{"id":"https://openalex.org/W2981727205","doi":"https://doi.org/10.4018/ijdcf.2020010106","title":"A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources","display_name":"A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources","publication_year":2019,"publication_date":"2019-10-22","ids":{"openalex":"https://openalex.org/W2981727205","doi":"https://doi.org/10.4018/ijdcf.2020010106","mag":"2981727205"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2020010106","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2020010106","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=240653&isxn=9781799805793","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=240653&isxn=9781799805793","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101533567","display_name":"Chao Wu","orcid":"https://orcid.org/0000-0001-7802-8490"},"institutions":[{"id":"https://openalex.org/I4210145005","display_name":"State Key Laboratory of Vehicle NVH and Safety Technology","ror":"https://ror.org/04e6h1p91","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210145005"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Wu","raw_affiliation_strings":["Chongqing Vehicle Test & Research Institute Co. Ltd., Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Chongqing Vehicle Test & Research Institute Co. Ltd., Chongqing, China","institution_ids":["https://openalex.org/I4210145005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020422392","display_name":"Yuanan Liu","orcid":"https://orcid.org/0000-0002-8076-1904"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan'an Liu","raw_affiliation_strings":["School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100676495","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0002-1286-7141"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Wu","raw_affiliation_strings":["School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100415324","display_name":"Feng Liu","orcid":"https://orcid.org/0000-0003-1493-5352"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Feng Liu","raw_affiliation_strings":["SKLOIS, IIE & SCS UCAS, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, IIE & SCS UCAS, CAS, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055674410","display_name":"Hui L\u00fc","orcid":"https://orcid.org/0000-0002-0084-9229"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210119392","display_name":"Institute of Microelectronics","ror":"https://ror.org/02s6gs133","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210119392"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Lu","raw_affiliation_strings":["Institute of Microelectronics of the Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Microelectronics of the Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210119392","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065601551","display_name":"Wenhao Fan","orcid":"https://orcid.org/0000-0001-5288-8708"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao Fan","raw_affiliation_strings":["School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102968225","display_name":"Bihua Tang","orcid":"https://orcid.org/0009-0005-3588-0671"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bihua Tang","raw_affiliation_strings":["School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101533567"],"corresponding_institution_ids":["https://openalex.org/I4210145005"],"apc_list":null,"apc_paid":null,"fwci":1.4858,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.84584217,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"12","issue":"1","first_page":"109","last_page":"130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8813301920890808},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7126239538192749},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.6360926628112793},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5202742218971252},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5197538733482361},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4903092682361603},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46022871136665344},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45494911074638367},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4420921206474304},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.42325127124786377},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.23904737830162048}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8813301920890808},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7126239538192749},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.6360926628112793},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5202742218971252},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5197538733482361},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4903092682361603},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46022871136665344},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45494911074638367},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4420921206474304},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.42325127124786377},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.23904737830162048},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijdcf.2020010106","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2020010106","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=240653&isxn=9781799805793","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.4018/ijdcf.2020010106","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2020010106","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=240653&isxn=9781799805793","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8100000023841858,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2981727205.pdf","grobid_xml":"https://content.openalex.org/works/W2981727205.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W21785587","https://openalex.org/W1767254378","https://openalex.org/W1990761225","https://openalex.org/W2014563571","https://openalex.org/W2026609766","https://openalex.org/W2095163644","https://openalex.org/W2107867209","https://openalex.org/W2114786478","https://openalex.org/W2119790020","https://openalex.org/W2172680137","https://openalex.org/W2219500813","https://openalex.org/W2280216943","https://openalex.org/W2286848121","https://openalex.org/W2295410963","https://openalex.org/W2370696599","https://openalex.org/W2502097841","https://openalex.org/W2514149565","https://openalex.org/W2515663847","https://openalex.org/W2562931992","https://openalex.org/W2578787300","https://openalex.org/W2579167848","https://openalex.org/W2588846793","https://openalex.org/W2590373591","https://openalex.org/W2604813584","https://openalex.org/W4252949711"],"related_works":["https://openalex.org/W2130966263","https://openalex.org/W2618984630","https://openalex.org/W4239706888","https://openalex.org/W2258115363","https://openalex.org/W2026212330","https://openalex.org/W3015150474","https://openalex.org/W2112785421","https://openalex.org/W2300334320","https://openalex.org/W2774921354","https://openalex.org/W3197486744"],"abstract_inverted_index":{"Network":[0],"security":[1],"and":[2,26,38,53,59,61,87,121],"network":[3,24,37],"forensics":[4],"technologies":[5],"for":[6,91],"the":[7,35,73,104,116,131],"Internet":[8],"of":[9,51,99,106,133],"Things":[10],"(IoT)":[11],"need":[12],"special":[13],"consideration":[14],"due":[15],"to":[16,33,102],"resource-constraints.":[17],"Cybercrimes":[18],"conducted":[19,111,136],"in":[20,72,96],"IoT":[21,36],"focus":[22],"on":[23,112],"information":[25],"energy":[27,128],"sources.":[28],"Graph":[29],"theory":[30],"is":[31,45,70,94],"adopted":[32],"analyze":[34],"a":[39,97],"hybrid":[40,48,117],"Intrusion":[41],"Detection":[42,57],"System":[43],"(IDS)":[44],"proposed.":[46],"The":[47],"IDS":[49,118],"consists":[50],"Centralized":[52],"Active":[54],"Malicious":[55],"Node":[56],"(CAMD)":[58],"Distributed":[60],"Passive":[62],"EEA":[63,107,134],"(Energy":[64],"Exhaustion":[65],"Attack)":[66],"Resistance":[67],"(DPER).":[68],"CAMD":[69,79],"integrated":[71],"genetic":[74],"algorithm-based":[75],"data":[76],"gathering":[77],"scheme.":[78],"detects":[80],"malicious":[81,123],"nodes":[82,124],"manipulated":[83],"by":[84,137],"cyber":[85,138],"criminals":[86,139],"provides":[88],"digital":[89],"evidence":[90],"forensics.":[92],"DPER":[93],"implemented":[95],"set":[98],"communication":[100],"protocols":[101],"alleviate":[103],"impact":[105,132],"attacks.":[108],"Simulation":[109],"experiments":[110],"NS-3":[113],"platform":[114],"showed":[115],"proposed":[119],"detected":[120],"traced":[122],"precisely":[125],"without":[126],"compromising":[127],"efficiency.":[129],"Besides,":[130],"attacks":[135],"was":[140],"effectively":[141],"alleviated.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
