{"id":"https://openalex.org/W4411171834","doi":"https://doi.org/10.1109/mitp.2025.3556242","title":"Intelligent Control Agent For IoT Network Attack Detection: A Machine Learning Approach","display_name":"Intelligent Control Agent For IoT Network Attack Detection: A Machine Learning Approach","publication_year":2025,"publication_date":"2025-05-01","ids":{"openalex":"https://openalex.org/W4411171834","doi":"https://doi.org/10.1109/mitp.2025.3556242"},"language":"en","primary_location":{"id":"doi:10.1109/mitp.2025.3556242","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mitp.2025.3556242","pdf_url":null,"source":{"id":"https://openalex.org/S86192639","display_name":"IT Professional","issn_l":"1520-9202","issn":["1520-9202","1941-045X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094272963","display_name":"Hussam Hussein Abu Munshar","orcid":"https://orcid.org/0009-0006-4965-0997"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Hussam Hussein Abu Munshar","raw_affiliation_strings":["Universite de Sousse, ISITCom, Hammam Sousse, Tunisia"],"affiliations":[{"raw_affiliation_string":"Universite de Sousse, ISITCom, Hammam Sousse, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083073132","display_name":"Farah Jemili","orcid":"https://orcid.org/0000-0001-7511-1221"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Farah Jemili","raw_affiliation_strings":["Universite de Sousse, ISITCom, Hammam Sousse, Tunisia"],"affiliations":[{"raw_affiliation_string":"Universite de Sousse, ISITCom, Hammam Sousse, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085758758","display_name":"Ouajdi Korbaa","orcid":"https://orcid.org/0000-0003-4462-1805"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Ouajdi Korbaa","raw_affiliation_strings":["Universite de Sousse, ISITCom, Hammam Sousse, Tunisia"],"affiliations":[{"raw_affiliation_string":"Universite de Sousse, ISITCom, Hammam Sousse, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051819567","display_name":"Mohammad Alauthman","orcid":"https://orcid.org/0000-0003-0319-1968"},"institutions":[{"id":"https://openalex.org/I36622005","display_name":"Petra University","ror":"https://ror.org/039d9es10","country_code":"JO","type":"education","lineage":["https://openalex.org/I36622005"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Alauthman","raw_affiliation_strings":["University of Petra, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"University of Petra, Amman, Jordan","institution_ids":["https://openalex.org/I36622005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5094272963"],"corresponding_institution_ids":["https://openalex.org/I8636806"],"apc_list":null,"apc_paid":null,"fwci":3.0916,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.91984292,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"27","issue":"3","first_page":"78","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7809597253799438},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5892411470413208},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5160222053527832},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48740795254707336},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41908878087997437},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3267498016357422}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7809597253799438},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5892411470413208},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5160222053527832},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48740795254707336},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41908878087997437},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3267498016357422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mitp.2025.3556242","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mitp.2025.3556242","pdf_url":null,"source":{"id":"https://openalex.org/S86192639","display_name":"IT Professional","issn_l":"1520-9202","issn":["1520-9202","1941-045X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2498302240","https://openalex.org/W2557469050","https://openalex.org/W2574448563","https://openalex.org/W2590373591","https://openalex.org/W2591712613","https://openalex.org/W2921669466","https://openalex.org/W2955182473","https://openalex.org/W2963197901","https://openalex.org/W2991140181","https://openalex.org/W2999613521","https://openalex.org/W3013100408","https://openalex.org/W4283820151","https://openalex.org/W4313259256","https://openalex.org/W4381856354"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"This":[0,88],"investigation":[1],"addresses":[2],"critical":[3],"security":[4,92,118],"vulnerabilities":[5],"in":[6,109],"Internet":[7,22],"of":[8,15,23,99],"Things":[9,24],"(IoT)":[10],"architectures":[11],"through":[12,77,93],"the":[13,21,50,97],"implementation":[14],"a":[16],"machine":[17,47],"learning-enhanced":[18],"subsystem":[19],"within":[20],"intelligent":[25],"control":[26],"agent":[27],"(IoT-ICA)":[28],"framework.":[29],"The":[30,71],"methodology":[31],"integrates":[32],"four":[33],"distinct":[34],"algorithmic":[35,106],"approaches\u2014support":[36],"vector":[37],"machines,":[38],"random":[39],"forests":[40],"(RFs),":[41],"XGBoost,":[42],"and":[43,67,104],"light":[44],"gradient":[45],"boosting":[46],"(LGBM)\u2014evaluated":[48],"against":[49],"MedBotIoT":[51],"dataset\u2019s":[52],"heterogeneous":[53],"device":[54],"configurations.":[55],"Empirical":[56],"analysis":[57],"demonstrates":[58],"LGBM\u2019s":[59],"superior":[60],"efficacy,":[61],"achieving":[62],"99.04%":[63],"threat":[64,85],"detection":[65,86],"rates":[66],"99.02%":[68],"classification":[69],"accuracy.":[70],"implementation\u2019s":[72],"computational":[73],"efficiency":[74],"is":[75],"optimized":[76],"strategic":[78],"feature":[79],"selection":[80],"protocols":[81],"while":[82],"maintaining":[83],"high-precision":[84],"capabilities.":[87],"research":[89],"advances":[90],"IoT":[91,117],"two":[94],"principal":[95],"contributions:":[96],"development":[98],"an":[100],"adaptive":[101],"monitoring":[102],"system":[103],"comprehensive":[105],"performance":[107],"evaluation":[108],"resource-constrained":[110],"environments,":[111],"establishing":[112],"foundational":[113],"methodologies":[114],"for":[115],"robust":[116],"implementations.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
