{"id":"https://openalex.org/W4386070114","doi":"https://doi.org/10.3233/jifs-233575","title":"Hybrid intrusion detection model for Internet of Things (IoT) network environment","display_name":"Hybrid intrusion detection model for Internet of Things (IoT) network environment","publication_year":2023,"publication_date":"2023-08-22","ids":{"openalex":"https://openalex.org/W4386070114","doi":"https://doi.org/10.3233/jifs-233575"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-233575","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-233575","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083060281","display_name":"S. Rajarajan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Rajarajan","raw_affiliation_strings":["Department of Computer Science and Engineering, Kings College of Engineering, Punalkulam, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Kings College of Engineering, Punalkulam, Tamilnadu, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082887355","display_name":"M. Kavitha","orcid":"https://orcid.org/0000-0002-0214-2948"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"M.G. Kavitha","raw_affiliation_strings":["Department of Computer Science and Engineering, University College of Engineering, Pattukkottai, Rajamadam, Thanjavur, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University College of Engineering, Pattukkottai, Rajamadam, Thanjavur, Tamilnadu, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083060281"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49412103,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"45","issue":"5","first_page":"7827","last_page":"7840"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8778172135353088},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8048845529556274},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6760557889938354},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5630598068237305},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5137115716934204},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4812031388282776},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4668138027191162},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4586617350578308},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.444189190864563},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38649454712867737},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3151346743106842},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09092691540718079}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8778172135353088},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8048845529556274},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6760557889938354},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5630598068237305},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5137115716934204},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4812031388282776},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4668138027191162},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4586617350578308},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.444189190864563},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38649454712867737},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3151346743106842},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09092691540718079},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-233575","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-233575","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2557450880","https://openalex.org/W2806697149","https://openalex.org/W2911505293","https://openalex.org/W2921134108","https://openalex.org/W2923817828","https://openalex.org/W2929049293","https://openalex.org/W2955014922","https://openalex.org/W2990495437","https://openalex.org/W2998722477","https://openalex.org/W3003685271","https://openalex.org/W3086410687","https://openalex.org/W3086698253","https://openalex.org/W3131438039","https://openalex.org/W3135011374","https://openalex.org/W3154485088","https://openalex.org/W3175217968","https://openalex.org/W3179240416","https://openalex.org/W3189826552","https://openalex.org/W3192519096","https://openalex.org/W3195027245","https://openalex.org/W3196743383","https://openalex.org/W3204466840","https://openalex.org/W3213644780","https://openalex.org/W3217748719","https://openalex.org/W4205599972","https://openalex.org/W4205943221","https://openalex.org/W4206739656","https://openalex.org/W4206773083","https://openalex.org/W4210260155","https://openalex.org/W4213182863","https://openalex