{"id":"https://openalex.org/W4390970205","doi":"https://doi.org/10.1109/jiot.2024.3354988","title":"Empowering Cyberattack Identification in IoHT Networks With Neighborhood-Component-Based Improvised Long Short-Term Memory","display_name":"Empowering Cyberattack Identification in IoHT Networks With Neighborhood-Component-Based Improvised Long Short-Term Memory","publication_year":2024,"publication_date":"2024-01-18","ids":{"openalex":"https://openalex.org/W4390970205","doi":"https://doi.org/10.1109/jiot.2024.3354988"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3354988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3354988","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062946231","display_name":"Manish Kumar","orcid":"https://orcid.org/0000-0003-3247-8589"},"institutions":[{"id":"https://openalex.org/I118373667","display_name":"Seoul National University of Science and Technology","ror":"https://ror.org/00chfja07","country_code":"KR","type":"education","lineage":["https://openalex.org/I118373667"]},{"id":"https://openalex.org/I3132999081","display_name":"Marwadi University","ror":"https://ror.org/030dn1812","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132999081"]}],"countries":["IN","KR"],"is_corresponding":true,"raw_author_name":"Manish Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Republic of Korea","Department of Computer Science and Engineering, Marwadi University, India","Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung-ro, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0003-3247-8589","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I118373667"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Marwadi University, India","institution_ids":["https://openalex.org/I3132999081"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung-ro, Republic of Korea","institution_ids":["https://openalex.org/I118373667"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017069334","display_name":"Changjong Kim","orcid":"https://orcid.org/0000-0002-0842-1593"},"institutions":[{"id":"https://openalex.org/I118373667","display_name":"Seoul National University of Science and Technology","ror":"https://ror.org/00chfja07","country_code":"KR","type":"education","lineage":["https://openalex.org/I118373667"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Changjong Kim","raw_affiliation_strings":["Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Republic of Korea","Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung-ro, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-0842-1593","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I118373667"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung-ro, Republic of Korea","institution_ids":["https://openalex.org/I118373667"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076633496","display_name":"Yongseok Son","orcid":null},"institutions":[{"id":"https://openalex.org/I67900169","display_name":"Chung-Ang University","ror":"https://ror.org/01r024a98","country_code":"KR","type":"education","lineage":["https://openalex.org/I67900169"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yongseok Son","raw_affiliation_strings":["Department of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I67900169"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045707887","display_name":"Sushil Kumar Singh","orcid":"https://orcid.org/0000-0003-0030-5691"},"institutions":[{"id":"https://openalex.org/I3132999081","display_name":"Marwadi University","ror":"https://ror.org/030dn1812","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132999081"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sushil Kumar Singh","raw_affiliation_strings":["Department of Computer Science and Engineering, Marwadi University, Rajkot, India"],"raw_orcid":"https://orcid.org/0000-0003-0030-5691","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Marwadi University, Rajkot, India","institution_ids":["https://openalex.org/I3132999081"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102708750","display_name":"Sunggon Kim","orcid":"https://orcid.org/0000-0002-2295-3385"},"institutions":[{"id":"https://openalex.org/I118373667","display_name":"Seoul National University of Science and Technology","ror":"https://ror.org/00chfja07","country_code":"KR","type":"education","lineage":["https://openalex.org/I118373667"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sunggon Kim","raw_affiliation_strings":["Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Republic of Korea","Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung-ro, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-2295-3385","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I118373667"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung-ro, Republic of Korea","institution_ids":["https://openalex.org/I118373667"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062946231"],"corresponding_institution_ids":["https://openalex.org/I118373667","https://openalex.org/I3132999081"],"apc_list":null,"apc_paid":null,"fwci":9.7555,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.98452736,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"11","issue":"9","first_page":"16638","last_page":"16646"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8698854446411133},{"id":"https://openalex.org/keywords/long-short-term-memory","display_name":"Long short term memory","score":0.5034298300743103},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4855341911315918},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.46086156368255615},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.45845383405685425},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45759469270706177},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.45342564582824707},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.41536542773246765},{"id":"https://openalex.org/keywords/directed-acyclic-graph","display_name":"Directed