{"id":"https://openalex.org/W4389576025","doi":"https://doi.org/10.1109/vtc2023-fall60731.2023.10333818","title":"ABDNN-IDS: Attention-Based Deep Neural Networks for Intrusion Detection in Industrial IoT","display_name":"ABDNN-IDS: Attention-Based Deep Neural Networks for Intrusion Detection in Industrial IoT","publication_year":2023,"publication_date":"2023-10-10","ids":{"openalex":"https://openalex.org/W4389576025","doi":"https://doi.org/10.1109/vtc2023-fall60731.2023.10333818"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2023-fall60731.2023.10333818","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2023-fall60731.2023.10333818","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017797877","display_name":"Safi Ullah","orcid":"https://orcid.org/0000-0002-9973-640X"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]},{"id":"https://openalex.org/I12469534","display_name":"Quaid-i-Azam University","ror":"https://ror.org/04s9hft57","country_code":"PK","type":"education","lineage":["https://openalex.org/I12469534"]}],"countries":["PK","SA"],"is_corresponding":true,"raw_author_name":"Safi Ullah","raw_affiliation_strings":["Prince Sultan University,Riyadh,Saudi Arabia,12435","Department of Computer Science, Quaid-i-Azam University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Prince Sultan University,Riyadh,Saudi Arabia,12435","institution_ids":["https://openalex.org/I142024983"]},{"raw_affiliation_string":"Department of Computer Science, Quaid-i-Azam University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I12469534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042123158","display_name":"Wadii Boulila","orcid":"https://orcid.org/0000-0003-2133-0757"},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]},{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA","TN"],"is_corresponding":false,"raw_author_name":"Wadii Boulila","raw_affiliation_strings":["Prince Sultan University,Riyadh,Saudi Arabia,12435","RIADI Laboratory, National School of Computer Science, University of Manouba, Manouba, Tunisia"],"affiliations":[{"raw_affiliation_string":"Prince Sultan University,Riyadh,Saudi Arabia,12435","institution_ids":["https://openalex.org/I142024983"]},{"raw_affiliation_string":"RIADI Laboratory, National School of Computer Science, University of Manouba, Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024626195","display_name":"Anis Koub\u00e2a","orcid":"https://orcid.org/0000-0003-3787-7423"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Anis Koubaa","raw_affiliation_strings":["Prince Sultan University,Riyadh,Saudi Arabia,12435"],"affiliations":[{"raw_affiliation_string":"Prince Sultan University,Riyadh,Saudi Arabia,12435","institution_ids":["https://openalex.org/I142024983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045455849","display_name":"Zahid A. Khan","orcid":"https://orcid.org/0000-0002-1436-0563"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Zahid Khan","raw_affiliation_strings":["Prince Sultan University,Riyadh,Saudi Arabia,12435"],"affiliations":[{"raw_affiliation_string":"Prince Sultan University,Riyadh,Saudi Arabia,12435","institution_ids":["https://openalex.org/I142024983"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100754273","display_name":"Jawad Ahmad","orcid":"https://orcid.org/0000-0001-6289-8248"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jawad Ahmad","raw_affiliation_strings":["Edinburgh Napier University,School of Computing,Edinburgh,United Kingdom,EH10 5DT"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing,Edinburgh,United Kingdom,EH10 5DT","institution_ids":["https://openalex.org/I251738"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017797877"],"corresponding_institution_ids":["https://openalex.org/I12469534","https://openalex.org/I142024983"],"apc_list":null,"apc_paid":null,"fwci":1.2055,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80852977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8480531573295593},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7808900475502014},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6707360744476318},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.6627542972564697},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6518058180809021},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6358036398887634},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6146793365478516},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5829956531524658},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5810312628746033},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5364566445350647},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.43953943252563477},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