{"id":"https://openalex.org/W4396641939","doi":"https://doi.org/10.1186/s13638-024-02348-6","title":"An adversarial environment reinforcement learning-driven intrusion detection algorithm for Internet of Things","display_name":"An adversarial environment reinforcement learning-driven intrusion detection algorithm for Internet of Things","publication_year":2024,"publication_date":"2024-05-03","ids":{"openalex":"https://openalex.org/W4396641939","doi":"https://doi.org/10.1186/s13638-024-02348-6"},"language":"en","primary_location":{"id":"doi:10.1186/s13638-024-02348-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-024-02348-6","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-024-02348-6","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-024-02348-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008418315","display_name":"Chahira Mahjoub","orcid":"https://orcid.org/0000-0001-8148-4868"},"institutions":[{"id":"https://openalex.org/I68916915","display_name":"University of Gab\u00e8s","ror":"https://ror.org/022efad20","country_code":"TN","type":"education","lineage":["https://openalex.org/I68916915"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Chahira Mahjoub","raw_affiliation_strings":["Research Team in Intelligent Machines, National School of Engineers of Gabes, University of Gabes, B.P. W, 6072, Gabes, Tunisia"],"affiliations":[{"raw_affiliation_string":"Research Team in Intelligent Machines, National School of Engineers of Gabes, University of Gabes, B.P. W, 6072, Gabes, Tunisia","institution_ids":["https://openalex.org/I68916915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031545931","display_name":"Monia Hamdi","orcid":"https://orcid.org/0000-0003-3690-9868"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Monia Hamdi","raw_affiliation_strings":["Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011474289","display_name":"Reem Ibrahim Alkanhel","orcid":null},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Reem Ibrahim Alkanhel","raw_affiliation_strings":["Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065835537","display_name":"Safa Mohamed","orcid":"https://orcid.org/0000-0001-5955-6044"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]},{"id":"https://openalex.org/I68916915","display_name":"University of Gab\u00e8s","ror":"https://ror.org/022efad20","country_code":"TN","type":"education","lineage":["https://openalex.org/I68916915"]}],"countries":["SA","TN"],"is_corresponding":false,"raw_author_name":"Safa Mohamed","raw_affiliation_strings":["Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia","Research Team in Intelligent Machines, National School of Engineers of Gabes, University of Gabes, B.P. W, 6072, Gabes, Tunisia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]},{"raw_affiliation_string":"Research Team in Intelligent Machines, National School of Engineers of Gabes, University of Gabes, B.P. W, 6072, Gabes, Tunisia","institution_ids":["https://openalex.org/I68916915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029856197","display_name":"Ridha Ejbali","orcid":"https://orcid.org/0000-0002-8148-1621"},"institutions":[{"id":"https://openalex.org/I68916915","display_name":"University of Gab\u00e8s","ror":"https://ror.org/022efad20","country_code":"TN","type":"education","lineage":["https://openalex.org/I68916915"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Ridha Ejbali","raw_affiliation_strings":["Research Team in Intelligent Machines, National School of Engineers of Gabes, University of Gabes, B.P. W, 6072, Gabes, Tunisia"],"affiliations":[{"raw_affiliation_string":"Research Team in Intelligent Machines, National School of Engineers of Gabes, University of Gabes, B.P. W, 6072, Gabes, Tunisia","institution_ids":["https://openalex.org/I68916915"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008418315"],"corresponding_institution_ids":["https://openalex.org/I68916915"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":7.6595,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.97683547,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"2024","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9159451723098755},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7214349508285522},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.686745822429657},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5642539262771606},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5354993343353271},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49062982201576233},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.43096524477005005},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4224031865596771},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4007954001426697},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37596285343170166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3109015226364136},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18254944682121277}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9159451723098755},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7214349508285522},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.686745822429657},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5642539262771606},