{"id":"https://openalex.org/W4323040680","doi":"https://doi.org/10.3233/jifs-223246","title":"HSDL-based intelligent threat detection framework for IoT network","display_name":"HSDL-based intelligent threat detection framework for IoT network","publication_year":2023,"publication_date":"2023-03-03","ids":{"openalex":"https://openalex.org/W4323040680","doi":"https://doi.org/10.3233/jifs-223246"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-223246","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jifs-223246","pdf_url":"https://content.iospress.com:443/download/journal-of-intelligent-and-fuzzy-systems/ifs223246?id=journal-of-intelligent-and-fuzzy-systems%2Fifs223246","source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.iospress.com:443/download/journal-of-intelligent-and-fuzzy-systems/ifs223246?id=journal-of-intelligent-and-fuzzy-systems%2Fifs223246","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077333346","display_name":"D. Santhadevi","orcid":null},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"D. Santhadevi","raw_affiliation_strings":["National Institute of Technology, Tiruchirappalli, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022662457","display_name":"B. Janet","orcid":"https://orcid.org/0000-0001-7030-9634"},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. Janet","raw_affiliation_strings":["National Institute of Technology, Tiruchirappalli, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077333346"],"corresponding_institution_ids":["https://openalex.org/I122964287"],"apc_list":null,"apc_paid":null,"fwci":1.0046,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.756783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"45","issue":"1","first_page":"1775","last_page":"1790"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8532034158706665},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6766536831855774},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.6730254888534546},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5924013257026672},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5809161067008972},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5302942395210266},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5293154120445251},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5186938047409058},{"id":"https://openalex.org/keywords/spark","display_name":"SPARK (programming language)","score":0.49933910369873047},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4537047743797302},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4360727071762085},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4088316857814789},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3569105863571167},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3527263402938843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21759003400802612}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8532034158706665},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6766536831855774},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.6730254888534546},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5924013257026672},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5809161067008972},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5302942395210266},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5293154120445251},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5186938047409058},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.49933910369873047},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4537047743797302},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4360727071762085},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4088316857814789},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3569105863571167},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3527263402938843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21759003400802612},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-223246","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jifs-223246","pdf_url":"https://content.iospress.com:443/download/journal-of-intelligent-and-fuzzy-systems/ifs223246?id=journal-of-intelligent-and-fuzzy-systems%2Fifs223246","source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3233/jifs-223246","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jifs-223246","pdf_url":"https://content.iospress.com:443/download/journal-of-intelligent-and-fuzzy-systems/ifs223246?id=journal-of-intelligent-and-fuzzy-systems%2Fifs223246","source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4323040680.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1923298278","https://openalex.org/W2047826381","https://openalex.org/W2094547360","https://openalex.org/W2360903897","https://openalex.org/W2548810364","https://openalex.org/W2597372044","https://openalex.org/W2613310014","https://openalex.org/W2677041581","https://openalex.org/W2766401293","https://openalex.org/W2766731311","https://openalex.org/W2790808809","https://openalex.org/W2791879367","https://openalex.org/W2799943651","https://openalex.org/W2889635482","https://openalex.org/W2891713004","https://openalex.org/W2895790973","https://openalex.org/W2921573932","https://openalex.org/W2922146383","https://openalex.org/W2958780305","https://openalex.org/W2963748489","https://openalex.org/W2981025625","https://openalex.org/W2986055611","https://openalex.org/W2991507433","https://openalex.org/W2993032149","https://openalex.org/W3005201926","https://openalex.org/W3043103359","https://openalex.org/W3087325199","https://openalex.org/W3088518202","https://openalex.org/W3092149785","https://openalex.org/W3120127977","https://openalex.org/W3201440045","https://openalex.org/W4242193627"],"related_works":["https://openalex.org/W2989932438","https://openalex.org/W4312417841","https://openalex.org/W4321369474","https://openalex.org/W3081496756","https://openalex.org/W2731899572","https://openalex.org/W3133861977","https://openalex.org/W3099765033","https://openalex.org/W4220996320","https://openalex.org/W4283701629","https://openalex.org/W4361732492"],"abstract_inverted_index":{"Many":[0],"Internet":[1],"of":[2,51,100],"Things":[3],"(IoT)":[4],"devices":[5],"are":[6,125,135],"susceptible":[7],"to":[8,127],"cyber-attacks.":[9],"Attackers":[10],"can":[11],"exploit":[12],"these":[13,56],"flaws":[14],"using":[15],"the":[16,49,52,58,89,112,129],"internet":[17],"and":[18,81,104,110],"remote":[19],"access.":[20],"An":[21],"efficient":[22],"Intelligent":[23],"threat":[24,45],"detection":[25,46],"framework":[26],"is":[27,65,71,94,106],"proposed":[28,130],"for":[29,96,108],"IoT":[30,68],"networks.":[31],"This":[32],"paper":[33],"considers":[34],"four":[35],"key":[36],"layout":[37],"ideas":[38],"while":[39],"building":[40],"a":[41],"deep":[42],"learning-based":[43],"intelligent":[44],"system":[47],"at":[48],"edge":[50],"IoT.":[53],"Based":[54],"on":[55],"concepts,":[57],"Hybrid":[59],"Stacked":[60,82],"Deep":[61,75],"Learning":[62],"(HSDL)":[63],"model":[64,91,114],"presented.":[66],"Raw":[67],"traffic":[69,102],"data":[70],"pre-processed":[72],"with":[73,137],"spark.":[74],"Vectorized":[76],"Convolution":[77],"Neural":[78],"Network":[79,87],"(VCNN)":[80],"Long":[83],"Short":[84],"Term":[85],"Memory":[86],"build":[88],"classification":[90,109],"(SLSTM).":[92],"VCNN":[93],"used":[95,107,126],"extracting":[97],"meaningful":[98],"features":[99],"network":[101],"data,":[103],"SLSTM":[105],"prevents":[111],"DL":[113],"from":[115],"overfitting.":[116],"Three":[117],"benchmark":[118],"datasets":[119],"(NBaIoT-balanced,":[120],"UNSW-NB15":[121],"&amp;":[122],"UNSW_BOT_IoT-":[123],"imbalanced)":[124],"test":[128],"hybrid":[131],"technique.":[132],"The":[133],"results":[134],"compared":[136],"state-of-the-art":[138],"models.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-01-22T23:29:09.771500","created_date":"2025-10-10T00:00:00"}