3674600124359131},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3549816310405731}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8480531573295593},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7808900475502014},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6707360744476318},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.6627542972564697},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6518058180809021},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6358036398887634},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6146793365478516},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5829956531524658},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5810312628746033},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5364566445350647},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.43953943252563477},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3674600124359131},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3549816310405731},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2023-fall60731.2023.10333818","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2023-fall60731.2023.10333818","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320327702","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2999613663","https://openalex.org/W3081876318","https://openalex.org/W3092625934","https://openalex.org/W3154409376","https://openalex.org/W3182125009","https://openalex.org/W3189826552","https://openalex.org/W3191884578","https://openalex.org/W3203473930","https://openalex.org/W4212879646","https://openalex.org/W4214611057","https://openalex.org/W4226076258","https://openalex.org/W4235462833","https://openalex.org/W4285157251","https://openalex.org/W4307573706","https://openalex.org/W4307631568","https://openalex.org/W4308447885","https://openalex.org/W4313654696","https://openalex.org/W4316591601","https://openalex.org/W4320919659","https://openalex.org/W4321461474","https://openalex.org/W4323797442","https://openalex.org/W4383199515","https://openalex.org/W4385187299","https://openalex.org/W4386065261"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W4256679626","https://openalex.org/W3076529025","https://openalex.org/W3182070348"],"abstract_inverted_index":{"The":[0,51,110,161],"increasing":[1],"trend":[2],"of":[3,7,16,60,121,152,163,185,191,203],"the":[4,14,30,58,80,107,119,125,129,138,150,164,171,183,186,200,204],"Industrial":[5],"Internet":[6],"Things":[8],"(IIoT)":[9],"within":[10,106],"industrial":[11],"environments":[12],"magnifies":[13],"risk":[15],"security":[17],"breaches":[18],"and":[19,64,79,189],"vulnerabilities.":[20],"Maintaining":[21],"confidentiality":[22],"is":[23],"a":[24,86,114,178],"pivotal":[25,115],"requirement":[26],"for":[27,46,82,103],"effectively":[28],"establishing":[29],"IIoT":[31,49,108],"environment.":[32,109],"To":[33,174],"promptly":[34],"detect":[35],"malicious":[36],"endeavors,":[37],"integrating":[38],"an":[39,92],"intrusion":[40,104],"detection":[41,105],"system":[42],"(IDS)":[43],"becomes":[44],"imperative":[45],"continuously":[47],"monitoring":[48],"activities.":[50],"sophisticated":[52],"automated":[53],"IDSs":[54],"are":[55],"built":[56],"upon":[57],"foundation":[59],"machine":[61],"learning":[62,66],"(ML)":[63],"deep":[65,94,130],"(DL).":[67],"However,":[68],"these":[69,101],"algorithms":[70],"encounter":[71],"challenges":[72,102],"related":[73],"to":[74,99,143,198],"heavily":[75],"imbalanced":[76],"training":[77],"data":[78],"need":[81],"accurate":[83],"predictions":[84],"in":[85,117,124,158],"short":[87],"timeframe.":[88],"This":[89,147,194],"paper":[90],"introduces":[91],"attention-based":[93],"neural":[95,131],"network":[96,132,145,154],"(ABDNN)":[97],"designed":[98],"tackle":[100],"attention":[111],"mechanism":[112],"plays":[113],"role":[116],"determining":[118],"significance":[120],"each":[122],"attribute":[123,141],"input":[126],"data.":[127],"Subsequently,":[128],"(DNN)":[133],"comes":[134],"into":[135],"play,":[136],"leveraging":[137],"previously":[139],"determined":[140],"importance":[142],"predict":[144],"behaviors.":[146],"process":[148],"yields":[149],"advantage":[151],"predicting":[153],"behaviors":[155],"more":[156],"efficiently":[157],"less":[159],"time.":[160],"performance":[162,184,202],"proposed":[165,187,205],"ABDNN":[166,206],"model":[167,188],"was":[168,180],"evaluated":[169],"using":[170],"X-IIoTID":[172],"dataset.":[173],"validate":[175,199],"its":[176],"effectiveness,":[177],"comparison":[179],"made":[181],"between":[182],"that":[190],"state-of-the-art":[192],"approaches.":[193],"comparative":[195],"analysis":[196],"serves":[197],"superior":[201],"model.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
