{"id":"https://openalex.org/W4415684171","doi":"https://doi.org/10.3390/jcp5040090","title":"AI-Powered Security for IoT Ecosystems: A Hybrid Deep Learning Approach to Anomaly Detection","display_name":"AI-Powered Security for IoT Ecosystems: A Hybrid Deep Learning Approach to Anomaly Detection","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W4415684171","doi":"https://doi.org/10.3390/jcp5040090"},"language":"en","primary_location":{"id":"doi:10.3390/jcp5040090","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5040090","pdf_url":"https://www.mdpi.com/2624-800X/5/4/90/pdf?version=1761531658","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/5/4/90/pdf?version=1761531658","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109384056","display_name":"Deepak Kumar","orcid":"https://orcid.org/0009-0009-2137-0864"},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Deepak Kumar","raw_affiliation_strings":["Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"],"raw_orcid":"https://orcid.org/0009-0009-2137-0864","affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA","institution_ids":["https://openalex.org/I276309446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112340023","display_name":"Priyanka Pramod Pawar","orcid":"https://orcid.org/0009-0000-5606-0019"},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Priyanka Pramod Pawar","raw_affiliation_strings":["Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"],"raw_orcid":"https://orcid.org/0009-0000-5606-0019","affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA","institution_ids":["https://openalex.org/I276309446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094046167","display_name":"Santosh Reddy Addula","orcid":"https://orcid.org/0009-0000-3286-8224"},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Santosh Reddy Addula","raw_affiliation_strings":["Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"],"raw_orcid":"https://orcid.org/0009-0000-3286-8224","affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA","institution_ids":["https://openalex.org/I276309446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115680580","display_name":"Mohan Kumar Meesala","orcid":null},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohan Kumar Meesala","raw_affiliation_strings":["Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"],"raw_orcid":"https://orcid.org/0009-0002-3585-5060","affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA","institution_ids":["https://openalex.org/I276309446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013329552","display_name":"Oludotun Oni","orcid":null},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Oludotun Oni","raw_affiliation_strings":["Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"],"raw_orcid":"https://orcid.org/0009-0003-1603-7166","affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA","institution_ids":["https://openalex.org/I276309446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120106623","display_name":"Qasim Naveed Cheema","orcid":null},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qasim Naveed Cheema","raw_affiliation_strings":["Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA","institution_ids":["https://openalex.org/I276309446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008121445","display_name":"Anwar Ul Haq","orcid":"https://orcid.org/0000-0003-2319-5624"},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anwar Ul Haq","raw_affiliation_strings":["Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA","institution_ids":["https://openalex.org/I276309446"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043617254","display_name":"Guna Sekhar Sajja","orcid":"https://orcid.org/0000-0003-0327-2450"},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guna Sekhar Sajja","raw_affiliation_strings":["Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"],"raw_orcid":"https://orcid.org/0000-0003-0327-2450","affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA","institution_ids":["https://openalex.org/I276309446"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5109384056"],"corresponding_institution_ids":["https://openalex.org/I276309446"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":24.7582,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.99541354,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"5","issue":"4","first_page":"90","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7465999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7465999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.034699998795986176,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.029200000688433647,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7681000232696533},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6567999720573425},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6424000263214111},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6111999750137329},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5857999920845032},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.5680000185966492},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5633000135421753},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.3799000084400177}],"concepts":[{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7681000232696533