{"id":"https://openalex.org/W4405733994","doi":"https://doi.org/10.1504/ijesdf.2025.143475","title":"IoT security: a systematic literature review of feature selection methods for machine learning-based attack classification","display_name":"IoT security: a systematic literature review of feature selection methods for machine learning-based attack classification","publication_year":2024,"publication_date":"2024-12-24","ids":{"openalex":"https://openalex.org/W4405733994","doi":"https://doi.org/10.1504/ijesdf.2025.143475"},"language":"en","primary_location":{"id":"doi:10.1504/ijesdf.2025.143475","is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijesdf.2025.143475","pdf_url":"https://doi.org/10.1504/ijesdf.2025.143475","source":{"id":"https://openalex.org/S198660693","display_name":"International Journal of Electronic Security and Digital Forensics","issn_l":"1751-911X","issn":["1751-911X","1751-9128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Security and Digital Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.1504/ijesdf.2025.143475","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101828523","display_name":"Jing Li","orcid":"https://orcid.org/0000-0002-8235-9038"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jing Li","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086606810","display_name":"Mohd Shahizan Othman","orcid":"https://orcid.org/0000-0003-4261-1873"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohd Shahizan Othman","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089927436","display_name":"Hewan Chen","orcid":"https://orcid.org/0009-0003-6259-3817"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen Hewan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5079146277","display_name":"Lizawati Mi Yusuf","orcid":"https://orcid.org/0000-0003-4171-3253"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lizawati Mi Yusuf","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101828523"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.349,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89759323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"17","issue":"1/2","first_page":"60","last_page":"107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9212999939918518,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8825784921646118},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7943756580352783},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5508602857589722},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5300369262695312},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.525386393070221},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4987063407897949},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46143150329589844},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40390893816947937}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8825784921646118},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7943756580352783},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5508602857589722},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5300369262695312},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.525386393070221},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4987063407897949},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46143150329589844},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40390893816947937},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijesdf.2025.143475","is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijesdf.2025.143475","pdf_url":"https://doi.org/10.1504/ijesdf.2025.143475","source":{"id":"https://openalex.org/S198660693","display_name":"International Journal of Electronic Security and Digital Forensics","issn_l":"1751-911X","issn":["1751-911X","1751-9128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Security and Digital Forensics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1504/ijesdf.2025.143475","is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijesdf.2025.143475","pdf_url":"https://doi.org/10.1504/ijesdf.2025.143475","source":{"id":"https://openalex.org/S198660693","display_name":"International Journal of Electronic Security and Digital Forensics","issn_l":"1751-911X","issn":["1751-911X","1751-9128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Security and Digital Forensics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322699","display_name":"Universiti Kebangsaan Malaysia","ror":"https://ror.org/00bw8d226"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405733994.pdf","grobid_xml":"https://content.openalex.org/works/W4405733994.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"In":[0],"the":[1,4,15,68,81,123],"age":[2],"of":[3,6,80],"internet":[5],"things":[7],"(IoT),":[8],"ensuring":[9],"security":[10,58,95],"is":[11,24,59],"crucial":[12],"to":[13,21,45,139,144,171],"protect":[14,46],"interconnected":[16],"devices":[17],"and":[18,64,108,119,137,159,168],"systems.The":[19],"capacity":[20],"identify":[22,43],"cyberattacks":[23],"essential":[25],"for":[26,56,87,115,166],"IoT":[27,47,57,94,97,151,178],"security,":[28],"hence":[29],"many":[30],"academics":[31],"have":[32],"focused":[33],"their":[34],"efforts":[35],"on":[36,83],"developing":[37],"powerful":[38],"classification":[39,54,91],"models":[40,55,92],"that":[41,129],"can":[42],"intrusions":[44],"infrastructure.One":[48],"key":[49],"factor":[50],"in":[51,66,93,177],"creating":[52],"successful":[53],"feature":[60,70,84,147,153,174],"selection.To":[61],"assist":[62],"researchers":[63,167],"practitioners":[65,169],"selecting":[67],"appropriate":[69],"selection":[71,85,148,154,175],"methods,":[72,149,156],"this":[73],"paper":[74],"presents":[75],"a":[76],"systematic":[77,116],"literature":[78,82,117],"review":[79,124,162],"approaches":[86,176],"machine":[88],"learning-based":[89],"attack":[90],"using":[96,111],"datasets.By":[98],"analysing":[99],"data":[100],"from":[101],"1,272":[102],"studies":[103,128,134],"published":[104],"between":[105],"January":[106],"2018":[107],"December":[109],"2022":[110],"preferred":[112],"reporting":[113],"items":[114],"reviews":[118],"meta-analyses":[120],"(PRISMA)":[121],"guidelines,":[122],"identifies":[125],"63":[126],"primary":[127,133],"meet":[130],"inclusion":[131],"criteria.The":[132],"are":[135],"analysed":[136],"categorised":[138],"answer":[140],"research":[141],"questions":[142],"related":[143],"current":[145],"practices,":[146],"benchmark":[150],"datasets,":[152],"validation":[155],"limitations,":[157],"challenges,":[158],"future":[160],"directions.The":[161],"provides":[163],"valuable":[164],"insights":[165],"seeking":[170],"incorporate":[172],"effective":[173],"security.":[179]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
