{"id":"https://openalex.org/W4417353558","doi":"https://doi.org/10.1186/s40537-025-01329-w","title":"DeepSecure: a novel deep learning model for effective detection of attacks on big data in Internet of Urban Things","display_name":"DeepSecure: a novel deep learning model for effective detection of attacks on big data in Internet of Urban Things","publication_year":2025,"publication_date":"2025-12-16","ids":{"openalex":"https://openalex.org/W4417353558","doi":"https://doi.org/10.1186/s40537-025-01329-w"},"language":"en","primary_location":{"id":"doi:10.1186/s40537-025-01329-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-025-01329-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s40537-025-01329-w.pdf","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1186/s40537-025-01329-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120813126","display_name":"Laiba Sabir","orcid":null},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Laiba Sabir","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055380996","display_name":"Nadeem Javaid","orcid":"https://orcid.org/0000-0003-3777-8249"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Nadeem Javaid","raw_affiliation_strings":["ComSens Lab, International Graduate School of Artificial Intelligence, National Yunlin University of Science and Technology, Douliu, Yunlin, 64002, Taiwan"],"affiliations":[{"raw_affiliation_string":"ComSens Lab, International Graduate School of Artificial Intelligence, National Yunlin University of Science and Technology, Douliu, Yunlin, 64002, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020128989","display_name":"Mariam Akbar","orcid":"https://orcid.org/0000-0002-8019-9114"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mariam Akbar","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089697598","display_name":"Nabil Alrajeh","orcid":"https://orcid.org/0000-0002-1861-0582"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Nabil Alrajeh","raw_affiliation_strings":["Department of Biomedical Technology, College of Applied Medical Sciences, King Saud University, 11633, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Biomedical Technology, College of Applied Medical Sciences, King Saud University, 11633, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011431771","display_name":"Safdar Hussain Bouk","orcid":"https://orcid.org/0000-0002-1764-7703"},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Safdar Hussain Bouk","raw_affiliation_strings":["Old Dominion University, 5115 Hampton Blvd, 23529, Norfolk, VA, United States of America"],"affiliations":[{"raw_affiliation_string":"Old Dominion University, 5115 Hampton Blvd, 23529, Norfolk, VA, United States of America","institution_ids":["https://openalex.org/I81365321"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067477252","display_name":"Abdulaziz Aldegheishem","orcid":"https://orcid.org/0000-0003-3287-5357"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdulaziz Aldegheishem","raw_affiliation_strings":["Department of Urban Planning, College of Architecture and Planning, King Saud University, 11574, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Urban Planning, College of Architecture and Planning, King Saud University, 11574, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5120813126"],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":{"value":1060,"currency":"GBP","value_usd":1300},"apc_paid":{"value":1060,"currency":"GBP","value_usd":1300},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44454679,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8443999886512756,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8443999886512756,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.022700000554323196,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.020400000736117363,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7268000245094299},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6597999930381775},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.49059998989105225},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.47609999775886536},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4609000086784363},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.45739999413490295},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.45260000228881836},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.45210000872612},{"id":"https://openalex.org/keywords/deep-belief-network","display_name":"Deep belief network","score":0.42899999022483826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8568000197410583},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7268000245094299},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7224000096321106},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6597999930381775},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.595300018787384},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.49059998989105225},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.47609999775886536},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4609000086784363},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.45739999413490295},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.45260000228881836},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.45210000872612},{"id":"https://openalex.org/C97385483","wikidata":"https://www.wikidata.org/wiki/Q16954980","display_name":"Deep belief