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7318999767303467},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7038999795913696},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6567999720573425},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6424000263214111},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6111999750137329},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5866000056266785},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5857999920845032},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.5680000185966492},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5633000135421753},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.3799000084400177},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.37630000710487366},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34769999980926514},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.33550000190734863},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.33160001039505005},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.31279999017715454},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3037000000476837},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.26190000772476196},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.2597000002861023},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2563000023365021}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp5040090","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5040090","pdf_url":"https://www.mdpi.com/2624-800X/5/4/90/pdf?version=1761531658","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b64edd2166e043aa92f167f49dda894d","is_oa":true,"landing_page_url":"https://doaj.org/article/b64edd2166e043aa92f167f49dda894d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 5, Iss 4, p 90 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp5040090","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5040090","pdf_url":"https://www.mdpi.com/2624-800X/5/4/90/pdf?version=1761531658","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415684171.pdf","grobid_xml":"https://content.openalex.org/works/W4415684171.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W3160282572","https://openalex.org/W4306645406","https://openalex.org/W4308325353","https://openalex.org/W4313216104","https://openalex.org/W4316658585","https://openalex.org/W4318567011","https://openalex.org/W4319663699","https://openalex.org/W4322588479","https://openalex.org/W4353110502","https://openalex.org/W4378228743","https://openalex.org/W4379382413","https://openalex.org/W4380271734","https://openalex.org/W4387752614","https://openalex.org/W4389066454","https://openalex.org/W4391099793","https://openalex.org/W4392655974","https://openalex.org/W4392716258","https://openalex.org/W4399563464","https://openalex.org/W4400431155","https://openalex.org/W4400772165"],"related_works":[],"abstract_inverted_index":{"The":[0,73,108],"rapid":[1],"expansion":[2],"of":[3,6,151],"the":[4,37,47,79,149],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9],"introduced":[10],"new":[11],"vulnerabilities":[12],"that":[13,61],"traditional":[14],"security":[15,48],"mechanisms":[16],"often":[17],"fail":[18],"to":[19,28,131],"address":[20],"effectively.":[21],"Signature-based":[22],"intrusion":[23,164],"detection":[24,59,165],"systems":[25],"cannot":[26],"adapt":[27],"zero-day":[29],"attacks,":[30],"while":[31],"rule-based":[32],"solutions":[33],"lack":[34],"scalability":[35],"for":[36,50,84,101,160],"diverse":[38],"and":[39,67,122,144,162],"high-volume":[40],"traffic":[41],"in":[42,92,166],"IoT":[43,167],"environments.":[44],"To":[45,88],"strengthen":[46],"framework":[49,113],"IoT,":[51],"this":[52],"paper":[53],"proposes":[54],"a":[55],"deep":[56,134,154],"learning-based":[57],"anomaly":[58],"approach":[60],"integrates":[62],"Convolutional":[63],"Neural":[64],"Networks":[65,99],"(CNNs)":[66],"Bidirectional":[68],"Gated":[69],"Recurrent":[70],"Units":[71],"(BiGRUs).":[72],"model":[74],"is":[75,114],"further":[76],"optimized":[77],"using":[78],"Moth\u2013Flame":[80],"Optimization":[81],"(MFO)":[82],"algorithm":[83],"automated":[85],"hyperparameter":[86],"tuning.":[87],"mitigate":[89],"class":[90],"imbalance":[91],"benchmark":[93],"datasets,":[94,120],"we":[95],"employ":[96],"Generative":[97],"Adversarial":[98],"(GANs)":[100],"synthetic":[102],"sample":[103],"generation":[104],"alongside":[105],"Z-score":[106],"normalization.":[107],"proposed":[109],"CNN\u2013BiGRU":[110],"+":[111],"MFO":[112],"evaluated":[115],"on":[116],"two":[117],"widely":[118],"used":[119],"UNSW-NB15":[121],"UCI":[123],"SECOM.":[124],"Experimental":[125],"results":[126],"demonstrate":[127],"superior":[128],"performance":[129],"compared":[130],"several":[132],"baseline":[133],"learning":[135,155],"models,":[136],"achieving":[137],"improvements":[138],"across":[139],"accuracy,":[140],"precision,":[141],"recall,":[142],"F1-score,":[143],"ROC\u2013AUC.":[145],"These":[146],"findings":[147],"highlight":[148],"potential":[150],"combining":[152],"hybrid":[153],"architectures":[156],"with":[157],"evolutionary":[158],"optimization":[159],"effective":[161],"generalizable":[163],"systems.":[168]},"counts_by_year":[{"year":2026,"cited_by_count":15},{"year":2025,"cited_by_count":5}],"updated_date":"2026-05-15T08:27:34.491423","created_date":"2025-10-30T00:00:00"}
