{"id":"https://openalex.org/W4382680174","doi":"https://doi.org/10.3233/jifs-223437","title":"A novel dimensionality reduction and optimal deep learning based intrusion detection system for internet of things","display_name":"A novel dimensionality reduction and optimal deep learning based intrusion detection system for internet of things","publication_year":2023,"publication_date":"2023-06-30","ids":{"openalex":"https://openalex.org/W4382680174","doi":"https://doi.org/10.3233/jifs-223437"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-223437","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-223437","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022329277","display_name":"Krishna Kumar Ponniah","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Krishna Kumar Ponniah","raw_affiliation_strings":["Department of Computer Science and Engineering, Amrita College of Engineering and Technology, Nagercoil, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Amrita College of Engineering and Technology, Nagercoil, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053185621","display_name":"Bharathi Retnaswamy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bharathi Retnaswamy","raw_affiliation_strings":["Department of Electronics and Communication Engineering, University College of Engineering Nagercoil, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, University College of Engineering Nagercoil, Tamil Nadu, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022329277"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07903348,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"45","issue":"3","first_page":"4737","last_page":"4751"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8358774781227112},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6321637630462646},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.5869335532188416},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5777266621589661},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5561462640762329},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5194644331932068},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5111883282661438},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4865099787712097},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.4654005467891693},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4477689564228058},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42115166783332825},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4153517484664917},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.41230690479278564},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3346179127693176},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20307445526123047},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18510153889656067}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8358774781227112},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6321637630462646},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.5869335532188416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5777266621589661},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5561462640762329},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5194644331932068},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5111883282661438},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4865099787712097},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.4654005467891693},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4477689564228058},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42115166783332825},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4153517484664917},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.41230690479278564},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3346179127693176},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20307445526123047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18510153889656067},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-223437","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-223437","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2611338987","https://openalex.org/W2809706118","https://openalex.org/W2903294440","https://openalex.org/W2911747218","https://openalex.org/W2944406047","https://openalex.org/W2949695962","https://openalex.org/W2950250245","https://openalex.org/W2964200838","https://openalex.org/W2974559344","https://openalex.org/W2990268365","https://openalex.org/W2990449675","https://openalex.org/W2994866269","https://openalex.org/W3000147031","https://openalex.org/W3005630930","https://openalex.org/W3015539767","https://openalex.org/W3033403042","https://openalex.org/W3033587968","https://openalex.org/W3044066880","https://openalex.org/W3047091415","https://openalex.org/W3082263548","https://openalex.org/W3106716739","https://openalex.org/W3113277549","https://openalex.org/W3125345207","https://openalex.org/W3128447012","https://openalex.org/W3128756376","https://openalex.org/W3128910312","https://openalex.org/W3144192494","https://openalex.org/W3157871125","https://openalex.org/W3172408309","https://openalex.org/W3208773001","https://openalex.org/W3217748719","https://openalex.org/W6752785726","https://openalex.org/W6763555754","https://openalex.org/W6770582457","https://openalex.org/W6781469262","https://openalex.org/W6782263699","https://openalex.org/W6787229320","https://openalex.org/W6802864895"],"related_works":["https://openalex.org/W2579148721","https://openalex.org/W4387893611","https://openalex.org/W2347335694","https://openalex.org/W2091056927","https://openalex.org/W2067407580","https://openalex.org/W4389669152","https://openalex.org/W2038514069","https://openalex.org/W1967233468","https://openalex.org/W2009181529","https://openalex.org/W4250857377"],"abstract_inverted_index":{"The":[0,14,212],"internet":[1],"of":[2,16,152],"things":[3],"(IoT)":[4,18],"has":[5],"significantly":[6],"influenced":[7],"day-to-day":[8],"life":[9],"in":[10,47],"large":[11],"industrial":[12],"systems.":[13],"Internet":[15],"Things":[17],"offers":[19],"a":[20,77,92,185],"platform":[21],"for":[22,39,95,175],"information":[23],"systems":[24],"to":[25,49,59,80,84,172,223],"integrate":[26],"effectively":[27,221],"with":[28],"network":[29,52,65,82,110],"servers.":[30,41],"In":[31,57],"contrast,":[32],"cyber":[33],"threats":[34],"are":[35],"becoming":[36],"critical,":[37],"especially":[38],"IoT":[40,86,96],"A":[42],"strong":[43],"strategy":[44],"must":[45],"be":[46],"place":[48],"protect":[50],"the":[51,120,126,153,160,164,173,177,216],"system":[53,70],"from":[54,125],"multiple":[55],"attacks.":[56],"order":[58],"detect":[60],"malicious":[61],"behaviors":[62],"that":[63,215],"deteriorate":[64],"performance,":[66],"an":[67,170],"intrusion":[68,220],"detection":[69,78],"(IDS)":[71],"is":[72,123,135,157,167,190],"crucial.":[73],"An":[74],"IDS":[75,94],"use":[76],"method":[79],"monitor":[81],"activity":[83],"alert":[85],"users":[87],"regularly.":[88],"This":[89],"paper":[90],"proposes":[91],"novel":[93],"using":[97,159,192],"log-sigmoid":[98],"kernel":[99],"principal":[100],"component":[101],"analysis":[102,189],"(LSK-PCA)":[103],"and":[104,116,129,181,208],"activation":[105],"updated":[106],"deep":[107],"feed-forward":[108],"neural":[109],"(AU-DFFNN)":[111],"based":[112,147],"dimensionality":[113],"reduction":[114],"(DR)":[115],"classification":[117],"technique.":[118],"Initially,":[119],"input":[121,171],"data":[122,156,178],"taken":[124],"NSLKDD":[127],"dataset":[128,166],"undergoes":[130],"pre-processing.":[131],"Afterwards,":[132],"attribute":[133],"extraction":[134],"carried":[136],"out,":[137],"followed":[138],"by":[139],"Fisher\u2019s":[140],"Yates":[141],"Adapted":[142],"Golden":[143],"Eagle":[144],"Optimizer":[145],"(FY-GEO)":[146],"feature":[148,154],"selection.":[149],"Then,":[150],"DR":[151],"selected":[155],"done":[158],"LSK-PCA":[161],"model.":[162],"Finally,":[163],"reduced":[165],"given":[168],"as":[169,179],"classifier":[174],"classifying":[176],"attacked":[180],"normal":[182],"data.":[183],"As":[184],"final":[186],"point,":[187],"experimental":[188],"performed":[191],"performance":[193],"metrics":[194],"like":[195],"precision":[196],"(PR),":[197],"recall":[198],"(RC),":[199],"f-score":[200],"(FS),":[201],"accuracy":[202],"(AC),":[203],"false":[204],"alarm":[205],"rate":[206],"(FAR)":[207],"computational":[209],"time":[210],"(CT).":[211],"results":[213],"proved":[214],"proposed":[217],"work":[218],"detects":[219],"compared":[222],"state-of-art":[224],"techniques.":[225]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
