{"id":"https://openalex.org/W7131629941","doi":"https://doi.org/10.1109/rif68108.2025.11406760","title":"Cyber Threat Detection in IIoT and IoMT Using DNN-GRU with Multi-Head Attention","display_name":"Cyber Threat Detection in IIoT and IoMT Using DNN-GRU with Multi-Head Attention","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7131629941","doi":"https://doi.org/10.1109/rif68108.2025.11406760"},"language":null,"primary_location":{"id":"doi:10.1109/rif68108.2025.11406760","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rif68108.2025.11406760","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Research in Computing at Feminine (RIF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093923957","display_name":"Afrah Gueriani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128965","display_name":"University Yahia Fares of Medea","ror":"https://ror.org/02e2yc259","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210128965"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Afrah Gueriani","raw_affiliation_strings":["University of MEDEA,LSEA Lab., Faculty of Technology,Medea,Algeria,26000"],"affiliations":[{"raw_affiliation_string":"University of MEDEA,LSEA Lab., Faculty of Technology,Medea,Algeria,26000","institution_ids":["https://openalex.org/I4210128965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087761119","display_name":"Hamza Kheddar","orcid":"https://orcid.org/0000-0002-9532-2453"},"institutions":[{"id":"https://openalex.org/I4210128965","display_name":"University Yahia Fares of Medea","ror":"https://ror.org/02e2yc259","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210128965"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Hamza Kheddar","raw_affiliation_strings":["University of MEDEA,LSEA Lab., Faculty of Technology,Medea,Algeria,26000"],"affiliations":[{"raw_affiliation_string":"University of MEDEA,LSEA Lab., Faculty of Technology,Medea,Algeria,26000","institution_ids":["https://openalex.org/I4210128965"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029502151","display_name":"Ahmed Cherif Mazari","orcid":"https://orcid.org/0000-0002-6021-9413"},"institutions":[{"id":"https://openalex.org/I4210128965","display_name":"University Yahia Fares of Medea","ror":"https://ror.org/02e2yc259","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210128965"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Ahmed Cherif Mazari","raw_affiliation_strings":["University of MEDEA,LSEA Lab, Faculty of Science,Medea,Algeria,26000"],"affiliations":[{"raw_affiliation_string":"University of MEDEA,LSEA Lab, Faculty of Science,Medea,Algeria,26000","institution_ids":["https://openalex.org/I4210128965"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093923957"],"corresponding_institution_ids":["https://openalex.org/I4210128965"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8870801,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1462000012397766,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1462000012397766,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.07109999656677246,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.05169999971985817,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6261000037193298},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5392000079154968},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5001000165939331},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4397999942302704},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.4034000039100647},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.3596999943256378}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.633400022983551},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6261000037193298},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5392000079154968},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5091000199317932},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4397999942302704},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.4034000039100647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3919999897480011},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37940001487731934},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.3596999943256378},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.34779998660087585},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32519999146461487},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.28859999775886536},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.27059999108314514}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/rif68108.2025.11406760","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rif68108.2025.11406760","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Research in Computing at Feminine (RIF)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W3048339221","https://openalex.org/W4200094870","https://openalex.org/W4220898392","https://openalex.org/W4226319939","https://openalex.org/W4280653480","https://openalex.org/W4285060979","https://openalex.org/W4304183900","https://openalex.org/W4362703488","https://openalex.org/W4379382257","https://openalex.org/W4383959668","https://openalex.org/W4385337322","https://openalex.org/W4387682168","https://openalex.org/W4391792613","https://openalex.org/W4391923639","https://openalex.org/W4392487628","https://openalex.org/W4392520145","https://openalex.org/W4399283298","https://openalex.org/W4401072119","https://openalex.org/W4402883814","https://openalex.org/W4406065759","https://openalex.org/W4406137943","https://openalex.org/W4407900983","https://openalex.org/W4410857897"],"related_works":[],"abstract_inverted_index":{"The":[0,75,138],"growing":[1],"prevalence":[2],"of":[3,146,159,186],"medical":[4,88,105,133,151],"and":[5,69,90,128,134,148,152,178],"industrial":[6,94,117,135,153],"IoT":[7],"in":[8,150,176],"various":[9],"domains":[10],"has":[11],"intensified":[12],"the":[13,87,93,104,116,122,167],"need":[14],"for":[15,86,92,115,132],"robust":[16],"security":[17],"mechanisms,":[18],"particularly":[19],"real-time":[20,177],"systems":[21,43],"with":[22,37,156],"minimal":[23],"false":[24],"positive":[25],"rates":[26,131],"(FPR).":[27],"Several":[28],"solutions":[29],"have":[30],"been":[31],"proposed":[32,76],"to":[33,103,174],"address":[34],"these":[35],"challenges,":[36],"artificial":[38],"intelligence":[39],"(AI)-based":[40],"intrusion":[41],"detection":[42],"(IDS)":[44],"emerging":[45],"as":[46],"a":[47,55,70],"promising":[48],"strategy.":[49],"This":[50],"study":[51],"focuses":[52],"on":[53,81],"developing":[54],"novel":[56],"hybrid":[57],"model":[58,78,139],"that":[59],"integrates":[60],"Deep":[61],"Neural":[62],"Networks":[63],"(DNN),":[64],"Gated":[65],"Recurrent":[66],"Units":[67],"(GRU),":[68],"Multi-Head":[71],"Attention":[72],"(MHA)":[73],"mechanism.":[74],"DNN+(GRU-MHA)":[77],"is":[79,101,113],"trained":[80],"two":[82],"distinct":[83],"datasets:":[84],"CICIoMT2024":[85],"domain":[89],"EdgeIIoTset":[91],"domain.":[95],"To":[96],"mitigate":[97],"class":[98],"imbalance,":[99],"RandomOverSampler":[100],"applied":[102],"dataset,":[106],"while":[107,181],"Synthetic":[108],"Minority":[109],"Over-sampling":[110],"Technique":[111],"(SMOTE)":[112],"used":[114],"dataset.":[118],"Experimental":[119],"results":[120],"demonstrate":[121],"model's":[123,169],"superior":[124],"performance,":[125],"reaching":[126],"98.22%":[127],"99.78%":[129],"accuracy":[130],"datasets,":[136,154],"respectively.":[137],"also":[140],"attained":[141],"exceptionally":[142],"low":[143],"FPR":[144],"values":[145],"0.002%":[147],"0.0000%":[149],"respectively,":[155],"inference":[157],"times":[158],"0.0001":[160],"seconds":[161],"per":[162],"instance.":[163],"These":[164],"findings":[165],"support":[166],"suggested":[168],"efficacy,":[170],"emphasizing":[171],"its":[172],"ability":[173],"perform":[175],"heterogeneous":[179],"environments":[180],"accurately":[182],"identifying":[183],"several":[184],"types":[185],"cyber-threats.":[187]},"counts_by_year":[],"updated_date":"2026-02-27T14:28:36.762950","created_date":"2026-02-27T00:00:00"}
