{"id":"https://openalex.org/W4388893672","doi":"https://doi.org/10.1109/wincom59760.2023.10322954","title":"Tree-Driven Intelligent Security System for Intrusion Detection in IoT environment","display_name":"Tree-Driven Intelligent Security System for Intrusion Detection in IoT environment","publication_year":2023,"publication_date":"2023-10-26","ids":{"openalex":"https://openalex.org/W4388893672","doi":"https://doi.org/10.1109/wincom59760.2023.10322954"},"language":"en","primary_location":{"id":"doi:10.1109/wincom59760.2023.10322954","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wincom59760.2023.10322954","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012613254","display_name":"Mouad Choukhairi","orcid":"https://orcid.org/0009-0000-8971-009X"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Mouad Choukhairi","raw_affiliation_strings":["Ibn Tofail University,Faculty of Sciences,LARI, Department of Computer Science,Kenitra,Morocco","LARI, Department of Computer Science, Faculty of Sciences, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,Faculty of Sciences,LARI, Department of Computer Science,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"LARI, Department of Computer Science, Faculty of Sciences, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023700204","display_name":"Mohamed M\u2019Haouach","orcid":"https://orcid.org/0000-0002-5514-3290"},"institutions":[{"id":"https://openalex.org/I81605866","display_name":"Sidi Mohamed Ben Abdellah University","ror":"https://ror.org/04efg9a07","country_code":"MA","type":"education","lineage":["https://openalex.org/I81605866"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohamed M\u2019Haouach","raw_affiliation_strings":["Sidi Mohamed Ben Abdellah University,Faculty of Sciences Dhar El Mahraz,Fez,Morocco","Faculty of Sciences Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco"],"affiliations":[{"raw_affiliation_string":"Sidi Mohamed Ben Abdellah University,Faculty of Sciences Dhar El Mahraz,Fez,Morocco","institution_ids":["https://openalex.org/I81605866"]},{"raw_affiliation_string":"Faculty of Sciences Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089704230","display_name":"Youssef Fakhri","orcid":"https://orcid.org/0000-0002-5647-303X"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Youssef Fakhri","raw_affiliation_strings":["Ibn Tofail University,Faculty of Sciences,LARI, Department of Computer Science,Kenitra,Morocco","LARI, Department of Computer Science, Faculty of Sciences, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,Faculty of Sciences,LARI, Department of Computer Science,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"LARI, Department of Computer Science, Faculty of Sciences, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052978980","display_name":"Mohamed Amnai","orcid":"https://orcid.org/0000-0002-2139-0824"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohamed Amnai","raw_affiliation_strings":["Ibn Tofail University,Faculty of Sciences,LARI, Department of Computer Science,Kenitra,Morocco","LARI, Department of Computer Science, Faculty of Sciences, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,Faculty of Sciences,LARI, Department of Computer Science,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"LARI, Department of Computer Science, Faculty of Sciences, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012613254"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":0.2001,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53347521,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8519653081893921},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8123648762702942},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7629250288009644},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5825696587562561},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4935089349746704},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4584614038467407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4497959613800049},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1499841809272766}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8519653081893921},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8123648762702942},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7629250288009644},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5825696587562561},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4935089349746704},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4584614038467407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4497959613800049},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1499841809272766},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom59760.2023.10322954","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wincom59760.2023.10322954","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1506934790","https://openalex.org/W2010976529","https://openalex.org/W2056132907","https://openalex.org/W2100537916","https://openalex.org/W2109894153","https://openalex.org/W2148143831","https://openalex.org/W2296509296","https://openalex.org/W2333419896","https://openalex.org/W2403153566","https://openalex.org/W2744032385","https://openalex.org/W2761800654","https://openalex.org/W2793412195","https://openalex.org/W2915969651","https://openalex.org/W2916401208","https://openalex.org/W2955182473","https://openalex.org/W2964022491","https://openalex.org/W2966086598","https://openalex.org/W3001364574","https://openalex.org/W3004752684","https://openalex.org/W3009046953","https://openalex.org/W3030475315","https://openalex.org/W3043844898","https://openalex.org/W3110547954","https://openalex.org/W3115883673","https://openalex.org/W3125345207","https://openalex.org/W3126533924","https://openalex.org/W3158729335","https://openalex.org/W3198511875","https://openalex.org/W4295127058","https://openalex.org/W4298227433","https://openalex.org/W4310793438","https://openalex.org/W6750729320","https://openalex.org/W6967135470"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"With":[0],"the":[1,4,20,22,89],"rise":[2],"of":[3,6,14,88],"Internet":[5],"Things":[7],"(IoT),":[8],"which":[9],"envisions":[10],"a":[11,67],"connected":[12],"network":[13,38],"intelligent":[15],"devices":[16],"communicating":[17],"autonomously":[18],"through":[19],"Internet,":[21],"need":[23],"to":[24,75,97],"deal":[25],"with":[26,104],"escalating":[27],"threats":[28],"and":[29,86,100,109],"cyberattacks":[30,103],"in":[31,56,78],"these":[32],"diverse":[33,102],"environments":[34],"becomes":[35,45],"crucial.":[36],"Detecting":[37],"intrusions":[39],"that":[40],"may":[41],"indicate":[42],"such":[43,62],"attacks":[44],"imperative.":[46],"However,":[47],"machine":[48],"learning":[49],"(ML)":[50],"techniques":[51],"have":[52],"proven":[53],"their":[54],"effectiveness":[55],"this":[57],"regard":[58],"by":[59],"accurately":[60],"detecting":[61],"anomalies.":[63],"This":[64],"paper":[65],"presents":[66],"clever":[68],"new":[69],"intrusion":[70],"detection":[71,107],"system":[72],"(IDS)":[73],"designed":[74],"improve":[76],"security":[77],"IoT":[79],"networks,":[80],"utilizing":[81],"tree-structured":[82],"ML":[83],"models.":[84],"Experimentation":[85],"evaluation":[87],"IDS":[90],"on":[91],"well-established":[92],"datasets":[93],"demonstrates":[94],"its":[95],"capability":[96],"effectively":[98],"detect":[99],"identify":[101],"an":[105],"increased":[106],"rate":[108],"minimal":[110],"computational":[111],"costs.":[112]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
