{"id":"https://openalex.org/W3020912042","doi":"https://doi.org/10.1109/jiot.2020.2993410","title":"Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network","display_name":"Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network","publication_year":2020,"publication_date":"2020-05-08","ids":{"openalex":"https://openalex.org/W3020912042","doi":"https://doi.org/10.1109/jiot.2020.2993410","mag":"3020912042"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.2993410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2993410","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086894915","display_name":"Nagarathna Ravi","orcid":"https://orcid.org/0000-0003-0355-6832"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nagarathna Ravi","raw_affiliation_strings":["Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085129181","display_name":"S. Mercy Shalinie","orcid":"https://orcid.org/0000-0003-3542-1879"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Mercy Shalinie","raw_affiliation_strings":["Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086894915"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.5547,"has_fulltext":false,"cited_by_count":84,"citation_normalized_percentile":{"value":0.97522575,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"7","issue":"11","first_page":"11041","last_page":"11052"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9020155668258667},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.779977023601532},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7474148869514465},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6390653848648071},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5649132132530212},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5413089394569397},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.49661189317703247},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4806979298591614},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4684804677963257},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4653843939304352},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4608025550842285},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.45674318075180054},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.43124523758888245},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22869068384170532},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21271508932113647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9020155668258667},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.779977023601532},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7474148869514465},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6390653848648071},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5649132132530212},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5413089394569397},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49661189317703247},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4806979298591614},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4684804677963257},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4653843939304352},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4608025550842285},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.45674318075180054},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43124523758888245},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22869068384170532},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21271508932113647},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2020.2993410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2993410","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W177847060","https://openalex.org/W2029025881","https://openalex.org/W2137983211","https://openalex.org/W2188030589","https://openalex.org/W2557450880","https://openalex.org/W2570516435","https://openalex.org/W2596636257","https://openalex.org/W2733765803","https://openalex.org/W2752291283","https://openalex.org/W2786075294","https://openalex.org/W2787957674","https://openalex.org/W2796206070","https://openalex.org/W2809963016","https://openalex.org/W2810749629","https://openalex.org/W2885007481","https://openalex.org/W2885569475","https://openalex.org/W2890627666","https://openalex.org/W2899420150","https://openalex.org/W2903858009","https://openalex.org/W2921134108","https://openalex.org/W2922702111","https://openalex.org/W2929049293","https://openalex.org/W2943136123","https://openalex.org/W2963073179","https://openalex.org/W2963197901","https://openalex.org/W2965829475","https://openalex.org/W2969468102","https://openalex.org/W3105002209","https://openalex.org/W6607232846","https://openalex.org/W6761100563"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Our":[0],"world":[1],"is":[2,40,71,89,160],"moving":[3],"toward":[4],"an":[5],"Internet":[6],"of":[7,14,85,94,192],"Things":[8],"(IoT)":[9],"era":[10],"by":[11],"connecting":[12],"billions":[13],"IoT.":[15],"There":[16],"are":[17,130,137],"several":[18],"security":[19],"loopholes":[20],"in":[21,49,97,132,154],"the":[22,50,83,86,95,98,133,149,155,163,170,178,187],"IoT":[23,51,87,139],"network.":[24],"Intrusion":[25],"can":[26],"lead":[27],"to":[28,35,46,74,110],"performance":[29],"degradation":[30],"and":[31,120,127,140],"pose":[32],"a":[33,41,44,62,77,103],"threat":[34],"data":[36,65,80,150,166,180],"security.":[37],"Hence,":[38],"there":[39],"need":[42,61],"for":[43,67],"method":[45],"detect":[47,111],"intrusion":[48,57,125],"networks.":[52],"Existing":[53],"solutions":[54],"use":[55],"supervised-learning-based":[56],"detection":[58,126],"methods":[59],"that":[60,136,184],"huge":[63,78],"labeled":[64,79],"set":[66,81],"better":[68],"accuracy.":[69],"It":[70],"not":[72],"easy":[73],"source":[75],"out":[76],"because":[82],"size":[84],"network":[88],"huge.":[90],"To":[91],"overcome":[92],"some":[93],"impediments":[96],"existing":[99],"solutions,":[100],"we":[101,182],"propose":[102],"novel":[104],"SDRK":[105,113,158,185],"machine":[106],"learning":[107],"(ML)":[108],"algorithm":[109],"intrusion.":[112],"leverages":[114],"supervised":[115],"deep":[116],"neural":[117],"networks":[118],"(DNNs)":[119],"unsupervised":[121],"clustering":[122],"techniques.":[123],"The":[124,157],"mitigation":[128],"algorithms":[129],"placed":[131],"fog":[134],"nodes":[135],"between":[138],"cloud":[141],"layers.":[142],"We":[143,168],"test":[144],"our":[145],"proposed":[146],"methodology":[147],"against":[148],"deluge":[151],"(DD)":[152],"attack":[153],"testbed.":[156],"model":[159],"tested":[161],"on":[162],"benchmark":[164],"NSL-KDD":[165,179],"set.":[167],"compare":[169],"results":[171],"with":[172,177,189],"state-of-the-art":[173],"solutions.":[174],"When":[175],"testing":[176],"set,":[181],"find":[183],"detects":[186],"attacks":[188],"improved":[190],"accuracy":[191],"99.78%.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":22},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":4}],"updated_date":"2026-02-25T08:12:03.925757","created_date":"2025-10-10T00:00:00"}
