{"id":"https://openalex.org/W4384945931","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182948","title":"A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach","display_name":"A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4384945931","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182948"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10182948","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064785400","display_name":"Mehdi Houichi","orcid":"https://orcid.org/0009-0008-0255-9904"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mehdi Houichi","raw_affiliation_strings":["University of Carthage,Higher School of Communication of Tunis (Sup&#x2019;Com) Innov&#x2019;Com Lab &#x005C; Digital Security Research Lab,Tunis,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage,Higher School of Communication of Tunis (Sup&#x2019;Com) Innov&#x2019;Com Lab &#x005C; Digital Security Research Lab,Tunis,Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002514441","display_name":"Faouzi Ja\u00efdi","orcid":"https://orcid.org/0000-0001-5893-5296"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Faouzi Jaidi","raw_affiliation_strings":["University of Carthage,Higher School of Communication of Tunis (Sup&#x2019;Com), Innov&#x2019;Com Lab&#x005C; Digital Security Research Lab","National School of Engineers of Carthage, University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage,Higher School of Communication of Tunis (Sup&#x2019;Com), Innov&#x2019;Com Lab&#x005C; Digital Security Research Lab","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"National School of Engineers of Carthage, University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075259756","display_name":"Adel Bouhoula","orcid":"https://orcid.org/0000-0003-2920-2338"},"institutions":[{"id":"https://openalex.org/I53218197","display_name":"Arabian Gulf University","ror":"https://ror.org/04gd4wn47","country_code":"BH","type":"education","lineage":["https://openalex.org/I53218197"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["Arabian Gulf University,Department of Next-Generation Computing, College of Graduate Studies,Kingdom of Bahrain","Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"Arabian Gulf University,Department of Next-Generation Computing, College of Graduate Studies,Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]},{"raw_affiliation_string":"Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064785400"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48356765,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"505","last_page":"511"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7888844013214111},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7788357734680176},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6819578409194946},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.659142255783081},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6381725072860718},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6123676300048828},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5421448945999146},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.525377631187439},{"id":"https://openalex.org/keywords/smart-city","display_name":"Smart city","score":0.5188521146774292},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45959314703941345},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.41878512501716614},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27021047472953796},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17143189907073975},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16194236278533936}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7888844013214111},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7788357734680176},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6819578409194946},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.659142255783081},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6381725072860718},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6123676300048828},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5421448945999146},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.525377631187439},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.5188521146774292},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45959314703941345},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.41878512501716614},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27021047472953796},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17143189907073975},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16194236278533936}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10182948","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.5899999737739563,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W2908165293","https://openalex.org/W2908227549","https://openalex.org/W2911142008","https://openalex.org/W2911494232","https://openalex.org/W2933156791","https://openalex.org/W2941115478","https://openalex.org/W2941443247","https://openalex.org/W2958775402","https://openalex.org/W2965552844","https://openalex.org/W2988157854","https://openalex.org/W2988649036","https://openalex.org/W2991435551","https://openalex.org/W2994336423","https://openalex.org/W2995370638","https://openalex.org/W2997414109","https://openalex.org/W2998051221","https://openalex.org/W3003651800","https://openalex.org/W3003817063","https://openalex.org/W3007620260","https://openalex.org/W3012094546","https://openalex.org/W3013888436","https://openalex.org/W3025409336","https://openalex.org/W3033403042","https://openalex.org/W3034175800","https://openalex.org/W3087285748","https://openalex.org/W3115428793","https://openalex.org/W3123259439","https://openalex.org/W3130015904","https://openalex.org/W3132911739","https://openalex.org/W4205599972","https://openalex.org/W4206106667","https://openalex.org/W4210305214","https://openalex.org/W4293527012","https://openalex.org/W4297536201","https://openalex.org/W4308514121","https://openalex.org/W4312267542","https://openalex.org/W4312576847","https://openalex.org/W4380786618","https://openalex.org/W6765741601","https://openalex.org/W6794999304","https://openalex.org/W7042779261"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2616994865","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2883616266","https://openalex.org/W4296618677"],"abstract_inverted_index":{"In":[0,156],"order":[1],"to":[2,22,27,78,100,166],"improve":[3],"the":[4,28,84,113,123,127,152,161,206,223],"quality":[5],"of":[6,33,87,107,120,130,154,205,218,236],"human":[7],"existence,":[8],"comfort":[9],"and":[10,38,90,186,190,220],"efficiency":[11],"are":[12,40,49,65],"key":[13],"objectives":[14],"in":[15,31,43,137,209,228],"smart":[16,24,45],"environments.":[17],"It":[18],"is":[19,112,126],"now":[20],"possible":[21],"construct":[23],"cities":[25],"due":[26],"latest":[29],"advancements":[30],"Internet":[32,153],"Things":[34],"(IoT)":[35],"technology.":[36],"Privacy":[37],"security":[39,70,74,214],"major":[41],"concerns":[42],"IoT-based":[44,55],"objects.":[46],"Smart":[47],"environments":[48,64],"at":[50],"risk":[51],"for":[52,62,67,151],"safety":[53],"from":[54,182,213,233],"technologies.":[56],"Intrusion":[57],"detection":[58,149],"systems":[59,75],"(IDSs)":[60],"created":[61],"IoT":[63,124,172,237],"essential":[66],"preventing":[68],"IoT-related":[69],"threats.":[71],"Many":[72],"cyber":[73],"use":[76,160],"IDSs":[77],"find":[79],"intrusions.":[80],"Anomaly-based":[81],"IDS":[82,121],"learns":[83],"typical":[85],"pattern":[86],"system":[88,150,185],"activity":[89],"alerts":[91],"on":[92,122,169],"anomalous":[93],"events":[94,103],"as":[95,98,111],"they":[96],"happen":[97],"opposed":[99],"analyzing":[101],"monitored":[102],"against":[104],"a":[105,183,202,234],"database":[106],"known":[108],"intrusion":[109,148],"events,":[110],"case":[114],"with":[115,216],"signature-based":[116],"IDS.":[117],"The":[118,198],"installation":[119],"network":[125],"main":[128],"topic":[129],"this":[131,138,157],"paper.":[132],"Key":[133],"design":[134],"approach":[135],"presented":[136],"paper":[139],"must":[140],"be":[141],"taken":[142,181],"into":[143],"consideration":[144],"when":[145],"developing":[146],"an":[147,175],"Things.":[155],"study,":[158],"we":[159],"Convolutional":[162],"Neural":[163],"Network":[164],"(CNN)":[165],"identify":[167],"attacks":[168,232],"nine":[170],"commercial":[171],"devices.":[173,238],"Using":[174],"actual":[176],"N-BaIoT":[177],"dataset":[178],"that":[179],"was":[180,196,226],"real":[184],"included":[187],"both":[188],"benign":[189],"harmful":[191],"patterns,":[192],"extensive":[193],"empirical":[194],"research":[195],"conducted.":[197],"testing":[199],"results":[200],"demonstrated":[201],"good":[203],"accuracy":[204],"CNN":[207,224],"model":[208,225],"identifying":[210,230],"botnet":[211,231],"assaults":[212],"cameras":[215],"accuracies":[217],"90.25%":[219],"91.76%.":[221],"Overall,":[222],"effective":[227],"accurately":[229],"variety":[235]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
