{"id":"https://openalex.org/W4416650052","doi":"https://doi.org/10.1109/tce.2025.3636786","title":"SDN-Empowered Hybrid Deep Learning Inspired Proactive Threat Hunting Framework for Enhancing Edge-Based Consumer Electronics Security","display_name":"SDN-Empowered Hybrid Deep Learning Inspired Proactive Threat Hunting Framework for Enhancing Edge-Based Consumer Electronics Security","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W4416650052","doi":"https://doi.org/10.1109/tce.2025.3636786"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3636786","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3636786","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015515752","display_name":"Aliya Aleryani","orcid":"https://orcid.org/0000-0001-9844-0327"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Aliya Aleryani","raw_affiliation_strings":["Department of Computer Science, College of Computer Science, King Khalid University, Abha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Science, King Khalid University, Abha, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031564954","display_name":"Zaid Bassfar","orcid":"https://orcid.org/0000-0003-1172-885X"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Zaid Bassfar","raw_affiliation_strings":["Faculty of Computing and Information Technology, University of Tabuk, Tabuk, Saudi Arabia","Faculty of computing and information technology, University of Tabuk, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Information Technology, University of Tabuk, Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]},{"raw_affiliation_string":"Faculty of computing and information technology, University of Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011792535","display_name":"Zuhair M. Mohammedsaleh","orcid":"https://orcid.org/0009-0002-1124-5778"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Zuhair M. Mohammedsaleh","raw_affiliation_strings":["Department of Medical Laboratory Technology, Faculty of Applied Medical Sciences, University of Tabuk, Tabuk, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Medical Laboratory Technology, Faculty of Applied Medical Sciences, University of Tabuk, Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023252755","display_name":"Majed Aborokbah","orcid":"https://orcid.org/0000-0001-7376-1458"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Majed Aborokbah","raw_affiliation_strings":["Faculty of Computing and Information Technology, University of Tabuk, Tabuk, Saudi Arabia","Faculty of computing and information technology, University of Tabuk, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Information Technology, University of Tabuk, Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]},{"raw_affiliation_string":"Faculty of computing and information technology, University of Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5015515752"],"corresponding_institution_ids":["https://openalex.org/I82952536"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41455322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1857","last_page":"1864"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.7698000073432922,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.7698000073432922,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0868000015616417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.010599999688565731,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6510999798774719},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6413999795913696},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5644999742507935},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.503000020980835},{"id":"https://openalex.org/keywords/electronics","display_name":"Electronics","score":0.4803999960422516},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.4731000065803528},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.4041000008583069},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3921000063419342},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.38040000200271606},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3278000056743622}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6995000243186951},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6510999798774719},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6413999795913696},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5644999742507935},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5055000185966492},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.503000020980835},{"id":"https://openalex.org/C138331895","wikidata":"https://www.wikidata.org/wiki/Q11650","display_name":"Electronics","level":2,"score":0.4803999960422516},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.4731000065803528},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4068000018596649},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.4041000008583069},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40290001034736633},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3921000063419342},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.38040000200271606},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3278000056743622},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3228999972343445},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3190000057220459},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.31630000472068787},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3075999915599823},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.30559998750686646},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.29829999804496765},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.29820001125335693},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.29429998993873596},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C2777826224","wikidata":"https://www.wikidata.org/wiki/Q5250404","display_name":"Deep