{"id":"https://openalex.org/W4388593489","doi":"https://doi.org/10.1145/3625343.3625346","title":"Efficient Scanning Activity Detection in IoT Networks Using Ensemble Learning","display_name":"Efficient Scanning Activity Detection in IoT Networks Using Ensemble Learning","publication_year":2023,"publication_date":"2023-09-15","ids":{"openalex":"https://openalex.org/W4388593489","doi":"https://doi.org/10.1145/3625343.3625346"},"language":"en","primary_location":{"id":"doi:10.1145/3625343.3625346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3625343.3625346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091376289","display_name":"Bashar Igried","orcid":"https://orcid.org/0000-0001-6255-236X"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Bashar Igried","raw_affiliation_strings":["Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"],"raw_orcid":"https://orcid.org/0000-0001-6255-236X","affiliations":[{"raw_affiliation_string":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051819567","display_name":"Mohammad Alauthman","orcid":"https://orcid.org/0000-0003-0319-1968"},"institutions":[{"id":"https://openalex.org/I36622005","display_name":"Petra University","ror":"https://ror.org/039d9es10","country_code":"JO","type":"education","lineage":["https://openalex.org/I36622005"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Alauthman","raw_affiliation_strings":["Department of Information Security, University of Petra, Jordan"],"raw_orcid":"https://orcid.org/0000-0003-0319-1968","affiliations":[{"raw_affiliation_string":"Department of Information Security, University of Petra, Jordan","institution_ids":["https://openalex.org/I36622005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029471789","display_name":"Mohammad Al Khaldy","orcid":"https://orcid.org/0009-0009-7502-4668"},"institutions":[{"id":"https://openalex.org/I36622005","display_name":"Petra University","ror":"https://ror.org/039d9es10","country_code":"JO","type":"education","lineage":["https://openalex.org/I36622005"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad AlKhaldy","raw_affiliation_strings":["Department of Business Intelligence and Data Analytics, University of Petra, Jordan"],"raw_orcid":"https://orcid.org/0009-0009-7502-4668","affiliations":[{"raw_affiliation_string":"Department of Business Intelligence and Data Analytics, University of Petra, Jordan","institution_ids":["https://openalex.org/I36622005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054700379","display_name":"Ayoub Alsarhan","orcid":"https://orcid.org/0000-0001-9075-2828"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ayoub Alsarhan","raw_affiliation_strings":["Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"],"raw_orcid":"https://orcid.org/0000-0001-9075-2828","affiliations":[{"raw_affiliation_string":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan","institution_ids":["https://openalex.org/I157392197"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091376289"],"corresponding_institution_ids":["https://openalex.org/I157392197"],"apc_list":null,"apc_paid":null,"fwci":0.3935,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63294081,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.8722219467163086},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7886157631874084},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.7183976173400879},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6224436163902283},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6161011457443237},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6081939339637756},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5931960344314575},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5678635835647583},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5500659942626953},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4229423999786377},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41832348704338074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09878754615783691}],"concepts":[{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.8722219467163086},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7886157631874084},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.7183976173400879},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6224436163902283},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6161011457443237},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6081939339637756},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5931960344314575},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5678635835647583},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5500659942626953},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4229423999786377},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41832348704338074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09878754615783691}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3625343.3625346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3625343.3625346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W575847903","https://openalex.org/W2099452399","https://openalex.org/W2099940443","https://openalex.org/W2108698843","https://openalex.org/W2118874001","https://openalex.org/W2208028087","https://openalex.org/W2789828921","https://openalex.org/W2941288225","https://openalex.org/W2992744256","https://openalex.org/W3033480759","https://openalex.org/W3038952320","https://openalex.org/W3047739910","https://openalex.org/W3110819044","https://openalex.org/W3122864121","https://openalex.org/W3175402960","https://openalex.org/W4232185023","https://openalex.org/W4288040184","https://openalex.org/W4289522396","https://openalex.org/W4294162736","https://openalex.org/W4297312142","https://openalex.org/W4313465967"],"related_works":["https://openalex.org/W4362597605","https://openalex.org/W1574414179","https://openalex.org/W4297676672","https://openalex.org/W3009056573","https://openalex.org/W2922073769","https://openalex.org/W4281702477","https://openalex.org/W2490526372","https://openalex.org/W4376166922","https://openalex.org/W4378510483","https://openalex.org/W1038900426"],"abstract_inverted_index":{"The":[0],"rapidly":[1],"expanding":[2],"universe":[3],"of":[4,6,20,72,82,191],"Internet":[5],"Things":[7],"(IoT)":[8],"networks":[9],"has":[10],"led":[11],"to":[12,17,31,52],"greater":[13],"security":[14,204],"risks":[15],"due":[16],"the":[18,103,126,186],"proliferation":[19],"sophisticated":[21],"threats":[22],"such":[23],"as":[24,198],"scanning":[25,30,73,192],"activities,":[26],"where":[27],"adversaries":[28],"use":[29],"identify":[32],"and":[33,46,69,96,138,150,163,179,188],"exploit":[34],"vulnerabilities":[35],"in":[36,75,171],"target":[37],"IoT":[38,76,122,195],"devices,":[39],"which":[40],"often":[41],"have":[42],"limited":[43],"computing":[44],"power":[45],"storage,":[47],"making":[48],"them":[49],"attractive":[50],"targets;":[51],"address":[53],"this":[54,57,173],"escalating":[55,206],"challenge,":[56],"research":[58,174],"proposes":[59],"a":[60,79,108,113,199],"comprehensive":[61],"ensemble":[62,115,128,182],"learning":[63,148,183],"methodology":[64],"specifically":[65],"tailored":[66],"for":[67,185],"robust":[68],"timely":[70,187],"detection":[71,134,190],"activities":[74],"networks,":[77,196],"integrating":[78],"diverse":[80],"set":[81],"base":[83,104],"classifiers":[84],"including":[85],"Support":[86],"Vector":[87],"Machine":[88],"(SVM),":[89],"Neural":[90],"Network":[91],"(NN),":[92],"Decision":[93],"Trees":[94],"(DT),":[95],"Linear":[97,109],"Regression":[98,110],"(LR),":[99],"with":[100],"predictions":[101],"from":[102],"models":[105],"combined":[106],"using":[107],"meta-classifier":[111],"into":[112],"stacked":[114],"model;":[116],"extensive":[117],"comparative":[118],"evaluation":[119],"on":[120],"an":[121,177],"network":[123],"dataset":[124],"demonstrates":[125],"proposed":[127],"technique":[129],"achieves":[130],"significantly":[131],"higher":[132],"accuracy,":[133],"rate,":[135],"F-measure,":[136],"precision,":[137],"Area":[139],"Under":[140],"ROC":[141],"Curve":[142],"(AUC)":[143],"versus":[144],"individual":[145],"traditional":[146],"machine":[147],"models,":[149],"remarkably,":[151],"exhibits":[152],"consistent":[153],"performance":[154],"across":[155],"different":[156],"cross-validation":[157],"folds,":[158],"highlighting":[159],"its":[160],"inherent":[161],"stability":[162],"validity,":[164],"suggesting":[165],"it":[166],"generalizes":[167],"well":[168],"without":[169],"overfitting;":[170],"summary,":[172],"puts":[175],"forward":[176],"efficient":[178],"highly":[180],"effective":[181],"solution":[184],"precise":[189],"attacks":[193],"against":[194,205],"serving":[197],"vital":[200],"step":[201],"towards":[202],"strengthening":[203],"threats..":[207]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
