{"id":"https://openalex.org/W4385679807","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182654","title":"IoMT Security Model based on Machine Learning and Risk Assessment Techniques","display_name":"IoMT Security Model based on Machine Learning and Risk Assessment Techniques","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4385679807","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182654"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10182654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc58020.2023.10182654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014124197","display_name":"Sondes Ksibi","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Sondes Ksibi","raw_affiliation_strings":["University of Carthage,Higher School of Communication of Tunis (Sup&#x2019;Com) Innov&#x2019;Com Lab \\ Digital Security Research Lab,Tunis,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage,Higher School of Communication of Tunis (Sup&#x2019;Com) Innov&#x2019;Com Lab \\ Digital Security Research Lab,Tunis,Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002514441","display_name":"Faouzi Ja\u00efdi","orcid":"https://orcid.org/0000-0001-5893-5296"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Faouzi Jaidi","raw_affiliation_strings":["University of Carthage,Higher School of Communication of Tunis (Sup&#x2019;Com) Innov&#x2019;Com Lab \\ Digital Security Research Lab,Tunis,Tunisia","National School of Engineers of Carthage, University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage,Higher School of Communication of Tunis (Sup&#x2019;Com) Innov&#x2019;Com Lab \\ Digital Security Research Lab,Tunis,Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"National School of Engineers of Carthage, University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075259756","display_name":"Adel Bouhoula","orcid":"https://orcid.org/0000-0003-2920-2338"},"institutions":[{"id":"https://openalex.org/I53218197","display_name":"Arabian Gulf University","ror":"https://ror.org/04gd4wn47","country_code":"BH","type":"education","lineage":["https://openalex.org/I53218197"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["Arabian Gulf University,College of Graduate Studies,Department of Next-Generation Computing,Kingdom of Bahrain","Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"Arabian Gulf University,College of Graduate Studies,Department of Next-Generation Computing,Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]},{"raw_affiliation_string":"Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014124197"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":1.457,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.81926886,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"614","last_page":"619"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9624999761581421,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9620000123977661,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7393196821212769},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5955267548561096},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5848636031150818},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.560105562210083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.513626754283905},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.49944329261779785},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.49560654163360596},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3546378016471863},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2351835072040558},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13760069012641907},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09388735890388489}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7393196821212769},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5955267548561096},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5848636031150818},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.560105562210083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.513626754283905},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.49944329261779785},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.49560654163360596},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3546378016471863},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2351835072040558},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13760069012641907},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09388735890388489},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10182654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc58020.2023.10182654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2884329974","https://openalex.org/W2902106343","https://openalex.org/W2923477440","https://openalex.org/W2949570395","https://openalex.org/W2969863125","https://openalex.org/W3045149779","https://openalex.org/W3085955590","https://openalex.org/W3087990969","https://openalex.org/W3111288713","https://openalex.org/W3135344852","https://openalex.org/W3163050632","https://openalex.org/W3164159410","https://openalex.org/W3200314112","https://openalex.org/W3205446974","https://openalex.org/W4200307102","https://openalex.org/W4220898392","https://openalex.org/W4223612401","https://openalex.org/W4280623185","https://openalex.org/W4283030397","https://openalex.org/W4292258984","https://openalex.org/W4297536201","https://openalex.org/W4311926189","https://openalex.org/W4311926745","https://openalex.org/W4313471423","https://openalex.org/W4320919061","https://openalex.org/W4353046955","https://openalex.org/W6756555459","https://openalex.org/W6846931036"],"related_works":["https://openalex.org/W2076536433","https://openalex.org/W90316445","https://openalex.org/W4327743613","https://openalex.org/W2965447900","https://openalex.org/W3199750033","https://openalex.org/W2374509987","https://openalex.org/W3163373470","https://openalex.org/W3005856188","https://openalex.org/W1898221464","https://openalex.org/W4289783037"],"abstract_inverted_index":{"Internet":[0],"of":[1,18,80,88,110,133],"Medical":[2,64],"Things":[3],"(IoMT)":[4],"is":[5,16,72,96],"gaining":[6],"interest":[7],"as":[8],"an":[9],"emerging":[10],"paradigm":[11],"for":[12,143],"healthcare":[13],"improvement.":[14],"Cyber-security":[15],"one":[17],"the":[19,78,84,92,107,144],"major":[20],"issues":[21],"breaking":[22],"down":[23],"its":[24],"expansion.":[25],"Indeed,":[26],"IoMT":[27,117],"ecosystem":[28],"complexities":[29],"and":[30,37,52,86],"cyber-attacks":[31],"development":[32],"require":[33],"thinking":[34],"about":[35],"smart":[36],"efficient":[38],"security":[39,79,94],"solutions.":[40],"Machine":[41],"Learning":[42],"(ML)":[43],"techniques":[44],"are":[45],"widely":[46],"used":[47],"to":[48,59,75,105,137],"help":[49],"detecting":[50],"abnormalities":[51],"intrusions":[53],"in":[54,57,62,116],"such":[55,81],"environments":[56],"order":[58],"improve":[60],"trustworthiness":[61],"Connected":[63],"Devices":[65],"(CMD).":[66],"Towards":[67],"this":[68,101],"direction,":[69],"risk":[70,109,131,141],"assessment":[71,132],"also":[73],"proposed":[74],"proactively":[76],"evaluate":[77,106],"platforms.":[82],"Regarding":[83],"complexity":[85],"heterogeneity":[87],"IoMT,":[89],"dealing":[90],"with":[91,129],"inherent":[93],"risks":[95],"a":[97,139],"challenging":[98],"task.":[99],"In":[100],"context,":[102],"we":[103],"aim":[104],"cumulative":[108],"CMD":[111],"based":[112],"on":[113,125],"anomaly":[114],"detection":[115,127],"traffic":[118],"via":[119],"ML":[120],"algorithms.":[121],"Our":[122],"model":[123],"relies":[124],"anomalies":[126],"coupled":[128],"intrinsic":[130],"medical":[134],"devices":[135],"trying":[136],"have":[138],"holistic":[140],"evaluation":[142],"platform.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