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5354993343353271},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49062982201576233},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.43096524477005005},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4224031865596771},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4007954001426697},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37596285343170166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3109015226364136},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18254944682121277},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13638-024-02348-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-024-02348-6","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-024-02348-6","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d32c42dcf4af438188aeefc33cd1184b","is_oa":true,"landing_page_url":"https://doaj.org/article/d32c42dcf4af438188aeefc33cd1184b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2024, Iss 1, Pp 1-23 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13638-024-02348-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-024-02348-6","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-024-02348-6","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4396641939.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1526644198","https://openalex.org/W1565369816","https://openalex.org/W1591530988","https://openalex.org/W1689711448","https://openalex.org/W1966809779","https://openalex.org/W1978915475","https://openalex.org/W1988918299","https://openalex.org/W2017733151","https://openalex.org/W2039133703","https://openalex.org/W2096180760","https://openalex.org/W2099940443","https://openalex.org/W2334853001","https://openalex.org/W2733765803","https://openalex.org/W2746553466","https://openalex.org/W2782169620","https://openalex.org/W2783741806","https://openalex.org/W2783796368","https://openalex.org/W2786075294","https://openalex.org/W2806602946","https://openalex.org/W2892556724","https://openalex.org/W2901697640","https://openalex.org/W2913497771","https://openalex.org/W2919143607","https://openalex.org/W2921134108","https://openalex.org/W2941288225","https://openalex.org/W2946127746","https://openalex.org/W2963748489","https://openalex.org/W2969022468","https://openalex.org/W3100789280","https://openalex.org/W4205571120","https://openalex.org/W4248220371","https://openalex.org/W4309947319","https://openalex.org/W4321770460"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Abstract":[0],"The":[1,112,168],"increasing":[2],"prevalence":[3],"of":[4,6,27,163,170,180,183,218],"Internet":[5],"Things":[7],"(IoT)":[8],"systems":[9,98],"has":[10],"made":[11],"them":[12],"attractive":[13],"targets":[14],"for":[15,36,80,107],"malicious":[16],"actors.":[17],"To":[18],"address":[19],"the":[20,24,148,156,160,164,176,221],"evolving":[21],"threats":[22],"and":[23,37,44,48,123,188],"growing":[25],"complexity":[26],"detection,":[28],"there":[29],"is":[30,60,132,151],"a":[31,64,117,121,133,181,211],"critical":[32],"need":[33],"to":[34,75,93,198,204,214],"search":[35],"develop":[38],"new":[39],"algorithms":[40],"that":[41,147],"are":[42],"fast":[43],"robust":[45],"in":[46,67,96],"detecting":[47],"classifying":[49],"dangerous":[50],"network":[51,186],"traffic.":[52],"In":[53],"this":[54,130,144],"context,":[55],"deep":[56],"reinforcement":[57,102],"learning":[58,103,157],"(DRL)":[59],"gaining":[61],"recognition":[62],"as":[63,70,120],"prospective":[65],"solution":[66],"numerous":[68],"fields":[69],"it":[71],"enables":[72],"autonomous":[73],"agents":[74],"cooperate":[76],"with":[77,155],"their":[78],"environment":[79],"decision-making":[81],"without":[82],"relying":[83],"on":[84,116],"human":[85],"experts.":[86],"This":[87],"article":[88],"presents":[89],"an":[90,100,139],"innovative":[91,140],"approach":[92,203],"intrusion":[94,165,206],"detection":[95,166,207],"IoT":[97,185,205,222],"using":[99,138,175],"adversarial":[101],"(RL)":[104],"algorithm":[105],"known":[106],"its":[108],"exceptional":[109],"predictive":[110,113],"capabilities.":[111],"process":[114],"relies":[115],"classifier,":[118],"implemented":[119],"streamlined":[122],"highly":[124],"efficient":[125],"neural":[126],"network.":[127],"Embedded":[128],"within":[129],"classifier":[131],"policy":[134],"function":[135],"meticulously":[136],"trained":[137],"RL":[141],"model.":[142],"Importantly,":[143],"model":[145],"ensures":[146],"environment\u2019s":[149],"behavior":[150],"dynamically":[152],"fine-tuned":[153],"simultaneously":[154],"process,":[158],"improving":[159,220],"overall":[161],"effectiveness":[162],"approach.":[167],"efficiency":[169],"our":[171,202],"proposal":[172],"was":[173],"assessed":[174],"Bot-IoT":[177],"database,":[178],"consisting":[179],"mixture":[182],"legitimate":[184],"traffic":[187],"simulated":[189],"attack":[190],"scenarios.":[191],"Our":[192],"scheme":[193],"shows":[194],"superior":[195],"performance":[196],"compared":[197],"existing":[199,215],"ones.":[200],"Therefore,":[201],"can":[208],"be":[209],"considered":[210],"valuable":[212],"alternative":[213],"methods,":[216],"capable":[217],"significantly":[219],"systems\u2019":[223],"security.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
