{"id":"https://openalex.org/W4285224916","doi":"https://doi.org/10.1109/mcom.005.2100992","title":"Proactive Defense for Fog-to-Things Critical Infrastructure","display_name":"Proactive Defense for Fog-to-Things Critical Infrastructure","publication_year":2022,"publication_date":"2022-06-13","ids":{"openalex":"https://openalex.org/W4285224916","doi":"https://doi.org/10.1109/mcom.005.2100992"},"language":"en","primary_location":{"id":"doi:10.1109/mcom.005.2100992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.005.2100992","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028805089","display_name":"Muhammad Taimoor Khan","orcid":"https://orcid.org/0000-0003-1326-7292"},"institutions":[{"id":"https://openalex.org/I4210099523","display_name":"Gulf English School","ror":"https://ror.org/0160gm722","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210099523"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Muhammad Taimoor Khan","raw_affiliation_strings":["Gulf Business Machine,Qatar","Gulf Business Machine, Qatar"],"affiliations":[{"raw_affiliation_string":"Gulf Business Machine,Qatar","institution_ids":["https://openalex.org/I4210099523"]},{"raw_affiliation_string":"Gulf Business Machine, Qatar","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035884247","display_name":"Adnan Akhunzada","orcid":"https://orcid.org/0000-0001-8370-9290"},"institutions":[{"id":"https://openalex.org/I4210139743","display_name":"Geotechnical Consulting Group (United Kingdom)","ror":"https://ror.org/04fcd0528","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210139743"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Adnan Akhunzada","raw_affiliation_strings":["GCU,UK","GCU, UK"],"affiliations":[{"raw_affiliation_string":"GCU,UK","institution_ids":["https://openalex.org/I4210139743"]},{"raw_affiliation_string":"GCU, UK","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002810652","display_name":"Sherali Zeadally","orcid":"https://orcid.org/0000-0002-5982-8190"},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sherali Zeadally","raw_affiliation_strings":["University of Kentucky,USA","University of Kentucky, USA"],"affiliations":[{"raw_affiliation_string":"University of Kentucky,USA","institution_ids":["https://openalex.org/I143302722"]},{"raw_affiliation_string":"University of Kentucky, USA","institution_ids":["https://openalex.org/I143302722"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028805089"],"corresponding_institution_ids":["https://openalex.org/I4210099523"],"apc_list":null,"apc_paid":null,"fwci":2.7611,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.90590442,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"60","issue":"12","first_page":"44","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9051624536514282},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7582516670227051},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6872043609619141},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5303704738616943},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5025513172149658},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49916625022888184},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4640566110610962},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44633421301841736},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.42891374230384827},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.42655229568481445},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4243171811103821},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.362882137298584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3610595464706421},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1466137170791626},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10630136728286743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9051624536514282},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7582516670227051},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6872043609619141},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5303704738616943},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5025513172149658},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49916625022888184},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4640566110610962},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44633421301841736},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.42891374230384827},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.42655229568481445},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4243171811103821},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.362882137298584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3610595464706421},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1466137170791626},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10630136728286743},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcom.005.2100992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.005.2100992","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307604","display_name":"Institute of International Education","ror":"https://ror.org/05s5kq870"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2171331105","https://openalex.org/W2736110559","https://openalex.org/W2782735691","https://openalex.org/W2786075294","https://openalex.org/W2789828921","https://openalex.org/W2804175422","https://openalex.org/W2883743354","https://openalex.org/W2887506070","https://openalex.org/W2889885925","https://openalex.org/W2890507837","https://openalex.org/W2914200181","https://openalex.org/W2971076825","https://openalex.org/W3003685271","https://openalex.org/W3116340568","https://openalex.org/W3179054875","https://openalex.org/W6753060381","https://openalex.org/W6787141815"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4394895745","https://openalex.org/W4247566972","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2398230795","https://openalex.org/W2482588909","https://openalex.org/W4298342836","https://openalex.org/W4366290225","https://openalex.org/W2809425066"],"abstract_inverted_index":{"Robust":[0],"and":[1,10,14,98,110,129,137],"adaptable":[2],"cybersecurity":[3],"mechanisms":[4],"are":[5],"needed":[6],"to":[7,61,133],"mitigate":[8],"sophisticated":[9],"future":[11],"zero-day":[12],"cyberattacks":[13],"threats,":[15],"particularly":[16],"in":[17,42,149],"the":[18,54,70,79,85,95,104,150],"dynamic":[19],"Fog":[20],"of":[21,29],"Things":[22],"(FoT)":[23],"computational":[24,153],"paradigm,":[25],"which":[26],"makes":[27],"use":[28],"massively":[30],"distributed":[31],"nodes.":[32],"Deep":[33],"learning":[34,49],"(DL)-driven":[35],"architectures":[36,128],"have":[37],"been":[38],"proven":[39],"more":[40],"successful":[41],"big":[43],"data":[44],"areas":[45],"than":[46],"classical":[47],"machine":[48],"(ML)-based":[50],"algorithms.":[51],"We":[52,102,118,139],"orchestrate":[53],"software":[55],"defined":[56],"networking":[57],"(SDN)":[58],"control":[59],"plane":[60],"propose":[62],"a":[63],"highly":[64],"scalable":[65],"proactive":[66],"defense":[67],"mechanism":[68],"leveraging":[69],"Cuda-Deep":[71],"Neural":[72],"Network":[73],"Gated":[74],"Recurrent":[75],"Unit":[76],"(CU-DNNGRU)":[77],"for":[78],"FoT":[80,100,152],"critical":[81],"computing":[82],"infrastructure.":[83],"Furthermore,":[84],"proposed":[86,121],"framework":[87],"does":[88],"not":[89],"place":[90],"an":[91],"extra":[92],"burden":[93],"on":[94],"underlying":[96],"energy-":[97],"power-constrained":[99],"devices.":[101],"used":[103],"current":[105],"state-of-the-art":[106],"dataset":[107],"(i.e.,":[108],"CICIDS2018)":[109],"evaluated":[111],"our":[112,120,124],"approach":[113],"using":[114],"standard":[115],"performance":[116,136],"metrics.":[117],"compare":[119],"technique":[122],"with":[123],"constructed":[125],"hybrid":[126],"DL-driven":[127],"benchmark":[130],"DL":[131],"algorithms":[132],"evaluate":[134],"its":[135],"efficacy.":[138],"hope":[140],"that":[141],"this":[142],"work":[143],"will":[144],"enable":[145],"further":[146],"security":[147],"research":[148],"next-generation":[151],"paradigms.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
