{"id":"https://openalex.org/W4396852646","doi":"https://doi.org/10.1145/3647444.3647897","title":"RTIFQLD: An Integrated Framework for RealTime IoT Forensic Analysis via Incremental QLearning Modelled with Resource Aware DQN Operations","display_name":"RTIFQLD: An Integrated Framework for RealTime IoT Forensic Analysis via Incremental QLearning Modelled with Resource Aware DQN Operations","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396852646","doi":"https://doi.org/10.1145/3647444.3647897"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3647897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647897","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028065824","display_name":"Gangavarapu Rajesh Babu","orcid":"https://orcid.org/0009-0007-9891-8969"},"institutions":[{"id":"https://openalex.org/I3132145264","display_name":"Bhagwant University","ror":"https://ror.org/030c1ef86","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132145264"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Gangavarapu Rajesh Babu","raw_affiliation_strings":["Computer Science and Engineering, Bhagwant University, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Bhagwant University, India","institution_ids":["https://openalex.org/I3132145264"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101406516","display_name":"Virendra Kumar Sharma","orcid":"https://orcid.org/0000-0001-7962-2336"},"institutions":[{"id":"https://openalex.org/I3132145264","display_name":"Bhagwant University","ror":"https://ror.org/030c1ef86","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132145264"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Virendra Kumar Sharma","raw_affiliation_strings":["Computer Science and Engineering, Bhagwant University, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Bhagwant University, India","institution_ids":["https://openalex.org/I3132145264"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028065824"],"corresponding_institution_ids":["https://openalex.org/I3132145264"],"apc_list":null,"apc_paid":null,"fwci":0.1961,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60723364,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7938022017478943},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6630845665931702},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.6118128299713135},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36233216524124146},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.323171466588974},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26059818267822266}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7938022017478943},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6630845665931702},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.6118128299713135},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36233216524124146},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.323171466588974},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26059818267822266}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3647897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647897","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W3189227796","https://openalex.org/W3192896178","https://openalex.org/W3197424138","https://openalex.org/W3206674745","https://openalex.org/W3213348092","https://openalex.org/W4210438063","https://openalex.org/W4210466571","https://openalex.org/W4225730496","https://openalex.org/W4285201318","https://openalex.org/W4285219637","https://openalex.org/W4285410981","https://openalex.org/W4286374021","https://openalex.org/W4308246500","https://openalex.org/W4311080749","https://openalex.org/W4312304622","https://openalex.org/W4312390103","https://openalex.org/W4312560710","https://openalex.org/W4312563691","https://openalex.org/W4312866273","https://openalex.org/W4313461186","https://openalex.org/W4367277159","https://openalex.org/W4377235185","https://openalex.org/W4379806039","https://openalex.org/W4381198722","https://openalex.org/W4385300809"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W2358668433","https://openalex.org/W4200598720"],"abstract_inverted_index":{"As":[0],"the":[1,15,99,104,112,200,223,259],"proliferation":[2],"of":[3,5,12,108,162,202],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8,110],"permeates":[9],"every":[10],"facet":[11],"human":[13],"life,":[14],"need":[16],"for":[17,50,54,66,91,130,175,241,276],"effective":[18],"and":[19,37,57,76,111,122,158,172,188,214,230,249,264],"efficient":[20],"forensic":[21,63,120,133,176,203,243,277],"analysis":[22,64,78,134],"within":[23],"this":[24,235],"intricate":[25],"ecosystem":[26],"has":[27],"become":[28],"more":[29,265],"critical":[30,58],"than":[31],"ever.":[32],"The":[33],"imperative":[34],"to":[35,73,101,103,190],"swiftly":[36],"accurately":[38],"identify":[39],"anomalous":[40],"behaviors":[41],"or":[42],"security":[43],"incidents":[44],"carries":[45],"substantial":[46],"ramifications":[47],"not":[48],"only":[49],"cybersecurity":[51],"but":[52],"also":[53],"public":[55],"safety":[56],"infrastructure":[59],"protection":[60],"operations.":[61],"Current":[62],"methods":[65],"IoT":[67,109,132,242,267],"often":[68,97],"suffer":[69],"from":[70],"issues":[71],"related":[72],"scalability,":[74,185],"adaptability,":[75],"real-time":[77,92,131,186,226],"capabilities.":[79],"Traditional":[80],"machine":[81,232],"learning":[82,233],"techniques":[83,96],"frequently":[84],"require":[85],"batch":[86],"processing,":[87],"making":[88],"them":[89],"unsuitable":[90],"deployment.":[93],"Moreover,":[94],"these":[95,138],"lack":[98],"ability":[100],"adapt":[102],"dynamically":[105],"evolving":[106],"nature":[107],"myriad":[113],"threats":[114],"they":[115],"face,":[116],"resulting":[117],"in":[118,199,258,272],"suboptimal":[119],"accuracy":[121,208],"responsiveness.":[123],"This":[124,252],"paper":[125],"presents":[126],"an":[127],"integrated":[128],"framework":[129,236],"that":[135],"successfully":[136],"addresses":[137],"limitations.":[139],"We":[140],"introduce":[141],"a":[142,159,196,238,255,262],"novel":[143],"approach":[144],"combining":[145],"Incremental":[146],"Q-Learning":[147],"operations,":[148],"Resource-Aware":[149],"Deep":[150],"Q-Networks":[151],"(DQN)":[152],"enhanced":[153],"with":[154,269],"Bacterial":[155],"Foraging":[156],"Optimization,":[157],"robust":[160],"ensemble":[161],"classifiers":[163],"including":[164,183],"Naive":[165],"Bayes,":[166],"Support":[167],"Vector":[168],"Machines,":[169],"Logistic":[170],"Regression,":[171],"Multi-Layer":[173],"Perceptron":[174],"analysis.":[177,278],"Our":[178],"contributions":[179],"yield":[180],"several":[181],"advantages,":[182],"superior":[184],"analysis,":[187,244],"adaptability":[189],"emerging":[191],"threats.":[192],"Empirical":[193],"results":[194],"demonstrate":[195],"significant":[197,256],"improvement":[198],"precision":[201],"event":[204],"classification":[205],"by":[206,209,212,216],"8.3%,":[207],"4.5%,":[210],"recall":[211],"3.5%,":[213],"specificity":[215],"4.9%":[217],"across":[218],"different":[219],"scenarios.":[220],"By":[221],"bridging":[222],"gap":[224],"between":[225],"requirements,":[227],"resource":[228],"awareness,":[229],"advanced":[231],"techniques,":[234],"sets":[237],"new":[239],"standard":[240],"enhancing":[245],"both":[246],"its":[247],"effectiveness":[248],"efficiency":[250],"levels.":[251],"work":[253],"represents":[254],"stride":[257],"march":[260],"toward":[261],"safer":[263],"secure":[266],"ecosystem,":[268],"tangible":[270],"improvements":[271],"key":[273],"performance":[274],"metrics":[275]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
