{"id":"https://openalex.org/W4412040088","doi":"https://doi.org/10.32604/cmc.2025.064903","title":"Intrusion Detection in Internet of Medical Things Using Digital Twins\u2014A Review","display_name":"Intrusion Detection in Internet of Medical Things Using Digital Twins\u2014A Review","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412040088","doi":"https://doi.org/10.32604/cmc.2025.064903"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064903","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064903","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064903","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090751288","display_name":"Tony Thomas","orcid":"https://orcid.org/0000-0002-9323-6607"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tony Thomas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101965020","display_name":"Ravi Prakash","orcid":"https://orcid.org/0000-0002-1582-9992"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ravi Prakash","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5058834253","display_name":"Soumya Pal","orcid":"https://orcid.org/0009-0008-7226-356X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Soumya Pal","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090751288"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2673768,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"3","first_page":"4055","last_page":"4104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.8026000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.8026000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.76419997215271,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7437000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7816663980484009},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6052801012992859},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5693076848983765},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46177589893341064},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42200398445129395},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36197859048843384}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7816663980484009},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6052801012992859},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5693076848983765},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46177589893341064},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42200398445129395},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36197859048843384}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064903","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064903","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064903","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064903","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":74,"referenced_works":["https://openalex.org/W2897514040","https://openalex.org/W2900990205","https://openalex.org/W2903563006","https://openalex.org/W2907713773","https://openalex.org/W2910597635","https://openalex.org/W2964286826","https://openalex.org/W3014777329","https://openalex.org/W3030475315","https://openalex.org/W3033120446","https://openalex.org/W3036600965","https://openalex.org/W3039358234","https://openalex.org/W3080400611","https://openalex.org/W3082435965","https://openalex.org/W3085955590","https://openalex.org/W3087990969","https://openalex.org/W3090999122","https://openalex.org/W3110885177","https://openalex.org/W3112130234","https://openalex.org/W3112314931","https://openalex.org/W3115913152","https://openalex.org/W3119595909","https://openalex.org/W3121075487","https://openalex.org/W3129674742","https://openalex.org/W3132973698","https://openalex.org/W3137711069","https://openalex.org/W3138690829","https://openalex.org/W3163246710","https://openalex.org/W3165327452","https://openalex.org/W3190323067","https://openalex.org/W3192892322","https://openalex.org/W3205446974","https://openalex.org/W3217414520","https://openalex.org/W4206181355","https://openalex.org/W4210420819","https://openalex.org/W4210702679","https://openalex.org/W4213148913","https://openalex.org/W4225657853","https://openalex.org/W4281750882","https://openalex.org/W4282924988","https://openalex.org/W4283160390","https://openalex.org/W4285030518","https://openalex.org/W4285111246","https://openalex.org/W4285176026","https://openalex.org/W4285196457","https://openalex.org/W4295046679","https://openalex.org/W4307640836","https://openalex.org/W4312349588","https://openalex.org/W4312376363","https://openalex.org/W4317632579","https://openalex.org/W4319599614","https://openalex.org/W4367840585","https://openalex.org/W4375851235","https://openalex.org/W4378469732","https://openalex.org/W4379409107","https://openalex.org/W4382364219","https://openalex.org/W4385462766","https://openalex.org/W4386275796","https://openalex.org/W4387189847","https://openalex.org/W4387917942","https://openalex.org/W4390533386","https://openalex.org/W4391138980","https://openalex.org/W4392120324","https://openalex.org/W4392173895","https://openalex.org/W4392400412","https://openalex.org/W4394699061","https://openalex.org/W4396594852","https://openalex.org/W4399389941","https://openalex.org/W4401210511","https://openalex.org/W4401295443","https://openalex.org/W4401862003","https://openalex.org/W4402035331","https://openalex.org/W4403312039","https://openalex.org/W4407003114","https://openalex.org/W4407736244"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261"],"abstract_inverted_index":{"The":[0,26],"Internet":[1],"of":[2,28,35,95,203],"Medical":[3],"Things":[4],"(IoMT)":[5],"is":[6],"transforming":[7],"healthcare":[8,58],"by":[9,158],"enabling":[10],"real-time":[11],"data":[12],"collection,":[13],"analysis,":[14],"and":[15,24,38,70,93,112,117,131,150,162,183,205,211,221],"personalized":[16],"treatment":[17],"through":[18],"interconnected":[19],"devices":[20],"such":[21],"as":[22,79],"sensors":[23],"wearables.":[25],"integration":[27],"Digital":[29],"Twins":[30,149],"(DTs),":[31],"the":[32,50,57,91,109,114,123,146,201,215,222],"virtual":[33],"replicas":[34],"physical":[36],"components":[37],"processes,":[39],"has":[40],"also":[41,179],"been":[42],"found":[43,156],"to":[44,67,107,120,134,142,186],"be":[45],"a":[46,80,104,171,181,197],"game":[47],"changer":[48],"for":[49,174,219],"ever-evolving":[51],"IoMT.":[52,192],"However,":[53],"these":[54],"advancements":[55],"in":[56,122,152,165,191,207],"domain":[59],"come":[60],"with":[61,90,145],"significant":[62],"cybersecurity":[63],"challenges,":[64],"exposing":[65],"it":[66],"malicious":[68],"attacks":[69],"several":[71],"security":[72,189],"threats.":[73],"Intrusion":[74],"Detection":[75],"Systems":[76],"(IDSs)":[77],"serve":[78],"critical":[81],"defense":[82],"mechanism,":[83],"yet":[84],"traditional":[85],"IDS":[86,121,151,204],"approaches":[87],"often":[88],"struggle":[89],"complexity":[92],"scale":[94],"IoMT":[96,124,209],"networks.":[97],"With":[98],"this":[99,101,194],"context,":[100],"paper":[102],"follows":[103],"systematic":[105],"approach":[106,185],"analyze":[108],"existing":[110],"literature":[111],"highlight":[113],"current":[115],"trends":[116],"challenges":[118],"related":[119],"domain.":[125],"We":[126],"leveraged":[127],"techniques":[128],"like":[129],"bibliographic":[130],"keyword":[132],"analysis":[133],"collect":[135],"832":[136],"research":[137,217,223],"works":[138],"published":[139],"from":[140],"2007":[141],"2025,":[143],"aligned":[144],"theme":[147],"\u201cDigital":[148],"IoMT.\u201d":[153],"It":[154],"was":[155],"that":[157],"simulating":[159],"device":[160],"behaviours":[161],"network":[163],"interactions":[164],"IoMT,":[166],"DTs":[167],"not":[168],"only":[169],"provide":[170],"proactive":[172],"platform":[173],"early":[175],"threat":[176],"detection,":[177],"but":[178],"offer":[180],"scalable":[182],"adaptive":[184],"mitigating":[187],"evolving":[188],"threats":[190],"Overall,":[193],"review":[195],"provides":[196],"closer":[198],"look":[199],"into":[200],"role":[202],"DT":[206],"securing":[208],"systems":[210],"sheds":[212],"light":[213],"on":[214],"possible":[216],"directions":[218],"developers":[220],"community.":[224]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
