{"id":"https://openalex.org/W7122868182","doi":"https://doi.org/10.1186/s13677-025-00834-w","title":"Luminous defense: XAI-driven adaptive security for critical IoT infrastructures","display_name":"Luminous defense: XAI-driven adaptive security for critical IoT infrastructures","publication_year":2026,"publication_date":"2026-01-12","ids":{"openalex":"https://openalex.org/W7122868182","doi":"https://doi.org/10.1186/s13677-025-00834-w"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00834-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00834-w","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1186/s13677-025-00834-w","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023687470","display_name":"Faisal S. Alsubaei","orcid":"https://orcid.org/0000-0001-7332-3773"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Faisal S. Alsubaei","raw_affiliation_strings":["Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5023687470"],"corresponding_institution_ids":["https://openalex.org/I4210099699"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10871079,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.6274999976158142,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.6274999976158142,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.05510000139474869,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.04800000041723251,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.6725000143051147},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5281999707221985},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.505299985408783},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.49300000071525574},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4853000044822693},{"id":"https://openalex.org/keywords/clarity","display_name":"CLARITY","score":0.4392000138759613},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4390999972820282},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4296000003814697},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.41620001196861267}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7508999705314636},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.6725000143051147},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5281999707221985},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.505299985408783},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.49300000071525574},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4853000044822693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4778999984264374},{"id":"https://openalex.org/C2777146004","wikidata":"https://www.wikidata.org/wiki/Q14949826","display_name":"CLARITY","level":2,"score":0.4392000138759613},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4390999972820282},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4296000003814697},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.41620001196861267},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4066999852657318},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3813000023365021},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.34880000352859497},{"id":"https://openalex.org/C45237549","wikidata":"https://www.wikidata.org/wiki/Q1376796","display_name":"Restructuring","level":2,"score":0.335099995136261},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.31709998846054077},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31459999084472656},{"id":"https://openalex.org/C132943942","wikidata":"https://www.wikidata.org/wiki/Q2562511","display_name":"Footprint","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.25270000100135803}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00834-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00834-w","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5174656c2e3a44e487582f083f7fcee0","is_oa":true,"landing_page_url":"https://doaj.org/article/5174656c2e3a44e487582f083f7fcee0","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 15, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00834-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00834-w","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6157978773117065}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2942292460","https://openalex.org/W2946445608","https://openalex.org/W3038447340","https://openalex.org/W3123742938","https://openalex.org/W3171117050","https://openalex.org/W3195161028","https://openalex.org/W4226319939","https://openalex.org/W4282006100","https://openalex.org/W4295854586","https://openalex.org/W4320002848","https://openalex.org/W4324093415","https://openalex.org/W4381785391","https://openalex.org/W4382133963","https://openalex.org/W4382358393","https://openalex.org/W4387968502","https://openalex.org/W4390630220","https://openalex.org/W4396707597","https://openalex.org/W4399311029","https://openalex.org/W4400035315","https://openalex.org/W4400770731","https://openalex.org/W4401247017","https://openalex.org/W4402076204","https://openalex.org/W4403572952","https://openalex.org/W4403731508","https://openalex.org/W4405520993","https://openalex.org/W4406610350","https://openalex.org/W4407854507","https://openalex.org/W4407900983","https://openalex.org/W4408041774","https://openalex.org/W4411446348","https://openalex.org/W4411482963","https://openalex.org/W4411688196","https://openalex.org/W4411845063","https://openalex.org/W4412404052","https://openalex.org/W4412553123","https://openalex.org/W4413771043"],"related_works":[],"abstract_inverted_index":{"Since":[0],"many":[1],"IoT":[2,51,80,171,221],"devices":[3],"are":[4],"now":[5],"in":[6,26,50,79,87,129,154],"critical":[7],"infrastructures,":[8],"it":[9,159],"has":[10],"become":[11],"harder":[12],"to":[13,17,44,59,75,99,137,151,209,217],"manage":[14],"cybersecurity":[15],"due":[16],"the":[18,105,119,149],"IDS\u2019":[19],"lack":[20],"of":[21],"scalability,":[22],"clarity":[23],"and":[24,48,62,72,113,117,123,146,157,169,176,184,194,198,206,219,229],"adaptability":[25],"limited-resource":[27],"places.":[28],"It":[29],"describes":[30],"an":[31],"intrusion":[32],"detection":[33,47],"framework":[34,54,163,215],"that":[35,67,190],"connects":[36],"curriculum":[37],"learning":[38],"with":[39,143,202],"Explainable":[40],"Artificial":[41],"Intelligence":[42],"(XAI)":[43],"boost":[45],"threat":[46],"explainability":[49],"networks.":[52],"The":[53,162],"adopts":[55],"a":[56,64],"human-like":[57],"method":[58],"gradually":[60],"build":[61],"train":[63],"neural":[65],"network":[66],"incorporates":[68],"GRUs,":[69],"LSTM":[70],"layers":[71],"attention":[73],"mechanisms":[74],"properly":[76],"detect":[77],"patterns":[78],"traffic,":[81],"no":[82],"matter":[83],"how":[84],"far":[85],"back":[86],"time.":[88],"A":[89],"major":[90],"development":[91],"is":[92,164,207],"adapting":[93],"Local":[94],"Interpretable":[95],"Model-Agnostic":[96],"Explanations":[97],"(LIME)":[98],"selectively":[100],"remove":[101],"unnecessary":[102],"features":[103],"as":[104],"model":[106,120,192],"advances,":[107],"thereby":[108],"improving":[109],"both":[110,196],"its":[111,134],"performance":[112],"readability.":[114],"By":[115],"restructuring":[116],"reducing":[118],"using":[121],"quantumization":[122],"pruning":[124],"techniques,":[125],"SqueezeNet":[126],"can":[127],"run":[128],"real":[130],"time":[131],"while":[132,226],"maintaining":[133],"accuracy,":[135,181],"shrinking":[136],"just":[138],"367":[139],"KB.":[140],"Also,":[141],"training":[142],"Random":[144],"Forest":[145],"XGBoost":[147],"helps":[148],"system":[150],"work":[152],"well":[153],"new":[155],"areas":[156],"protects":[158],"against":[160],"attacks.":[161],"thoroughly":[165],"proved":[166],"on":[167,211,223],"recent":[168],"diverse":[170],"benchmark":[172],"datasets":[173],"CIC-IoV-2024,":[174],"CIC-APT-IIoT-2024":[175],"EDGE-IIoT":[177],"by":[178],"achieving":[179],"98%":[180],"99%":[182],"precision":[183],"97%":[185],"F1-score.":[186],"This":[187,214],"information":[188],"confirms":[189],"this":[191],"reads":[193],"handles":[195],"traditional":[197],"advanced":[199],"cyber":[200],"threats":[201],"full":[203],"transparency,":[204],"effectiveness":[205],"easy":[208],"deploy":[210,220],"edge":[212],"devices.":[213],"aims":[216],"securely":[218],"applications":[222],"any":[224],"computer,":[225],"detecting":[227],"intrusions":[228],"handling":[230],"emerging":[231],"threats.":[232]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2026-01-13T00:00:00"}
