turkey","institution_ids":["https://openalex.org/I66514158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079151833"],"corresponding_institution_ids":["https://openalex.org/I66514158"],"apc_list":null,"apc_paid":null,"fwci":0.7326,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73401758,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"98","last_page":"105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9516000151634216,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7016438245773315},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6714768409729004},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6606290340423584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3255463242530823}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7016438245773315},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6714768409729004},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6606290340423584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3255463242530823}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iotsms62296.2024.10710299","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms62296.2024.10710299","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1965401861","https://openalex.org/W2020854838","https://openalex.org/W2040492000","https://openalex.org/W2086167429","https://openalex.org/W2096059127","https://openalex.org/W2139669429","https://openalex.org/W2303186826","https://openalex.org/W2490339427","https://openalex.org/W2590373591","https://openalex.org/W2791199169","https://openalex.org/W2795845996","https://openalex.org/W2912043702","https://openalex.org/W2968351487","https://openalex.org/W3092415487","https://openalex.org/W3095710854","https://openalex.org/W3144278514","https://openalex.org/W3179054875","https://openalex.org/W4296101513","https://openalex.org/W4361248546","https://openalex.org/W4362727960","https://openalex.org/W6675338768","https://openalex.org/W6753545771","https://openalex.org/W6851514033"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W4391913857","https://openalex.org/W2950174689","https://openalex.org/W2358668433"],"abstract_inverted_index":{"The":[0,129],"vulnerability":[1],"of":[2,18,112,140],"the":[3,16,102,110,138,144],"Routing":[4],"Protocol":[5],"for":[6,68],"Low-Power":[7],"and":[8,20,49,78,83,105,137,154],"Lossy":[9],"Networks":[10],"(RPL)":[11],"to":[12,22,25,39,55],"insider":[13],"attackers":[14],"highlights":[15],"importance":[17],"detecting":[19],"responding":[21],"malicious":[23],"attempts":[24],"ensure":[26],"uninterrupted":[27],"protocol":[28],"operation.":[29],"Researchers":[30],"are":[31],"generally":[32],"developing":[33],"collaborative":[34,87,127],"Intrusion":[35,65],"Detection":[36,66],"Systems":[37],"(IDS)":[38],"increase":[40],"detection":[41,103],"performance,":[42],"yet":[43],"achieving":[44],"a":[45,61,90,119,132],"balance":[46],"between":[47,135],"effectiveness":[48,77],"efficiency":[50],"remains":[51],"challenging,":[52],"often":[53],"leading":[54],"compromises.":[56],"Here,":[57],"we":[58],"introduce":[59],"CoCoIDS,":[60],"Collaborative":[62],"Co-evolution":[63],"Based":[64],"System":[67],"IoT.":[69],"Unlike":[70],"existing":[71],"approaches,":[72],"our":[73,98],"solution":[74],"prioritizes":[75],"both":[76],"efficiency,":[79],"including":[80],"communication":[81,123],"cost":[82],"resource":[84],"consumption":[85],"in":[86,118],"nodes.":[88,142],"Through":[89],"cooperative":[91],"co-evolution":[92],"strategy":[93],"based":[94,150],"on":[95,151],"multi-objective":[96],"optimization,":[97],"approach":[99],"simultaneously":[100],"optimizes":[101],"algorithm":[104],"collaborator":[106,113,141],"node":[107],"selection.":[108],"Minimizing":[109],"number":[111,139],"nodes":[114],"is":[115],"especially":[116],"important":[117],"lossy":[120],"environment,":[121],"where":[122],"disruptions":[124],"can":[125],"block":[126],"efforts.":[128],"results":[130],"show":[131],"balanced":[133],"trade-off":[134],"accuracy":[136],"Additionally,":[143],"study":[145],"thoroughly":[146],"analyzes":[147],"selected":[148],"collaborators":[149],"their":[152],"locations":[153],"targeted":[155],"attack":[156],"types.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
