{"id":"https://openalex.org/W4414181778","doi":"https://doi.org/10.3390/computation13090222","title":"An Integrated Hybrid Deep Learning Framework for Intrusion Detection in IoT and IIoT Networks Using CNN-LSTM-GRU Architecture","display_name":"An Integrated Hybrid Deep Learning Framework for Intrusion Detection in IoT and IIoT Networks Using CNN-LSTM-GRU Architecture","publication_year":2025,"publication_date":"2025-09-14","ids":{"openalex":"https://openalex.org/W4414181778","doi":"https://doi.org/10.3390/computation13090222"},"language":"en","primary_location":{"id":"doi:10.3390/computation13090222","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computation13090222","pdf_url":"https://www.mdpi.com/2079-3197/13/9/222/pdf?version=1757858297","source":{"id":"https://openalex.org/S2738402919","display_name":"Computation","issn_l":"2079-3197","issn":["2079-3197"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computation","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2079-3197/13/9/222/pdf?version=1757858297","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115837051","display_name":"Doaa Mohsin Abd Ali Afraji","orcid":"https://orcid.org/0000-0002-5419-2242"},"institutions":[{"id":"https://openalex.org/I15873915","display_name":"Mustansiriyah University","ror":"https://ror.org/05s04wy35","country_code":"IQ","type":"education","lineage":["https://openalex.org/I15873915"]},{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES","IQ"],"is_corresponding":false,"raw_author_name":"Doaa Mohsin Abd Ali Afraji","raw_affiliation_strings":["Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, 46022 Valencia, Spain","Department of Computer Science, College of Education, Mustansiriyah University, Baghdad 10052, Iraq"],"raw_orcid":"https://orcid.org/0000-0002-5419-2242","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, 46022 Valencia, Spain","institution_ids":["https://openalex.org/I60053951"]},{"raw_affiliation_string":"Department of Computer Science, College of Education, Mustansiriyah University, Baghdad 10052, Iraq","institution_ids":["https://openalex.org/I15873915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061267204","display_name":"Jaime Lloret","orcid":"https://orcid.org/0000-0002-0862-0533"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Jaime Lloret","raw_affiliation_strings":["Integrated Management Coastal Zones Research Institute, Universitat Polit\u00e8cnica de Val\u00e8ncia, 46022 Valencia, Spain"],"raw_orcid":"https://orcid.org/0000-0002-0862-0533","affiliations":[{"raw_affiliation_string":"Integrated Management Coastal Zones Research Institute, Universitat Polit\u00e8cnica de Val\u00e8ncia, 46022 Valencia, Spain","institution_ids":["https://openalex.org/I60053951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012725759","display_name":"Lourdes Pe\u00f1alver","orcid":"https://orcid.org/0000-0002-0403-7770"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Lourdes Pe\u00f1alver","raw_affiliation_strings":["Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, 46022 Valencia, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, 46022 Valencia, Spain","institution_ids":["https://openalex.org/I60053951"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061267204"],"corresponding_institution_ids":["https://openalex.org/I60053951"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":12.165,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.98556985,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"13","issue":"9","first_page":"222","last_page":"222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5824000239372253},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4894999861717224},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.46160000562667847},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.453000009059906},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.3840999901294708},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3725999891757965},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.358599990606308},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3521000146865845},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.34279999136924744},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.3409999907016754}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.772599995136261},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6442999839782715},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5824000239372253},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4894999861717224},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47530001401901245},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47510001063346863},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.46160000562667847},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.453000009059906},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.3840999901294708},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3725999891757965},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.358599990606308},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3521000146865845},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.34279999136924744},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.3409999907016754},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.31940001249313354},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3188000023365021},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.3142000138759613},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.3133000135421753},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.31060001254081726},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.30640000104904175},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.29420000314712524},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.267300009727478},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.2612000107765198},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computation13090222","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computation13090222","pdf_url":"https://www.mdpi.com/2079-3197/13/9/222/pdf?version=1757858297","source":{"id":"https://openalex.org/S2738402919","display_name":"Computation","issn_l":"2079-3197","issn":["2079-3197"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computation","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:98aad16249544d5eacb8f1499f5d47cb","is_oa":true,"landing_page_url":"https://doaj.org/article/98aad16249544d5eacb8f1499f5d47cb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computation, Vol 