{"id":"https://openalex.org/W4312655287","doi":"https://doi.org/10.1109/jiot.2022.3229722","title":"Deep AI-Powered Cyber Threat Analysis in IIoT","display_name":"Deep AI-Powered Cyber Threat Analysis in IIoT","publication_year":2022,"publication_date":"2022-12-16","ids":{"openalex":"https://openalex.org/W4312655287","doi":"https://doi.org/10.1109/jiot.2022.3229722"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3229722","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3229722","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022538220","display_name":"Iram Bibi","orcid":"https://orcid.org/0000-0002-7381-0683"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Iram Bibi","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technical University Eindhoven, Eindhoven, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-7381-0683","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technical University Eindhoven, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035884247","display_name":"Adnan Akhunzada","orcid":"https://orcid.org/0000-0001-8370-9290"},"institutions":[{"id":"https://openalex.org/I4210105992","display_name":"Qatar Science and Technology Park","ror":"https://ror.org/01gshyb58","country_code":"QA","type":"archive","lineage":["https://openalex.org/I4210105992"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Adnan Akhunzada","raw_affiliation_strings":["Department of Cybersecurity, College of Computing and IT, University of Doha for Science and Technology, Doha, Qatar"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, College of Computing and IT, University of Doha for Science and Technology, Doha, Qatar","institution_ids":["https://openalex.org/I4210105992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]},{"id":"https://openalex.org/I56306041","display_name":"Lebanese American University","ror":"https://ror.org/00hqkan37","country_code":"LB","type":"education","lineage":["https://openalex.org/I56306041"]},{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN","LB","SA"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India","Faculty of Computing and IT, King AbdulAziz University, Jeddah, Saudi Arabia","Department of Electrical and Computer Engineering, Lebanese American University, Beirut, Lebanon"],"raw_orcid":"https://orcid.org/0000-0002-3020-3947","affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India","institution_ids":["https://openalex.org/I5847235"]},{"raw_affiliation_string":"Faculty of Computing and IT, King AbdulAziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Lebanese American University, Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022538220"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":4.1375,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.94253667,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"10","issue":"9","first_page":"7749","last_page":"7760"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8393255472183228},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7082107663154602},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6040937900543213},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.5965410470962524},{"id":"https://openalex.org/keywords/orchestration","display_name":"Orchestration","score":0.5323358774185181},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5116786956787109},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5106356739997864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5079010128974915},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4842102527618408},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.47879037261009216},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4221535325050354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40032780170440674},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.29733744263648987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8393255472183228},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7082107663154602},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6040937900543213},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.5965410470962524},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.5323358774185181},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5116786956787109},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5106356739997864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5079010128974915},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4842102527618408},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.47879037261009216},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4221535325050354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40032780170440674},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.29733744263648987},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C558565934","wikidata":"https://www.wikidata.org/wiki/Q2743","display_name":"Musical","level":2,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3229722","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3229722","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1485009520","https://openalex.org/W2554148185","https://openalex.org/W2786070938","https://openalex.org/W2787296320","https://openalex.org/W2804368608","https://openalex.org/W2806665540","https://openalex.org/W2846676623","https://openalex.org/W2892583370","https://openalex.org/W2902209387","https://openalex.org/W2902711202","https://openalex.org/W2908701480","https://openalex.org/W2910068345","https://openalex.org/W2937220155","https://openalex.org/W2963197901","https://openalex.org/W2980999875","https://openalex.org/W2981859286","https://openalex.org/W2999469653","https://openalex.org/W2999472659","https://openalex.org/W2999613521","https://openalex.org/W2999702983","https://openalex.org/W3005097670","https://openalex.org/W3005260862","https://openalex.org/W3012437309","https://openalex.org/W3014810737","https://openalex.org/W3015447130","https://openalex.org/W3020687048","https://openalex.org/W3024338941","https://openalex.org/W3036078548","https://openalex.org/W3041379049","https://openalex.org/W3041983853","https://openalex.org/W3042562967","https://openalex.org/W3045755143","https://openalex.org/W3085802396","https://openalex.org/W3087470167","https://openalex.org/W3087849800","https://openalex.org/W3088067349","https://openalex.org/W3102091066","https://openalex.org/W3115360974","https://openalex.org/W3126669246","https://openalex.org/W3140220336","https://openalex.org/W3175660521","https://openalex.org/W3191884578","https://openalex.org/W3195892385","https://openalex.org/W4285157251","https://openalex.org/W6757483233","https://openalex.org/W6758101687"],"related_works":["https://openalex.org/W2905433371","https://openalex.org/W4390569940","https://openalex.org/W2888392564","https://openalex.org/W4361193272","https://openalex.org/W4310278675","https://openalex.org/W4388422664","https://openalex.org/W2806259446","https://openalex.org/W2963326959","https://openalex.org/W79913212","https://openalex.org/W4247136043"],"abstract_inverted_index":{"Distributed":[0],"Industrial":[1],"Internet":[2],"of":[3,20,95,119,150],"Things":[4],"(IIoT)":[5],"has":[6],"entirely":[7],"revolutionized":[8],"the":[9,31,106,128],"industrial":[10,16],"sector":[11],"that":[12],"varies":[13],"from":[14],"autonomous":[15,60],"processes":[17,21],"to":[18,67,89],"automation":[19],"without":[22],"human":[23],"intervention.":[24],"However,":[25],"threat":[26,62,125],"hunting":[27,45],"and":[28,58,64,100,123,141],"intelligence":[29,63],"is":[30,83,131],"most":[32],"complex":[33],"task":[34],"in":[35,49,148,157],"distributed":[36,50],"IIoT.":[37],"Besides,":[38],"there":[39],"exist":[40],"no":[41],"standard":[42],"architectures":[43,140],"for":[44],"micro":[46],"services":[47],"orchestration":[48],"IIoT":[51,70,97],"systems.":[52],"The":[53,144],"authors":[54,107],"propose":[55],"an":[56],"efficient":[57],"self-learning":[59],"multivector":[61],"detection":[65,151],"mechanism":[66,82,146],"proactively":[68],"defend":[69],"systems/networks.":[71],"Our":[72],"proposed":[73,129,145],"novel":[74],"compute":[75],"unified":[76],"device":[77],"architecture-empowered":[78],"Convolutional":[79],"LSTM2D":[80],"(ConvLSTM2D)":[81],"highly":[84],"scalable":[85],"with":[86,114,133,153],"self-optimizing":[87],"capabilities":[88],"proficiently":[90],"tackle":[91],"diverse":[92],"dynamic":[93],"variants":[94],"emerging":[96],"sophisticated":[98],"threats":[99],"attacks.":[101],"For":[102],"a":[103,109,154],"comprehensive":[104],"evaluation,":[105],"employed":[108],"current":[110],"state-of-the-art":[111],"data":[112],"set":[113],"21":[115],"million":[116],"instances":[117],"comprised":[118],"varying":[120],"attack":[121],"patterns":[122],"prevalent":[124],"vectors.":[126],"Moreover,":[127],"technique":[130],"compared":[132],"our":[134],"constructed":[135],"contemporary":[136],"deep":[137],"learning":[138],"(DL)-driven":[139],"benchmark":[142],"algorithms.":[143],"outperforms":[147],"terms":[149],"accuracy":[152],"trivial":[155],"tradeoff":[156],"speed":[158],"efficiency.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
