{"id":"https://openalex.org/W4200492700","doi":"https://doi.org/10.1515/jisys-2021-0173","title":"IoT network security using autoencoder deep neural network and channel access algorithm","display_name":"IoT network security using autoencoder deep neural network and channel access algorithm","publication_year":2021,"publication_date":"2021-12-08","ids":{"openalex":"https://openalex.org/W4200492700","doi":"https://doi.org/10.1515/jisys-2021-0173"},"language":"en","primary_location":{"id":"doi:10.1515/jisys-2021-0173","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2021-0173","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jisys-2021-0173/pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/jisys-2021-0173/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101495389","display_name":"S.M. Farouq Ali","orcid":"https://orcid.org/0000-0002-0484-7036"},"institutions":[{"id":"https://openalex.org/I2801106189","display_name":"Dijlah University College","ror":"https://ror.org/03vndx142","country_code":"IQ","type":"education","lineage":["https://openalex.org/I2801106189"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Saif Mohammed Ali","raw_affiliation_strings":["Department of Computer Science, Dijlah University College , Baghdad , Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Dijlah University College , Baghdad , Iraq","institution_ids":["https://openalex.org/I2801106189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010421215","display_name":"Amer S. Elameer","orcid":"https://orcid.org/0000-0002-1707-145X"},"institutions":[{"id":"https://openalex.org/I4210119257","display_name":"University of Information Technology and Communications","ror":"https://ror.org/028h0pd91","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210119257"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Amer S. Elameer","raw_affiliation_strings":["Biomedical Informatics College, University of Information Technology and Communications (UOITC) , Baghdad , Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Biomedical Informatics College, University of Information Technology and Communications (UOITC) , Baghdad , Iraq","institution_ids":["https://openalex.org/I4210119257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039033083","display_name":"Mustafa Musa Jaber","orcid":null},"institutions":[{"id":"https://openalex.org/I2801106189","display_name":"Dijlah University College","ror":"https://ror.org/03vndx142","country_code":"IQ","type":"education","lineage":["https://openalex.org/I2801106189"]},{"id":"https://openalex.org/I2801460691","display_name":"Al-Turath University","ror":"https://ror.org/019vd4365","country_code":"IQ","type":"education","lineage":["https://openalex.org/I2801460691"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Mustafa Musa Jaber","raw_affiliation_strings":["Department of Computer Science, Al-Turath University College , Baghdad , Iraq","Department of Computer Science, Dijlah University College , Baghdad , Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Al-Turath University College , Baghdad , Iraq","institution_ids":["https://openalex.org/I2801460691"]},{"raw_affiliation_string":"Department of Computer Science, Dijlah University College , Baghdad , Iraq","institution_ids":["https://openalex.org/I2801106189"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039033083"],"corresponding_institution_ids":["https://openalex.org/I2801106189","https://openalex.org/I2801460691"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":1.922,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.86901014,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"31","issue":"1","first_page":"95","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8443042039871216},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.8086330890655518},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5264918208122253},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5254924893379211},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5251205563545227},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5042566061019897},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.49417999386787415},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4731619954109192},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.44893205165863037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.356894850730896},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.33760586380958557},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3238040804862976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24845120310783386},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1216314435005188}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8443042039871216},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.8086330890655518},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5264918208122253},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5254924893379211},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5251205563545227},