{"id":"https://openalex.org/W4405722014","doi":"https://doi.org/10.3390/fi16120482","title":"A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks","display_name":"A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks","publication_year":2024,"publication_date":"2024-12-23","ids":{"openalex":"https://openalex.org/W4405722014","doi":"https://doi.org/10.3390/fi16120482"},"language":"en","primary_location":{"id":"doi:10.3390/fi16120482","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16120482","pdf_url":"https://www.mdpi.com/1999-5903/16/12/482/pdf?version=1734961314","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/16/12/482/pdf?version=1734961314","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105080647","display_name":"Mahmoud AlJamal","orcid":"https://orcid.org/0009-0007-5389-6778"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]},{"id":"https://openalex.org/I97864281","display_name":"Irbid National University","ror":"https://ror.org/00xfxvy87","country_code":"JO","type":"education","lineage":["https://openalex.org/I97864281"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mahmoud AlJamal","raw_affiliation_strings":["Department of Cybersecurity, Science and Information Technology, Irbid National University, Irbid 21110, Jordan","Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, Science and Information Technology, Irbid National University, Irbid 21110, Jordan","institution_ids":["https://openalex.org/I97864281"]},{"raw_affiliation_string":"Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092027176","display_name":"Rabee Alquran","orcid":"https://orcid.org/0009-0006-2992-5404"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Rabee Alquran","raw_affiliation_strings":["Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054700379","display_name":"Ayoub Alsarhan","orcid":"https://orcid.org/0000-0001-9075-2828"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ayoub Alsarhan","raw_affiliation_strings":["Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015923093","display_name":"Mohammad Aljaidi","orcid":"https://orcid.org/0000-0001-9486-3533"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Mohammad Aljaidi","raw_affiliation_strings":["Department of Computer Science, Faculty of Information Technology, Zarqa University, Zarqa 13110, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Information Technology, Zarqa University, Zarqa 13110, Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115619550","display_name":"Mohammad Alhmmad","orcid":null},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Alhmmad","raw_affiliation_strings":["Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056720406","display_name":"Wafa\u2019 Q. Al-Jamal","orcid":null},"institutions":[{"id":"https://openalex.org/I112982808","display_name":"Universiti Sains Islam Malaysia","ror":"https://ror.org/020ast312","country_code":"MY","type":"education","lineage":["https://openalex.org/I112982808"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Wafa\u2019 Q. Al-Jamal","raw_affiliation_strings":["Faculty of Science and Technology (FST), Universiti Sains Islam Malaysia (USIM), Nilai 71800, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and Technology (FST), Universiti Sains Islam Malaysia (USIM), Nilai 71800, Malaysia","institution_ids":["https://openalex.org/I112982808"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089704874","display_name":"Nasser Albalawi","orcid":"https://orcid.org/0000-0002-5948-4260"},"institutions":[{"id":"https://openalex.org/I118590987","display_name":"Northern Border University","ror":"https://ror.org/03j9tzj20","country_code":"SA","type":"education","lineage":["https://openalex.org/I118590987"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Nasser Albalawi","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, Northern Border University, Rafha 91911, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, Northern Border University, Rafha 91911, Saudi Arabia","institution_ids":["https://openalex.org/I118590987"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5015923093"],"corresponding_institution_ids":["https://openalex.org/I153687341"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":3.4299,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.9330665,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"16","issue":"12","first_page":"482","last_page":"482"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9131536483764648},{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.9065538644790649},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.6650144457817078},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5979908108711243},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5361153483390808},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.383872926235199},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35462599992752075},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.23172014951705933},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18428263068199158},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.10081443190574646}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9131536483764648},{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.9065538644790649},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.6650144457817078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5979908108711243},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5361153483390808},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.383872926235199},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35462599992752075},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.23172014951705933},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18428263068199158},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.10081443190574646},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/fi16120482","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16120482","pdf_url":"https://www.mdpi.com/1999-5903/16/12/482/pdf?version=1734961314","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:16:y:2024:i:12:p:482-:d:1550713","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/16/12/482/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:dc99cce936ef4e51acc784a47bb2554c","is_oa":true,"landing_page_url":"https://doaj.org/article/dc99cce936ef4e51acc784a47bb2554c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 