{"id":"https://openalex.org/W4411098827","doi":"https://doi.org/10.1145/3723178.3723179","title":"Machine Learning-Enhanced Cross-Tier Security and Anomaly Detection in Wireless Body Area Networks","display_name":"Machine Learning-Enhanced Cross-Tier Security and Anomaly Detection in Wireless Body Area Networks","publication_year":2024,"publication_date":"2024-10-17","ids":{"openalex":"https://openalex.org/W4411098827","doi":"https://doi.org/10.1145/3723178.3723179"},"language":"en","primary_location":{"id":"doi:10.1145/3723178.3723179","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3723178.3723179","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3723178.3723179","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Computing Advancements","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3723178.3723179","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092695496","display_name":"Md Shamshuzzoha","orcid":"https://orcid.org/0009-0003-1052-1424"},"institutions":[{"id":"https://openalex.org/I63169043","display_name":"United International University","ror":"https://ror.org/01tqv1p28","country_code":"BD","type":"education","lineage":["https://openalex.org/I63169043"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Md Shamshuzzoha","raw_affiliation_strings":["United International University, Dhaka, Bangladesh"],"raw_orcid":"https://orcid.org/0009-0003-1052-1424","affiliations":[{"raw_affiliation_string":"United International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I63169043"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065507864","display_name":"Md. Motaharul Islam","orcid":"https://orcid.org/0000-0002-8030-3225"},"institutions":[{"id":"https://openalex.org/I63169043","display_name":"United International University","ror":"https://ror.org/01tqv1p28","country_code":"BD","type":"education","lineage":["https://openalex.org/I63169043"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Md. Motaharul Islam","raw_affiliation_strings":["United International University, Dhaka, Bangladesh"],"raw_orcid":"https://orcid.org/0000-0002-8030-3225","affiliations":[{"raw_affiliation_string":"United International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I63169043"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092695496"],"corresponding_institution_ids":["https://openalex.org/I63169043"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25299874,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9433000087738037,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9361000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6930927038192749},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5093411207199097},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39646244049072266},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25005999207496643}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6930927038192749},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5093411207199097},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39646244049072266},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25005999207496643}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3723178.3723179","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3723178.3723179","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3723178.3723179","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Computing Advancements","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3723178.3723179","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3723178.3723179","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3723178.3723179","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Computing Advancements","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411098827.pdf","grobid_xml":"https://content.openalex.org/works/W4411098827.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1507388472","https://openalex.org/W2188204400","https://openalex.org/W2588110940","https://openalex.org/W2783551591","https://openalex.org/W2933243715","https://openalex.org/W3193489073","https://openalex.org/W3197125054","https://openalex.org/W3202598922","https://openalex.org/W4213294239","https://openalex.org/W4220911496","https://openalex.org/W4291158430","https://openalex.org/W4294308834","https://openalex.org/W4317795303","https://openalex.org/W4386167965","https://openalex.org/W4387694066","https://openalex.org/W4387854287"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Nowadays,":[0],"in":[1,122,140,147],"the":[2,7,25,31,58,73,95,104,114,123,136,149,155],"dynamic":[3],"landscape":[4],"of":[5,10,27,41,60,157],"e-health,":[6],"relentless":[8],"pace":[9],"information":[11],"technology":[12],"advances":[13],"brings":[14],"both":[15],"transformative":[16],"possibilities":[17],"and":[18,76,103],"heightened":[19],"security":[20,36,93,137,153],"concerns,":[21],"particularly":[22],"within":[23],"WBANs.At":[24],"forefront":[26,156],"this":[28,46],"challenge":[29],"is":[30,66],"critical":[32],"imperative":[33],"to":[34,135],"fortify":[35],"measures":[37],"across":[38],"healthcare":[39,141],"Internet":[40],"Things":[42],"environments.This":[43],"research":[44],"addresses":[45],"pressing":[47],"issue":[48],"by":[49,85],"championing":[50],"a":[51,127,144],"pioneering":[52],"three-layered":[53],"defense":[54],"system,":[55,83],"thoughtfully":[56],"integrating":[57],"potency":[59],"machine":[61,87,119],"learning":[62,88,120],"techniques.The":[63],"paramount":[64],"emphasis":[65],"on":[67],"achieving":[68],"cross-tier":[69,152],"security,":[70],"strategically":[71,99],"targeting":[72],"device,":[74],"Hub,":[75],"Cloud":[77,124],"layers.The":[78],"groundbreaking":[79],"SenseGuard":[80],"anomaly":[81],"detection":[82,111],"fueled":[84],"sophisticated":[86],"algorithms,":[89],"not":[90],"only":[91],"elevates":[92],"at":[94,154],"Device":[96],"layer":[97,125],"but":[98],"reinforces":[100],"patient":[101],"wellness":[102],"entire":[105],"WBAN":[106,158],"network.Simultaneously,":[107],"an":[108,132],"innovative":[109],"intrusion":[110],"algorithm":[112],"fortifies":[113],"Hub":[115],"layer,":[116],"while":[117],"adaptive":[118],"models":[121],"ensure":[126],"comprehensive":[128],"defense.This":[129],"approach":[130],"provides":[131],"effective":[133],"solution":[134],"challenges":[138],"inherent":[139],"IoT":[142],"as":[143],"remarkable":[145],"achievement":[146],"advancing":[148],"state-of-the-art,":[150],"placing":[151],"innovation.":[159]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
