{"id":"https://openalex.org/W4412818496","doi":"https://doi.org/10.32604/cmc.2025.064777","title":"A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems","display_name":"A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412818496","doi":"https://doi.org/10.32604/cmc.2025.064777"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064777","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064777","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064777","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013769421","display_name":"Chaimae Hazman","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chaimae Hazman","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020327376","display_name":"Azidine Guezzaz","orcid":"https://orcid.org/0000-0003-1058-5420"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Azidine Guezzaz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055417610","display_name":"Said Benkirane","orcid":"https://orcid.org/0000-0001-7095-4502"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Said Benkirane","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074519527","display_name":"Mourade Azrour","orcid":"https://orcid.org/0000-0003-1575-8140"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mourade Azrour","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011424599","display_name":"Vinayakumar Ravi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vinayakumar Ravi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5080301909","display_name":"Abdulatif Alabdulatif","orcid":"https://orcid.org/0000-0003-0646-5872"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdulatif Alabdulatif","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5013769421"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8651704,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"85","issue":"1","first_page":"301","last_page":"329"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9704999923706055,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9589999914169312,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7896808385848999},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7453762888908386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4918520450592041},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.48523378372192383},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4093478322029114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3788050711154938},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2065565288066864},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07752329111099243}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7896808385848999},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7453762888908386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4918520450592041},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.48523378372192383},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4093478322029114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3788050711154938},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2065565288066864},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07752329111099243},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064777","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064777","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064777","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064777","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1978228161","https://openalex.org/W2345242196","https://openalex.org/W2783047817","https://openalex.org/W2800788706","https://openalex.org/W2889165715","https://openalex.org/W2919021187","https://openalex.org/W2926701059","https://openalex.org/W3047314667","https://openalex.org/W3120036043","https://openalex.org/W3135168234","https://openalex.org/W3142044733","https://openalex.org/W3185849980","https://openalex.org/W3210385920","https://openalex.org/W3216768217","https://openalex.org/W4205210614","https://openalex.org/W4205352200","https://openalex.org/W4206101301","https://openalex.org/W4220886040","https://openalex.org/W4225289891","https://openalex.org/W4297152848","https://openalex.org/W4309836412","https://openalex.org/W4318476511","https://openalex.org/W4318486183","https://openalex.org/W4385723714","https://openalex.org/W4386386840","https://openalex.org/W4386741428","https://openalex.org/W4388036504","https://openalex.org/W4388453755","https://openalex.org/W4391097179","https://openalex.org/W4391099793","https://openalex.org/W4391677521","https://openalex.org/W4391707534","https://openalex.org/W4392661227","https://openalex.org/W4392865184","https://openalex.org/W4393902163","https://openalex.org/W4394862991","https://openalex.org/W4396768380","https://openalex.org/W4399198942","https://openalex.org/W4399555306","https://openalex.org/W4401232222","https://openalex.org/W4404090963","https://openalex.org/W4406230518","https://openalex.org/W4408592258"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"Attacks":[0],"are":[1],"growing":[2],"more":[3],"complex":[4],"and":[5,38,57,78,101,105,154,160,167],"dangerous":[6],"as":[7,21],"network":[8,46,64,86],"capabilities":[9],"improve":[10],"at":[11],"a":[12,69,92,95],"rapid":[13],"pace.":[14],"Network":[15],"intrusion":[16,47,54,87,112],"detection":[17,55,88,113,156],"is":[18,49,67,91,143],"usually":[19],"regarded":[20],"an":[22,50,115],"efficient":[23],"means":[24],"of":[25,43,53,71,94,98,118,129,175],"dealing":[26],"with":[27],"security":[28],"attacks.":[29],"Many":[30],"ways":[31],"have":[32],"been":[33],"presented,":[34],"utilizing":[35],"various":[36],"strategies":[37],"focusing":[39],"on":[40,62,110],"different":[41],"types":[42],"visitors.":[44],"Anomaly-based":[45],"monitoring":[48],"essential":[51],"area":[52],"investigation":[56],"development.":[58],"Despite":[59,80],"extensive":[60],"research":[61,83,96,137,165,169,184],"anomaly-based":[63,85,111],"detection,":[65],"there":[66,90],"still":[68],"lack":[70],"comprehensive":[72],"literature":[73,120],"reviews":[74],"covering":[75],"current":[76],"methodologies":[77,100],"datasets.":[79,102,161],"the":[81,126,130,147,176,187],"substantial":[82],"into":[84],"algorithms,":[89],"dearth":[93],"evaluation":[97],"new":[99],"We":[103,162],"explore":[104],"evaluate":[106],"50":[107],"highest":[108],"publications":[109],"using":[114],"in-depth":[116],"review":[117],"related":[119],"techniques.":[121],"Our":[122,141],"work":[123],"thoroughly":[124],"explores":[125],"technological":[127],"environment":[128],"subject":[131],"in":[132,138],"order":[133],"to":[134],"help":[135],"future":[136],"this":[139],"sector.":[140],"examination":[142],"carried":[144],"out":[145],"from":[146,171],"relevant":[148],"angles:":[149],"application":[150],"areas,":[151],"data":[152],"preprocessing":[153],"threat":[155],"approaches,":[157],"assessment":[158],"measures,":[159],"select":[163],"unresolved":[164],"difficulties":[166],"underexplored":[168],"areas":[170,185],"every":[172],"viewpoint":[173],"recommendation":[174],"study.":[177],"Finally,":[178],"we":[179],"outline":[180],"five":[181],"potentially":[182],"increased":[183],"for":[186],"future.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