16, Iss 12, p 482 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi16120482","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16120482","pdf_url":"https://www.mdpi.com/1999-5903/16/12/482/pdf?version=1734961314","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land","score":0.6600000262260437}],"awards":[{"id":"https://openalex.org/G5791967564","display_name":null,"funder_award_id":"NBU-FFR-2024-","funder_id":"https://openalex.org/F4320328654","funder_display_name":"Northern Border University"}],"funders":[{"id":"https://openalex.org/F4320328654","display_name":"Northern Border University","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405722014.pdf","grobid_xml":"https://content.openalex.org/works/W4405722014.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W2054692642","https://openalex.org/W2557913829","https://openalex.org/W2595077903","https://openalex.org/W2916487850","https://openalex.org/W2939745396","https://openalex.org/W2945495424","https://openalex.org/W2966395200","https://openalex.org/W3160611354","https://openalex.org/W3211805421","https://openalex.org/W4220682970","https://openalex.org/W4220985823","https://openalex.org/W4226319939","https://openalex.org/W4293065833","https://openalex.org/W4293384669","https://openalex.org/W4313378981","https://openalex.org/W4323270695","https://openalex.org/W4385368987","https://openalex.org/W4385692127","https://openalex.org/W4386264218","https://openalex.org/W4388634666","https://openalex.org/W4389051274","https://openalex.org/W4389950563","https://openalex.org/W4390481172","https://openalex.org/W4390692440","https://openalex.org/W4391941252","https://openalex.org/W4393490848","https://openalex.org/W4394941827","https://openalex.org/W4396680643","https://openalex.org/W4396853082","https://openalex.org/W4396859655","https://openalex.org/W4399264633","https://openalex.org/W4399620348","https://openalex.org/W4399800820","https://openalex.org/W4400020450","https://openalex.org/W4400416066","https://openalex.org/W4400448577","https://openalex.org/W4400579238","https://openalex.org/W4400975064","https://openalex.org/W4401164234","https://openalex.org/W4401559973","https://openalex.org/W4401996290","https://openalex.org/W4402177356","https://openalex.org/W4402261971","https://openalex.org/W4402700277","https://openalex.org/W4402794545","https://openalex.org/W4403075280","https://openalex.org/W4403685098","https://openalex.org/W4404162522","https://openalex.org/W4405059814","https://openalex.org/W6860599081","https://openalex.org/W6862201327"],"related_works":["https://openalex.org/W4366502726","https://openalex.org/W2023038964","https://openalex.org/W2075358766","https://openalex.org/W2150889667","https://openalex.org/W4392079573","https://openalex.org/W4233984944","https://openalex.org/W3190536237","https://openalex.org/W195300121","https://openalex.org/W3011343922","https://openalex.org/W2017602249"],"abstract_inverted_index":{"As":[0],"the":[1,14,36,57,70,112,136,147,154],"Internet":[2],"of":[3,44,52,69,123,150,162],"Things":[4],"(IoT)":[5],"expands":[6],"rapidly":[7],"and":[8,40,96,143,160],"5G":[9,53,105,141,155],"networks":[10,54,142],"become":[11,24],"more":[12],"widespread,":[13],"need":[15],"for":[16],"strong":[17],"cybersecurity":[18],"measures":[19],"in":[20,125],"IoT":[21,45,74,101,132,151],"systems":[22,75,102],"has":[23],"increasingly":[25],"critical.":[26],"Traditional":[27],"security":[28,66,133],"methods":[29],"are":[30],"no":[31],"longer":[32],"sufficient":[33],"due":[34],"to":[35,63,73,94],"shear":[37],"volume,":[38],"diversity,":[39],"limited":[41],"processing":[42],"capabilities":[43],"devices.":[46],"The":[47],"high":[48,120],"data":[49],"transmission":[50],"speeds":[51],"further":[55],"intensify":[56],"potential":[58],"risks,":[59],"making":[60],"it":[61],"essential":[62],"implement":[64],"effective":[65],"measures.":[67],"One":[68],"major":[71],"threats":[72],"is":[76],"Cross-Site":[77],"Scripting":[78],"(XSS)":[79],"attacks.":[80,128],"To":[81],"address":[82],"this":[83],"issue,":[84],"we":[85],"introduce":[86],"a":[87,119],"new":[88],"machine":[89],"learning":[90],"(ML)":[91],"approach":[92,117],"designed":[93],"detect":[95],"predict":[97],"XSS":[98,127,144],"attacks":[99],"on":[100],"operating":[103],"over":[104],"networks.":[106],"By":[107],"using":[108],"ML":[109],"classifiers,":[110],"particularly":[111],"Random":[113],"Forest":[114],"classifier,":[115],"our":[116],"achieves":[118],"classification":[121],"accuracy":[122],"99.89%":[124],"identifying":[126],"This":[129],"research":[130],"enhances":[131],"by":[134,140],"addressing":[135],"emerging":[137],"challenges":[138],"posed":[139],"attacks,":[145],"ensuring":[146],"safe":[148],"operation":[149],"devices":[152],"within":[153],"ecosystem":[156],"through":[157],"early":[158],"detection":[159],"prevention":[161],"vulnerabilities.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