.org/W4214629996","https://openalex.org/W4214752923","https://openalex.org/W4224126807","https://openalex.org/W4224331011","https://openalex.org/W4226125749","https://openalex.org/W4229459202","https://openalex.org/W4283215393","https://openalex.org/W4284683049","https://openalex.org/W4285106051","https://openalex.org/W4285127639","https://openalex.org/W4285294415","https://openalex.org/W4286373821","https://openalex.org/W4288391281","https://openalex.org/W4292004502","https://openalex.org/W4296019153","https://openalex.org/W4307021520","https://openalex.org/W4312847977","https://openalex.org/W4313180313","https://openalex.org/W4320008781","https://openalex.org/W4365815661","https://openalex.org/W4367047386","https://openalex.org/W4380574979"],"related_works":["https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4285201139","https://openalex.org/W2122022187","https://openalex.org/W2115529843"],"abstract_inverted_index":{"Technology":[0],"development":[1],"brought":[2],"numerous":[3,57,87],"lifestyle":[4],"changes.":[5],"People":[6],"move":[7],"around":[8],"with":[9,266],"smart":[10,39],"gadgets":[11],"and":[12,19,31,93,99,113,226,262,280],"devices":[13,34,77],"in":[14,56,103,120,128,146,175,185,203,311,317],"the":[15,70,82,121,143,167,179,224,236,242,264,308,318],"home,":[16],"work":[17],"environment,":[18],"familiar":[20],"places.":[21],"The":[22,49,148,217,285],"Internet":[23],"acts":[24],"as":[25,44],"a":[26,38,194,206],"backbone":[27],"for":[28],"all":[29],"applications":[30],"connecting":[32],"multiple":[33,132,191,215],"to":[35,64,74,80,90,110,141,213,247,259],"set":[36],"up":[37],"environment":[40],"is":[41,72,199,211,305],"technically":[42],"termed":[43],"IoT":[45,53,76,85,104,150,319],"(Internet":[46],"of":[47,52,156,181,292,300,315],"Things).":[48],"feature":[50],"merits":[51],"are":[54,78,118,221,230,239],"explored":[55],"fields":[58],"from":[59],"simple":[60],"psychical":[61],"data":[62,67,152],"measurement":[63],"complex":[65],"trajectory":[66],"measurement.":[68],"Where":[69],"place":[71],"inaccessible":[73],"humans,":[75],"used":[79],"analyze":[81],"region.":[83],"Though":[84],"provides":[86],"benefits,":[88],"due":[89,109],"its":[91],"size":[92],"energy":[94],"limitations,":[95],"it":[96],"faces":[97],"security":[98],"privacy":[100],"issues.":[101],"Intrusions":[102],"networks":[105],"have":[106],"become":[107],"common":[108],"these":[111],"limitations":[112],"various":[114],"intrusion":[115,144,186,219],"detection":[116,135,187,250,290,303],"methods":[117,126,169],"introduced":[119],"past":[122],"decade.":[123],"Existing":[124],"learning-based":[125],"lag":[127],"performance":[129,180,304],"while":[130,170],"detecting":[131,171,190,312],"attacks.":[133,216],"Conventional":[134],"models":[136,184],"could":[137,161],"not":[138,162],"be":[139,163],"able":[140],"detect":[142,214],"type":[145],"detail.":[147],"diverse":[149],"network":[151],"has":[153],"several":[154,313],"types":[155,314],"high":[157],"dimensional":[158],"features":[159,220,229,238],"which":[160],"effectively":[164],"processed":[165],"by":[166,307],"conventional":[168,295],"intrusions.":[172],"Recently":[173],"improvements":[174],"learning":[176,183,197,209],"strategies":[177],"proved":[178],"deep":[182,196,208],"systems.":[188],"However,":[189],"attacks":[192],"using":[193,241],"single":[195],"model":[198,210,253,287,310],"quite":[200],"complex.":[201],"Thus,":[202],"this":[204],"research":[205],"multi":[207],"presented":[212],"initial":[218],"extracted":[222],"through":[223,232],"AlexNet,":[225],"then":[227],"essential":[228],"selected":[231,237],"bidirectional":[233],"LSTM.":[234],"Finally,":[235],"classified":[240],"decision":[243],"tree":[244],"C5.0":[245],"algorithm":[246],"attain":[248],"better":[249],"accuracy.":[251],"Proposed":[252],"experimentations":[254],"include":[255],"benchmark":[256],"NSL-KDD":[257],"dataset":[258],"verify":[260],"performances":[261],"compared":[263],"results":[265],"existing":[267],"IDSs":[268],"based":[269],"on":[270],"DeepNet,":[271],"Multi-CNN,":[272],"Auto":[273],"Encoder,":[274],"Gaussian":[275],"mixture,":[276],"Generative":[277],"adversarial":[278],"Network,":[279],"Convolutional":[281],"Neural":[282],"Network":[283],"models.":[284],"proposed":[286,309],"attained":[288,306],"maximum":[289],"accuracy":[291],"98.8%":[293],"over":[294],"methods.":[296],"Overall,":[297],"an":[298],"average":[299],"15%":[301],"improved":[302],"intrusions":[316],"network.":[320]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-01-30T23:17:42.513302","created_date":"2025-10-10T00:00:00"}