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5042566061019897},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.49417999386787415},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4731619954109192},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.44893205165863037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.356894850730896},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.33760586380958557},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3238040804862976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24845120310783386},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1216314435005188}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jisys-2021-0173","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2021-0173","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jisys-2021-0173/pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:41b55944a26342169752be498dc00ca6","is_oa":true,"landing_page_url":"https://doaj.org/article/41b55944a26342169752be498dc00ca6","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Intelligent Systems, Vol 31, Iss 1, Pp 95-103 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jisys-2021-0173","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2021-0173","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jisys-2021-0173/pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.9100000262260437,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4200492700.pdf","grobid_xml":"https://content.openalex.org/works/W4200492700.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W2905203220","https://openalex.org/W2945594226","https://openalex.org/W2972189363","https://openalex.org/W2989255594","https://openalex.org/W2999613521","https://openalex.org/W3012667734","https://openalex.org/W3014115803","https://openalex.org/W3015589435","https://openalex.org/W3030297165","https://openalex.org/W3033675321","https://openalex.org/W3043744241","https://openalex.org/W3045818689","https://openalex.org/W3047052966","https://openalex.org/W3088372203","https://openalex.org/W3089759153","https://openalex.org/W3092625934","https://openalex.org/W3092928873","https://openalex.org/W3111635317","https://openalex.org/W3126355424","https://openalex.org/W3137868587","https://openalex.org/W3157481002","https://openalex.org/W3159885303"],"related_works":["https://openalex.org/W2159052453","https://openalex.org/W3013693939","https://openalex.org/W2566616303","https://openalex.org/W3131327266","https://openalex.org/W2752972570","https://openalex.org/W4297051394","https://openalex.org/W2734887215","https://openalex.org/W4382727221","https://openalex.org/W2360932317","https://openalex.org/W3118170786"],"abstract_inverted_index":{"Abstract":[0],"Internet-of-Things":[1],"(IoT)":[2],"creates":[3],"a":[4,24,65],"significant":[5],"impact":[6],"in":[7],"spectrum":[8,40],"sensing,":[9],"information":[10,21],"retrieval,":[11],"medical":[12],"analysis,":[13],"traffic":[14],"management,":[15],"etc.":[16],"These":[17,53],"applications":[18],"require":[19],"continuous":[20],"to":[22,92,123,131,147],"perform":[23],"specific":[25],"task.":[26],"At":[27],"the":[28,47,88,94,108,118,125,133,144,148,156,164,178,185,188],"time,":[29],"various":[30,170],"intermediate":[31,119],"attacks":[32,42,54,168],"such":[33],"as":[34],"jamming,":[35],"priority":[36,81],"violation":[37,82],"attacks,":[38],"and":[39,57,80,163,184],"poisoning":[41],"affect":[43],"communication":[44],"because":[45],"of":[46,50,172,177,190],"open":[48],"nature":[49],"wireless":[51],"communication.":[52,63],"create":[55],"security":[56],"privacy":[58],"issues":[59],"while":[60],"making":[61],"data":[62,101,110,151],"Therefore,":[64],"new":[66],"method":[67,86],"autoencoder":[68],"deep":[69],"neural":[70,149],"network":[71,114],"(AENN)":[72],"is":[73,99,111,129,161,180],"developed":[74],"by":[75],"considering":[76],"exploratory,":[77],"evasion,":[78],"causative,":[79],"attack.":[83],"The":[84,158,175],"created":[85],"classifies":[87],"transmission":[89,95,102],"outcomes":[90],"used":[91,130],"predict":[93],"state,":[96],"whether":[97],"it":[98],"jam":[100],"or":[103],"sensing":[104,109],"data.":[105],"After":[106,142],"that,":[107],"applied":[112],"for":[113,135],"training":[115],"that":[116,138],"predicts":[117],"attacks.":[120],"In":[121],"addition":[122],"this,":[124],"channel":[126,134,145],"access":[127,137],"algorithm":[128],"validate":[132],"every":[136],"minimizes":[139,166],"unauthorized":[140],"access.":[141],"validating":[143],"according":[146],"network,":[150],"have":[152],"been":[153],"transmitted":[154],"over":[155],"network.":[157],"defined":[159],"process":[160],"implemented,":[162],"system":[165,179,186],"different":[167],"on":[169],"levels":[171],"energy":[173],"consumption.":[174],"effectiveness":[176],"implemented":[181],"using":[182],"TensorFlow,":[183],"ensures":[187],"99.02%":[189],"detection":[191],"rate":[192],"when":[193],"compared":[194],"with":[195],"other":[196],"techniques.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2021-12-31T00:00:00"}
