{"id":"https://openalex.org/W4402261952","doi":"https://doi.org/10.1109/wincom62286.2024.10656654","title":"Hybrid Models for IoT Security: Tackling Class Imbalance","display_name":"Hybrid Models for IoT Security: Tackling Class Imbalance","publication_year":2024,"publication_date":"2024-07-23","ids":{"openalex":"https://openalex.org/W4402261952","doi":"https://doi.org/10.1109/wincom62286.2024.10656654"},"language":"en","primary_location":{"id":"doi:10.1109/wincom62286.2024.10656654","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wincom62286.2024.10656654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099436535","display_name":"Yassine El Yamani","orcid":"https://orcid.org/0009-0000-5769-4822"},"institutions":[{"id":"https://openalex.org/I4210125507","display_name":"Chouaib Doukkali University","ror":"https://ror.org/036kgyt43","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210125507"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Yassine El Yamani","raw_affiliation_strings":["Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco"],"affiliations":[{"raw_affiliation_string":"Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco","institution_ids":["https://openalex.org/I4210125507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094006041","display_name":"Yousra Fadili","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125507","display_name":"Chouaib Doukkali University","ror":"https://ror.org/036kgyt43","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210125507"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Yousra Fadili","raw_affiliation_strings":["Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco"],"affiliations":[{"raw_affiliation_string":"Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco","institution_ids":["https://openalex.org/I4210125507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093609982","display_name":"Jihad Kilani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125507","display_name":"Chouaib Doukkali University","ror":"https://ror.org/036kgyt43","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210125507"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Jihad Kilani","raw_affiliation_strings":["Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco"],"affiliations":[{"raw_affiliation_string":"Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco","institution_ids":["https://openalex.org/I4210125507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068086245","display_name":"Najib El Kamoun","orcid":"https://orcid.org/0000-0002-3513-0687"},"institutions":[{"id":"https://openalex.org/I4210125507","display_name":"Chouaib Doukkali University","ror":"https://ror.org/036kgyt43","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210125507"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Najib El Kamoun","raw_affiliation_strings":["Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco"],"affiliations":[{"raw_affiliation_string":"Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco","institution_ids":["https://openalex.org/I4210125507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059729427","display_name":"Youssef Baddi","orcid":"https://orcid.org/0000-0002-4139-9033"},"institutions":[{"id":"https://openalex.org/I4210125507","display_name":"Chouaib Doukkali University","ror":"https://ror.org/036kgyt43","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210125507"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Youssef Baddi","raw_affiliation_strings":["Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco"],"affiliations":[{"raw_affiliation_string":"Chouaib Doukkali University,STIC Lab, FSJ,El Jadida,Morocco","institution_ids":["https://openalex.org/I4210125507"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047048629","display_name":"Faycal Bensalah","orcid":"https://orcid.org/0000-0001-6170-5010"},"institutions":[{"id":"https://openalex.org/I4210125507","display_name":"Chouaib Doukkali University","ror":"https://ror.org/036kgyt43","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210125507"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Faycal Bensalah","raw_affiliation_strings":["Chouaib Doukkali University,LERSEM Lab,El Jadida,Morocco"],"affiliations":[{"raw_affiliation_string":"Chouaib Doukkali University,LERSEM Lab,El Jadida,Morocco","institution_ids":["https://openalex.org/I4210125507"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5099436535"],"corresponding_institution_ids":["https://openalex.org/I4210125507"],"apc_list":null,"apc_paid":null,"fwci":0.751,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72764702,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6970390677452087},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.60975182056427},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6088455319404602},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49273112416267395},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20172828435897827}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6970390677452087},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.60975182056427},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6088455319404602},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49273112416267395},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20172828435897827}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom62286.2024.10656654","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wincom62286.2024.10656654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2148143831","https://openalex.org/W2762776925","https://openalex.org/W2799758613","https://openalex.org/W2946216447","https://openalex.org/W3013276295","https://openalex.org/W3032931441","https://openalex.org/W3122864121","https://openalex.org/W3159151987","https://openalex.org/W3201440045","https://openalex.org/W4308829218","https://openalex.org/W4387530611","https://openalex.org/W4399974433","https://openalex.org/W6846913532"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W2358668433","https://openalex.org/W4200598720"],"abstract_inverted_index":{"This":[0,103],"study":[1],"introduces":[2],"a":[3,21],"new":[4],"method":[5,92],"to":[6,30,64,70,75,79,85],"enhance":[7,95],"IoT":[8,47,101,116],"security,":[9,117],"focusing":[10],"on":[11,39],"the":[12,40,82,96,106,119],"\u201cSimpleHome":[13],"XCS7":[14],"1002":[15],"WHT":[16],"Security":[17],"Camera\u201d.":[18],"We":[19],"use":[20],"CNN-LSTM":[22],"hybrid":[23],"model":[24],"combined":[25],"with":[26,112],"balanced":[27],"resampling":[28,113],"techniques":[29],"tackle":[31],"class":[32],"imbalance":[33],"in":[34,100],"security":[35,125],"datasets.":[36],"Our":[37],"testing":[38],"\u201cN-BaIoT\u201d":[41],"dataset,":[42],"which":[43],"includes":[44],"data":[45],"from":[46,62,68],"devices":[48],"targeted":[49],"by":[50],"Mirai":[51],"and":[52,66,81,123],"BASHLITE":[53],"botnet":[54],"attacks,":[55],"shows":[56,105],"that":[57],"our":[58,91,128],"approach":[59],"improves":[60],"precision":[61],"92.00%":[63],"93.08%":[65],"recall":[67],"88.00%":[69],"90.79%.":[71],"The":[72],"F1-score":[73],"increases":[74],"87.92":[76],"%,":[77],"accuracy":[78],"90.70%,":[80],"loss":[83],"decreases":[84],"0.1372.":[86],"These":[87],"results":[88],"demonstrate":[89],"how":[90],"can":[93],"significantly":[94],"detection":[97],"of":[98,108,121],"attacks":[99],"systems.":[102],"research":[104],"effectiveness":[107],"combining":[109],"deep":[110],"learning":[111],"strategies":[114],"for":[115,127],"supporting":[118],"development":[120],"adaptable":[122],"resilient":[124],"solutions":[126],"increasingly":[129],"connected":[130],"world.":[131]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
