{"id":"https://openalex.org/W7108482947","doi":"https://doi.org/10.1515/comp-2025-0046","title":"Enhancing IoT network security: a literature review of intrusion detection systems and their adaptability to emerging threats","display_name":"Enhancing IoT network security: a literature review of intrusion detection systems and their adaptability to emerging threats","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7108482947","doi":"https://doi.org/10.1515/comp-2025-0046"},"language":"en","primary_location":{"id":"doi:10.1515/comp-2025-0046","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2025-0046","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2025-0046/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2025-0046/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Bara Fteiha","orcid":null},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Bara Fteiha","raw_affiliation_strings":["College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Huma Zia","orcid":null},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Huma Zia","raw_affiliation_strings":["College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mai Zeyadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mai Zeyadeh","raw_affiliation_strings":["College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Raneem Abu Hazeem","orcid":null},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Raneem Abu Hazeem","raw_affiliation_strings":["College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Heba Obaidat","orcid":null},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Heba Obaidat","raw_affiliation_strings":["College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]}]},{"author_position":"last","author":{"id":null,"display_name":"Rawan Ghannam","orcid":null},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Rawan Ghannam","raw_affiliation_strings":["College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I117222138"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.58446605,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.43709999322891235,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.43709999322891235,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.040300000458955765,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.039900001138448715,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.7139999866485596},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7028999924659729},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.6873000264167786},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6678000092506409},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.34880000352859497},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.32739999890327454},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.3188000023365021}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7307999730110168},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.7139999866485596},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7028999924659729},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.6873000264167786},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6678000092506409},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5938000082969666},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.34880000352859497},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.32739999890327454},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.3188000023365021},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C2780202397","wikidata":"https://www.wikidata.org/wiki/Q2294986","display_name":"Smart objects","level":3,"score":0.3070000112056732},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.29339998960494995},{"id":"https://openalex.org/C2780871342","wikidata":"https://www.wikidata.org/wiki/Q7883752","display_name":"Underpinning","level":2,"score":0.29269999265670776},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C163362911","wikidata":"https://www.wikidata.org/wiki/Q17152351","display_name":"Smart system","level":3,"score":0.2782999873161316},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2533000111579895}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/comp-2025-0046","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2025-0046","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2025-0046/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:98f032b088914fb79ca227f3e338583c","is_oa":true,"landing_page_url":"https://doaj.org/article/98f032b088914fb79ca227f3e338583c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Open Computer Science, Vol 15, Iss 1, Pp 4117-244 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/comp-2025-0046","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2025-0046","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2025-0046/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7789799571037292,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7108482947.pdf","grobid_xml":"https://content.openalex.org/works/W7108482947.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W1548644355","https://openalex.org/W2000618265","https://openalex.org/W2098322148","https://openalex.org/W2370696599","https://openalex.org/W2381273131","https://openalex.org/W2483993938","https://openalex.org/W2565488855","https://openalex.org/W2740528846","https://openalex.org/W2762692271","https://openalex.org/W2765386572","https://openalex.org/W2899429604","https://openalex.org/W2902106343","https://openalex.org/W2935947414","https://openalex.org/W2941924863","https://openalex.org/W2943089161","https://openalex.org/W2945884086","https://openalex.org/W2946293880","https://openalex.org/W2949528415","https://openalex.org/W2958285686","https://openalex.org/W2964190660","https://openalex.org/W2993420112","https://openalex.org/W2997711900","https://openalex.org/W3001873511","https://openalex.org/W3089518510","https://openalex.org/W3090111074","https://openalex.org/W3095711016","https://openalex.org/W3112506293","https://openalex.org/W3155343069","https://openalex.org/W4214674051","https://openalex.org/W4280535971","https://openalex.org/W4285793087","https://openalex.org/W4292169579","https://openalex.org/W4313654696","https://openalex.org/W4321016094","https://openalex.org/W4362672268","https://openalex.org/W4366590727","https://openalex.org/W4366603218","https://openalex.org/W4380370464","https://openalex.org/W4380682492","https://openalex.org/W4381568796","https://openalex.org/W4391545869","https://openalex.org/W4405735633","https://openalex.org/W4406012944"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,49,91,129,134,151,175,194],"continuous":[3],"evolution":[4],"of":[5,11,52,73,93,124,138,162,170,177,196],"smart":[6,16,64,100,143],"environments":[7,144],"powered":[8],"by":[9,58,181],"Internet":[10],"Things":[12],"(IoT)":[13],"networks":[14,42,98],"and":[15,25,28,56,60,84,99,115,118,136,145,166],"devices,":[17],"there":[18],"becomes":[19],"a":[20,44,70,79],"crucial":[21],"need":[22],"to":[23,110,174],"address":[24],"ensure":[26],"privacy":[27,165],"security.":[29],"Intrusion":[30],"Detection":[31],"Systems":[32],"(IDSs)":[33],"that":[34,153],"are":[35],"specially":[36],"designed":[37],"for":[38,75,107,184,187],"use":[39],"in":[40,47,95,141,160],"IoT":[41,54,76,97,178,189],"play":[43],"vital":[45],"role":[46],"strengthening":[48],"security":[50,180],"posture":[51],"an":[53],"network":[55,179],"system":[57],"safeguarding":[59,142],"preventing":[61],"attacks":[62],"against":[63],"environments.":[65],"This":[66,147],"research":[67],"paper":[68,148],"presents":[69],"comparative":[71],"study":[72,127,172],"IDSs":[74,94],"networks,":[77],"with":[78,113,121],"focus":[80],"on":[81],"signature-based,":[82],"anomaly-based,":[83],"specification-based":[85],"IDS":[86,131,155,185],"detection":[87],"methods":[88,132],"while":[89],"highlighting":[90],"significance":[92],"protecting":[96],"environments,":[101],"which":[102],"have":[103],"become":[104],"recent":[105],"targets":[106],"attackers":[108],"due":[109],"their":[111,119],"integration":[112],"modern":[114],"advanced":[116],"technologies":[117],"involvement":[120],"large":[122],"volumes":[123],"data.":[125],"The":[126,168],"investigates":[128],"mentioned":[130],"covering":[133],"strengths":[135],"weaknesses":[137],"each":[139],"method":[140],"networks.":[146],"dives":[149],"into":[150],"characteristics":[152],"make":[154],"decision-making":[156],"more":[157],"effective":[158],"primarily":[159],"terms":[161],"security,":[163,191],"considering":[164],"performance.":[167],"findings":[169],"this":[171],"contribute":[173],"hardening":[176],"offering":[182],"recommendations":[183],"selection":[186],"enhancing":[188],"overall":[190],"specifically":[192],"through":[193],"adoption":[195],"adaptive-based":[197],"IDSs.":[198]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-12-04T00:00:00"}
