{"id":"https://openalex.org/W4414029330","doi":"https://doi.org/10.1186/s42400-025-00369-2","title":"Intrusion detection in the internet of things using convolutional neural networks: an explainable AI approach","display_name":"Intrusion detection in the internet of things using convolutional neural networks: an explainable AI approach","publication_year":2025,"publication_date":"2025-09-05","ids":{"openalex":"https://openalex.org/W4414029330","doi":"https://doi.org/10.1186/s42400-025-00369-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00369-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00369-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00369-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00369-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082350844","display_name":"Fatemeh Ebrahimi","orcid":null},"institutions":[{"id":"https://openalex.org/I204490172","display_name":"Shiraz University of Technology","ror":"https://ror.org/04bxa3v83","country_code":"IR","type":"education","lineage":["https://openalex.org/I204490172"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Fatemeh Ebrahimi","raw_affiliation_strings":["Computer Engineering and IT Department, Shiraz University of Technology, Shiraz, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and IT Department, Shiraz University of Technology, Shiraz, Iran","institution_ids":["https://openalex.org/I204490172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058428827","display_name":"Reza Javidan","orcid":"https://orcid.org/0000-0002-7788-6597"},"institutions":[{"id":"https://openalex.org/I204490172","display_name":"Shiraz University of Technology","ror":"https://ror.org/04bxa3v83","country_code":"IR","type":"education","lineage":["https://openalex.org/I204490172"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Reza Javidan","raw_affiliation_strings":["Computer Engineering and IT Department, Shiraz University of Technology, Shiraz, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and IT Department, Shiraz University of Technology, Shiraz, Iran","institution_ids":["https://openalex.org/I204490172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040553012","display_name":"Reza Akbari","orcid":"https://orcid.org/0000-0001-6491-7908"},"institutions":[{"id":"https://openalex.org/I204490172","display_name":"Shiraz University of Technology","ror":"https://ror.org/04bxa3v83","country_code":"IR","type":"education","lineage":["https://openalex.org/I204490172"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Reza Akbari","raw_affiliation_strings":["Computer Engineering and IT Department, Shiraz University of Technology, Shiraz, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and IT Department, Shiraz University of Technology, Shiraz, Iran","institution_ids":["https://openalex.org/I204490172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086003770","display_name":"Yasaman Hosseini","orcid":"https://orcid.org/0000-0001-8179-8963"},"institutions":[{"id":"https://openalex.org/I204490172","display_name":"Shiraz University of Technology","ror":"https://ror.org/04bxa3v83","country_code":"IR","type":"education","lineage":["https://openalex.org/I204490172"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Yasin Hosseini","raw_affiliation_strings":["Computer Engineering and IT Department, Shiraz University of Technology, Shiraz, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and IT Department, Shiraz University of Technology, Shiraz, Iran","institution_ids":["https://openalex.org/I204490172"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082350844"],"corresponding_institution_ids":["https://openalex.org/I204490172"],"apc_list":null,"apc_paid":null,"fwci":12.4667,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.98599794,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.818750262260437},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7130486965179443},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5756692886352539},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5642297863960266},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5096125602722168},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4291597604751587},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3827500641345978},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.346986323595047},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28448182344436646}],"concepts":[{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.818750262260437},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7130486965179443},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5756692886352539},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5642297863960266},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5096125602722168},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4291597604751587},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3827500641345978},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.346986323595047},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28448182344436646}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00369-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00369-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00369-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:273e9d232fb24669806cf60f72f54ace","is_oa":true,"landing_page_url":"https://doaj.org/article/273e9d232fb24669806cf60f72f54ace","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-22 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00369-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00369-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00369-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414029330.pdf","grobid_xml":"https://content.openalex.org/works/W4414029330.