integration","level":2,"score":0.2703000009059906},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C88796919","wikidata":"https://www.wikidata.org/wiki/Q1142907","display_name":"Backbone network","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.25999999046325684},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C198783460","wikidata":"https://www.wikidata.org/wiki/Q629173","display_name":"Management system","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.2513999938964844},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3636786","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3636786","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2911505293","https://openalex.org/W3150247581","https://openalex.org/W3166216072","https://openalex.org/W3185895012","https://openalex.org/W3195274148","https://openalex.org/W4214596881","https://openalex.org/W4285106051","https://openalex.org/W4296913371","https://openalex.org/W4306650020","https://openalex.org/W4385380338","https://openalex.org/W4403605016","https://openalex.org/W4407643445","https://openalex.org/W4408733520","https://openalex.org/W4409771033"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"rise":[2],"of":[3,34,55,96,145,251,256],"Edge-based":[4],"Consumer":[5],"Electronics":[6],"(CE)":[7],"created":[8],"a":[9,186,203],"hyperconnected":[10],"and":[11,20,27,38,49,93,102,137,143,150,160,176,194,208,228,253],"automated":[12],"digital":[13],"ecosystem.":[14],"These":[15,258],"systems":[16],"comprise":[17],"diverse,":[18],"dynamic,":[19],"complex":[21],"devices":[22],"that":[23,242],"interact":[24],"over":[25],"wireless":[26],"often":[28],"decentralized":[29],"networks.":[30],"However,":[31],"the":[32,53,91,135,154,158,169,199,238,243,262,267],"lack":[33],"standardization,":[35],"device":[36],"heterogeneity,":[37],"growing":[39],"attack":[40],"surface":[41],"present":[42],"significant":[43],"challenges":[44],"to":[45,172,233,261],"traditional":[46],"network":[47,131],"management":[48,144],"security":[50],"frameworks.":[51],"With":[52],"advancement":[54],"communication":[56],"technologies,":[57],"cybersecurity":[58],"threats":[59],"targeting":[60],"edge-based":[61,125,269],"CE":[62,270],"have":[63],"escalated,":[64],"demanding":[65],"more":[66,187],"intelligent":[67],"protection":[68],"mechanisms.":[69],"Recent":[70],"progress":[71],"in":[72,105,179,265],"Network":[73],"Intrusion":[74],"Detection":[75],"Systems":[76],"(NIDS)":[77],"has":[78,168],"shifted":[79],"toward":[80],"Deep":[81],"Learning":[82],"(DL)-based":[83],"anomaly":[84],"detection,":[85,153],"which":[86],"offers":[87],"high":[88],"accuracy.":[89],"Yet,":[90],"complexity":[92],"black-box":[94],"nature":[95],"DL":[97,162],"models":[98],"limit":[99],"their":[100],"transparency":[101],"user":[103],"trust":[104],"consumer":[106],"applications.":[107],"To":[108],"overcome":[109],"these":[110],"issues,":[111],"this":[112],"paper":[113],"proposes":[114],"an":[115,249,254],"SDN-assisted,":[116],"Explainable":[117],"AI":[118],"(XAI)-based":[119],"threat":[120,152],"detection":[121],"framework":[122,201,244],"tailored":[123],"for":[124],"CE.":[126],"Software-Defined":[127],"Networking":[128],"(SDN)":[129],"enhances":[130],"control":[132,136],"by":[133],"separating":[134],"data":[138],"planes,":[139],"allowing":[140],"efficient":[141,189],"coordination":[142],"heterogeneous":[146],"devices.":[147],"For":[148],"accurate":[149],"proactive":[151],"proposed":[155],"system":[156],"combines":[157],"BiLSTM":[159],"BiGRU":[161,184],"models.":[163],"Our":[164],"suggested":[165,200],"BiLSTM-BiGRU":[166],"fusion":[167],"unique":[170],"ability":[171],"capture":[173],"contextual":[174],"patterns":[175],"long-range":[177],"dependencies":[178],"sequential":[180],"traffic":[181],"data,":[182],"while":[183],"provides":[185],"computationally":[188],"structure":[190],"with":[191,248],"faster":[192],"convergence":[193],"lower":[195],"parameter":[196],"overhead.":[197],"Additionally,":[198],"strikes":[202],"balance":[204],"between":[205],"lightweight":[206],"efficiency":[207],"deep":[209],"temporal":[210],"representation,":[211],"guaranteeing":[212],"robustness":[213],"without":[214],"incurring":[215],"undue":[216],"computational":[217],"costs.":[218],"Model":[219],"decisions":[220],"are":[221],"explained":[222],"using":[223],"SHAP":[224],"(SHapley":[225],"Additive":[226],"exPlanations)":[227],"PFI":[229],"(Permutation":[230],"Feature":[231],"Importance)":[232],"guarantee":[234],"interpretability.":[235],"Evaluations":[236],"on":[237],"NSL-KDD":[239],"dataset":[240],"demonstrate":[241],"outperforms":[245],"current":[246],"techniques":[247],"accuracy":[250],"99.71%":[252],"F1-score":[255],"99.30%.":[257],"outcomes":[259],"validate":[260],"framework\u2019s":[263],"resilience":[264],"protecting":[266],"developing":[268],"environment.":[271]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-25T00:00:00"}