13, Iss 9, p 222 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computation13090222","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computation13090222","pdf_url":"https://www.mdpi.com/2079-3197/13/9/222/pdf?version=1757858297","source":{"id":"https://openalex.org/S2738402919","display_name":"Computation","issn_l":"2079-3197","issn":["2079-3197"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computation","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334905","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414181778.pdf","grobid_xml":"https://content.openalex.org/works/W4414181778.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W2110916815","https://openalex.org/W2749908420","https://openalex.org/W2986055611","https://openalex.org/W3016010691","https://openalex.org/W3017323935","https://openalex.org/W3039274670","https://openalex.org/W3090111074","https://openalex.org/W3110770815","https://openalex.org/W3116720533","https://openalex.org/W3126796721","https://openalex.org/W3129311377","https://openalex.org/W3141567114","https://openalex.org/W3158278422","https://openalex.org/W3160611354","https://openalex.org/W3164964481","https://openalex.org/W3169330763","https://openalex.org/W3184937774","https://openalex.org/W3196438265","https://openalex.org/W4205573447","https://openalex.org/W4213168906","https://openalex.org/W4214590076","https://openalex.org/W4286543372","https://openalex.org/W4286829109","https://openalex.org/W4295788744","https://openalex.org/W4306827119","https://openalex.org/W4307299901","https://openalex.org/W4315781229","https://openalex.org/W4365149444","https://openalex.org/W4366750230","https://openalex.org/W4383223729","https://openalex.org/W4383619745","https://openalex.org/W4384787750","https://openalex.org/W4386484284","https://openalex.org/W4388638017","https://openalex.org/W4389313879","https://openalex.org/W4390659333","https://openalex.org/W4391664312","https://openalex.org/W4393944762","https://openalex.org/W4400056552","https://openalex.org/W4400737507","https://openalex.org/W4401117567","https://openalex.org/W4402097291","https://openalex.org/W4402713043","https://openalex.org/W4403903525","https://openalex.org/W4405002166","https://openalex.org/W4406047340","https://openalex.org/W4406193150","https://openalex.org/W4412038333"],"related_works":[],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,90],"systems":[2],"(IDSs)":[3],"are":[4,24,108],"critical":[5],"for":[6,146,164,248],"securing":[7],"modern":[8],"networks,":[9],"particularly":[10],"in":[11,54,151,183,188],"IoT":[12],"and":[13,22,49,62,92,123,142,149,159,166,186,195,217,222,227,241],"IIoT":[14],"environments":[15],"where":[16],"traditional":[17],"defenses":[18],"such":[19],"as":[20],"firewalls":[21],"encryption":[23],"insufficient":[25],"against":[26],"evolving":[27],"cyber":[28],"threats.":[29],"This":[30],"paper":[31],"proposes":[32],"an":[33],"enhanced":[34],"hybrid":[35,71,156],"deep":[36],"learning":[37,93],"model":[38],"that":[39,173],"integrates":[40],"convolutional":[41],"neural":[42],"networks":[43],"(CNNs),":[44],"Long":[45],"Short-Term":[46],"Memory":[47],"(LSTM),":[48],"Gated":[50],"Recurrent":[51],"Units":[52],"(GRU)":[53],"a":[55,245],"multi-branch":[56],"architecture":[57,176],"designed":[58],"to":[59,101,131,231],"capture":[60],"spatial":[61],"temporal":[63],"dependencies":[64],"while":[65],"minimizing":[66],"redundant":[67],"computations.":[68],"Unlike":[69],"conventional":[70],"approaches,":[72],"the":[73,79,140,160,174,203,207],"proposed":[74,161],"parallel\u2013sequential":[75],"fusion":[76],"framework":[77],"leverages":[78],"strengths":[80],"of":[81,219],"each":[82],"component":[83],"independently":[84],"before":[85],"merging":[86],"features,":[87],"thereby":[88],"improving":[89],"granularity":[91],"efficiency.":[94],"A":[95],"rigorous":[96],"preprocessing":[97],"pipeline":[98],"is":[99,115,126,137],"employed":[100],"handle":[102],"real-world":[103],"data":[104],"challenges:":[105],"missing":[106],"values":[107],"imputed":[109],"using":[110],"median":[111],"filling,":[112],"class":[113],"imbalance":[114],"mitigated":[116],"through":[117],"SMOTE":[118],"(Synthetic":[119],"Minority":[120],"Oversampling":[121],"Technique),":[122],"feature":[124],"scaling":[125],"performed":[127],"with":[128,191,214],"Min\u2013Max":[129],"normalization":[130],"ensure":[132],"convergence":[133],"consistency.":[134],"The":[135],"methodology":[136],"validated":[138],"on":[139,202],"TON_IoT":[141],"CICIDS2017":[143,204],"dataset,":[144],"chosen":[145],"its":[147],"diversity":[148],"realism":[150],"IoT/IIoT":[152,250],"attack":[153],"scenarios.":[154],"Three":[155],"models\u2014CNN-LSTM,":[157],"CNN-GRU,":[158],"CNN-LSTM-GRU\u2014are":[162],"assessed":[163],"binary":[165,184],"multiclass":[167,189],"intrusion":[168],"detection.":[169],"Experimental":[170],"results":[171],"demonstrate":[172],"CNN-LSTM-GRU":[175],"achieves":[177],"superior":[178],"performance,":[179],"attaining":[180],"100%":[181],"accuracy":[182,213],"classification":[185],"97%":[187],"detection,":[190],"balanced":[192],"precision,":[193,215],"recall,":[194,216],"F1-scores":[196,218],"across":[197],"all":[198],"classes.":[199],"Furthermore,":[200],"evaluation":[201],"dataset":[205],"confirms":[206],"model\u2019s":[208],"generalization":[209],"ability,":[210],"achieving":[211],"99.49%":[212],"0.9954,":[220],"0.9943,":[221],"0.9949,":[223],"respectively,":[224],"outperforming":[225],"CNN-LSTM":[226],"CNN-GRU":[228],"baselines.":[229],"Compared":[230],"existing":[232],"IDS":[233],"models,":[234],"our":[235],"approach":[236],"delivers":[237],"higher":[238],"robustness,":[239],"scalability,":[240],"adaptability,":[242],"making":[243],"it":[244],"promising":[246],"candidate":[247],"next-generation":[249],"security.":[251]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