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W2523827785","https://openalex.org/W2902106343","https://openalex.org/W2904540497","https://openalex.org/W2907889246","https://openalex.org/W2914968227","https://openalex.org/W2963516518","https://openalex.org/W2969495950","https://openalex.org/W3017093935","https://openalex.org/W3085955590","https://openalex.org/W3121453273","https://openalex.org/W3152769850","https://openalex.org/W3176714582","https://openalex.org/W3196585642","https://openalex.org/W3196782388","https://openalex.org/W3206599325","https://openalex.org/W3216835679","https://openalex.org/W4200090997","https://openalex.org/W4200187172","https://openalex.org/W4285058242","https://openalex.org/W4288070321","https://openalex.org/W4297538900","https://openalex.org/W4313116287","https://openalex.org/W4318604557","https://openalex.org/W4323060046","https://openalex.org/W4323864106","https://openalex.org/W4366259400","https://openalex.org/W4383196772","https://openalex.org/W4387007843","https://openalex.org/W4391094887","https://openalex.org/W4391261302","https://openalex.org/W4391992335","https://openalex.org/W4400135036","https://openalex.org/W4400948585","https://openalex.org/W4401344934","https://openalex.org/W4403661856"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Abstract":[0],"Intrusion":[1],"Detection":[2],"Systems":[3],"(IDSs)":[4],"with":[5,131,269],"a":[6,116,122,180,199,286],"Machine":[7],"Learning":[8],"(ML)":[9],"technique":[10,157],"have":[11,31],"shown":[12],"efficacy":[13],"in":[14,21,93,138,221,264,284],"securing":[15],"Internet":[16],"of":[17,51,83,89,121,135,183,191,198,206,267,289],"Things":[18],"(IoT)":[19],"networks":[20],"recent":[22],"years.":[23],"As":[24],"cyber":[25],"threats":[26],"continue":[27],"to":[28,43,61,97,106,163,195,210,232,252,280],"evolve,":[29],"IDS":[30,75,290],"become":[32],"increasingly":[33],"reliant":[34],"on":[35,74],"advanced":[36],"ML":[37,77],"and":[38,78,185,189,212,216,229,249,256,272],"deep":[39,201],"learning":[40,95,110],"(DL)":[41],"techniques":[42],"improve":[44],"detection":[45],"accuracy.":[46],"However,":[47],"the":[48,63,81,90,132,136,145,149,152,165,176,187,192,196,204,207,214,218,234,237,242,265,275],"growing":[49],"complexity":[50,190],"these":[52],"models":[53],"often":[54],"makes":[55],"it":[56],"challenging":[57],"for":[58,160,174,236],"security":[59],"analysts":[60],"interpret":[62,211],"reasoning":[64],"behind":[65],"specific":[66],"alerts.":[67],"While":[68],"extensive":[69],"research":[70],"has":[71],"been":[72],"conducted":[73],"using":[76,179,241],"DL":[79],"methods,":[80],"issue":[82],"interpretability":[84],"remains":[85],"largely":[86],"unaddressed.":[87],"One":[88],"interpretable":[91],"methods":[92,224],"machine":[94,109],"is":[96,129,158],"use":[98],"model-agnostic":[99],"interpretation":[100,133],"tools":[101],"that":[102],"can":[103,143,171],"be":[104,172],"applied":[105],"any":[107],"supervised":[108],"model.":[111,147],"To":[112],"address":[113],"this":[114],"issue,":[115],"new":[117],"hybrid":[118],"model":[119,177],"composed":[120],"lightweight":[123,273],"one-dimensional":[124],"convolutional":[125],"Neural":[126],"Network":[127],"(1D-CNN)":[128],"proposed":[130,146,208,276],"ability":[134],"results":[137,215,240],"which,":[139],"resource-constrained":[140],"IoT":[141,268],"devices":[142],"execute":[144],"In":[148],"first":[150],"phase,":[151],"SHapley":[153],"Additive":[154],"exPlanations":[155],"(SHAP)":[156],"used":[159],"feature":[161],"selection":[162],"detect":[164],"most":[166],"important":[167],"features.":[168],"These":[169],"features":[170,184],"considered":[173],"redesigning":[175],"by":[178],"smaller":[181],"set":[182],"reducing":[186],"computation":[188],"model,":[193,209],"leading":[194],"creation":[197],"lighter":[200],"network.":[202],"After":[203],"prediction":[205],"explain":[213],"analyze":[217],"influential":[219],"factors":[220],"predictions,":[222],"Agnostic":[223],"are":[225],"employed":[226],"both":[227],"globally(SHAP)":[228],"locally(SHAP,":[230],"LIME)":[231],"clarify":[233],"reasons":[235],"predictions.":[238],"Experimental":[239],"TON-IoT":[243],"dataset":[244],"showed":[245],"accuracy,":[246],"precision,":[247],"recall,":[248],"F1-score":[250],"criteria":[251],"0.995,":[253],"0.9949,":[254],"0.9947,":[255,257],"respectively.":[258],"Therefore,":[259],"besides":[260],"accurately":[261],"predicting":[262],"attacks":[263],"area":[266],"high":[270],"precision":[271],"models,":[274],"method":[277],"increases":[278],"transparency":[279],"assist":[281],"cybersecurity":[282],"personnel":[283],"gaining":[285],"better":[287],"understanding":[288],"judgments.":[291]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