acyclic graph","score":0.4111138880252838},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39610356092453003},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3477155566215515},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.2921856939792633},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.1821744740009308},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0911700427532196}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8698854446411133},{"id":"https://openalex.org/C133488467","wikidata":"https://www.wikidata.org/wiki/Q6673524","display_name":"Long short term memory","level":4,"score":0.5034298300743103},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4855341911315918},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.46086156368255615},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.45845383405685425},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45759469270706177},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.45342564582824707},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.41536542773246765},{"id":"https://openalex.org/C74197172","wikidata":"https://www.wikidata.org/wiki/Q1195339","display_name":"Directed acyclic graph","level":2,"score":0.4111138880252838},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39610356092453003},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3477155566215515},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.2921856939792633},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.1821744740009308},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0911700427532196},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3354988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3354988","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1990729297","https://openalex.org/W2883922809","https://openalex.org/W2910632723","https://openalex.org/W2915330174","https://openalex.org/W2929049293","https://openalex.org/W2964453985","https://openalex.org/W2984482968","https://openalex.org/W3003685271","https://openalex.org/W3033120446","https://openalex.org/W3082478288","https://openalex.org/W3108202858","https://openalex.org/W3131488785","https://openalex.org/W3159885303","https://openalex.org/W3192892322","https://openalex.org/W3207168370","https://openalex.org/W3215380763","https://openalex.org/W4205207661","https://openalex.org/W4205737724","https://openalex.org/W4206547830","https://openalex.org/W4213227084","https://openalex.org/W4280623754","https://openalex.org/W4283578151","https://openalex.org/W4285106051","https://openalex.org/W4285221277","https://openalex.org/W4285226608","https://openalex.org/W4310147657","https://openalex.org/W4317038427","https://openalex.org/W4389522467"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W3093492039","https://openalex.org/W2883305219"],"abstract_inverted_index":{"Cybersecurity":[0],"has":[1],"become":[2],"an":[3,204],"inevitable":[4],"concern":[5],"in":[6,102],"the":[7,12,16,45,97,115,120,125,152,177,192,196],"healthcare":[8,26],"industry":[9],"due":[10],"to":[11,31,40,54,59,118],"rapid":[13],"growth":[14],"of":[15,18,47,99,114],"Internet":[17],"Health":[19],"Things":[20],"(IoHT).":[21],"The":[22],"IoHT":[23,78,103,172],"is":[24,73],"revolutionizing":[25],"by":[27,179],"enabling":[28],"remote":[29],"access":[30],"hospital":[32],"equipment,":[33],"real-time":[34],"patient":[35],"monitoring,":[36],"and":[37,42,83,140,161,163,168,202],"urgent":[38],"alerts":[39],"patients":[41],"hospitals.":[43],"However,":[44],"convenience":[46],"these":[48],"systems":[49],"also":[50,175],"makes":[51],"them":[52],"vulnerable":[53],"cyberattacks,":[55],"with":[56,112,199],"hackers":[57],"seeking":[58],"disrupt":[60],"health":[61],"services":[62],"or":[63],"extort":[64],"money":[65],"through":[66],"ransomware":[67],"attacks.":[68],"Efficiently":[69],"detecting":[70,148],"multiple":[71],"threats":[72],"a":[74,181],"challenging":[75],"task":[76],"because":[77],"generates":[79],"large":[80],"temporal":[81],"data":[82],"system":[84],"log":[85],"information.":[86],"In":[87],"this":[88],"paper,":[89],"we":[90,106,128],"propose":[91,129],"time":[92,154],"series":[93,155],"classification":[94,156],"models":[95,157,165,178],"for":[96,147],"identification":[98],"potential":[100],"cyberattacks":[101],"networks.":[104],"First,":[105],"introduce":[107],"Neighborhood":[108],"Component":[109],"Analysis":[110],"(NCA)":[111],"modifications":[113],"regularization":[116],"parameter":[117],"select":[119],"vital":[121],"input":[122],"features.":[123],"With":[124],"selected":[126],"features,":[127],"two":[130],"LSTM-based":[131],"models:":[132],"Directed":[133],"Acyclic":[134],"Graph-based":[135],"Long":[136,143],"Short-Term":[137,144],"Memory":[138,145],"(DAG-LSTM)":[139],"Projected":[141],"Layer-based":[142],"(PL-LSTM)":[146],"cyberattacks.":[149],"We":[150,174],"evaluate":[151],"existing":[153],"(i.e.,":[158,166],"GRU,":[159],"LSTM,":[160],"Bi-LSTM)":[162],"proposed":[164,193],"DAG-LSTM":[167,194],"PL-LSTM)":[169],"using":[170],"real-world":[171],"data.":[173],"validate":[176],"applying":[180],"non-parametric":[182],"statistical":[183],"test,":[184],"Friedman":[185],"test.":[186],"Our":[187],"evaluation":[188],"results":[189],"show":[190],"that":[191],"achieves":[195],"highest":[197],"accuracy":[198],"99.89%":[200],"training":[201],"92.04%":[203],"average":[205],"testing":[206],"accuracy.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":12}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