network","level":3,"score":0.42899999022483826},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4189000129699707},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4032999873161316},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3937000036239624},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3707999885082245},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3684000074863434},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.34450000524520874},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.29649999737739563},{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.28439998626708984},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.28049999475479126},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.27869999408721924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26919999718666077},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.267300009727478},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.2572999894618988},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.2565999925136566}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1186/s40537-025-01329-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-025-01329-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s40537-025-01329-w.pdf","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.odu.edu:cybersecurity-pubs-1026","is_oa":true,"landing_page_url":"https://digitalcommons.odu.edu/cybersecurity-pubs/27","pdf_url":null,"source":{"id":"https://openalex.org/S4377196314","display_name":"ODU Digital Commons (Old Dominion University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I81365321","host_organization_name":"Old Dominion University","host_organization_lineage":["https://openalex.org/I81365321"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"School of Cybersecurity Faculty Publications","raw_type":"text"},{"id":"pmh:oai:doaj.org/article:fb7ebc7f054d43b3bd7e5fec98d57e75","is_oa":true,"landing_page_url":"https://doaj.org/article/fb7ebc7f054d43b3bd7e5fec98d57e75","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Big Data, Vol 12, Iss 1, Pp 1-38 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s40537-025-01329-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-025-01329-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s40537-025-01329-w.pdf","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8308984492","display_name":null,"funder_award_id":"ORF-2025-R295","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4417353558.pdf"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W3000094279","https://openalex.org/W3028069824","https://openalex.org/W3085955590","https://openalex.org/W3164987805","https://openalex.org/W3191470662","https://openalex.org/W3203932036","https://openalex.org/W4200253523","https://openalex.org/W4205618214","https://openalex.org/W4225293724","https://openalex.org/W4283205402","https://openalex.org/W4283703174","https://openalex.org/W4323034524","https://openalex.org/W4323349130","https://openalex.org/W4366259400","https://openalex.org/W4393336635","https://openalex.org/W4396620648","https://openalex.org/W4396935686","https://openalex.org/W4400798420","https://openalex.org/W4408473422","https://openalex.org/W4409563229"],"related_works":[],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,10,16,124,136,215],"Urban":[3],"Things":[4],"(IoUTs)":[5],"regularly":[6],"generates":[7],"large":[8],"amounts":[9],"data,":[11],"making":[12],"it":[13,150],"a":[14,51,58,223],"focus":[15],"cyberthreats":[17],"such":[18,206],"as":[19,207],"denial-of-service":[20],"attacks":[21],"and":[22,42,71,107,142,161,167,197,213,225],"malware":[23],"bot":[24],"networks.":[25],"Traditional":[26],"intrusion":[27],"detection":[28],"systems":[29],"struggle":[30],"to":[31,87,103,175,185,191],"detect":[32],"intricate":[33],"attack":[34,76,121,208],"patterns,":[35],"handle":[36],"class":[37,109],"imbalance,":[38,212],"capture":[39],"temporal":[40],"dependencies,":[41],"exhibit":[43],"transparency.":[44,199],"To":[45],"address":[46],"these":[47],"limitations,":[48],"we":[49,180],"introduce":[50],"novel":[52],"deep":[53],"machine":[54],"learning":[55,86],"model,":[56],"DeepSecure,":[57],"hybrid":[59],"model":[60,105,198],"that":[61,220],"combines":[62],"Deep":[63,72],"Belief":[64],"Networks":[65,74],"(DBN)":[66],"for":[67,75,81,172,228],"hierarchical":[68,89],"feature":[69,82,195],"extraction":[70],"Neural":[73],"classification.":[77],"DBN":[78],"is":[79,112,222],"used":[80],"selection":[83],"through":[84],"unsupervised":[85],"extract":[88],"representations":[90],"in":[91,138,144,147],"the":[92,98,115,187,217],"IoUTs":[93,229],"network":[94,230],"data.":[95],"We":[96],"assess":[97],"random":[99],"oversampling":[100],"examples":[101],"technique":[102],"improve":[104],"generalization":[106],"prevent":[108],"imbalance.":[110],"DeepSecure":[111,132,221],"implemented":[113],"using":[114],"TON_IoT":[116],"dataset,":[117],"which":[118],"includes":[119],"multi-source":[120],"data":[122,211],"indicative":[123],"Industry":[125],"4.0":[126],"cyber":[127],"risks.":[128],"In":[129],"multi-class":[130],"classification,":[131,149],"shows":[133],"improvement":[134],"score":[135],"21.25%":[137],"accuracy,":[139],"recall,":[140],"F1-score,":[141],"18.29%":[143],"precision.":[145],"Whereas,":[146],"binary":[148],"increases":[151],"accuracy":[152],"by":[153,156,159,163],"11.23%,":[154],"precision":[155],"15.11%,":[157],"F1-score":[158],"10%,":[160],"recall":[162],"5.32%.":[164],"ANOVA":[165],"T-test":[166],"10-fold":[168],"cross-validation":[169],"are":[170],"utilized":[171],"results":[173,218],"validation":[174],"ensure":[176],"DeepSecure\u2019s":[177,188],"reliability.":[178],"Additionally,":[179],"use":[181],"Shapley":[182],"additive":[183],"explanations":[184],"interpret":[186],"decision-making":[189],"process":[190],"provide":[192],"insight":[193],"into":[194],"contributions":[196],"By":[200],"effectively":[201],"tackling":[202],"IoUTs-specific":[203],"cybersecurity":[204],"challenges":[205],"pattern":[209],"detection,":[210],"lack":[214],"interpretability,":[216],"demonstrate":[219],"practical,":[224],"transparent,":[226],"solution":[227],"security.":[231]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-16T00:00:00"}
