{"id":"https://openalex.org/W7125416780","doi":"https://doi.org/10.48550/arxiv.2601.14305","title":"An Optimized Decision Tree-Based Framework for Explainable IoT Anomaly Detection","display_name":"An Optimized Decision Tree-Based Framework for Explainable IoT Anomaly Detection","publication_year":2026,"publication_date":"2026-01-18","ids":{"openalex":"https://openalex.org/W7125416780","doi":"https://doi.org/10.48550/arxiv.2601.14305"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.14305","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.14305","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.14305","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123547268","display_name":"Ashikuzzaman","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ashikuzzaman","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123560958","display_name":"Md. Shawkat Hossain","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hossain, Md. Shawkat","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123617397","display_name":"Jubayer Abdullah Joy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Joy, Jubayer Abdullah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123630310","display_name":"Md Zahid Akon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Akon, Md Zahid","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123580025","display_name":"Md Manjur Ahmed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ahmed, Md Manjur","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5123594265","display_name":"Md. Naimul Islam","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Islam, Md. Naimul","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123547268"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.5867999792098999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.5867999792098999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.12309999763965607,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.04529999941587448,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5848000049591064},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5681999921798706},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5666000247001648},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5587999820709229},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5422999858856201},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5084999799728394},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4941999912261963},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43220001459121704},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.35249999165534973}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7527999877929688},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5848000049591064},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5681999921798706},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5666000247001648},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5587999820709229},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5422999858856201},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.522599995136261},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5084999799728394},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4941999912261963},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.474700003862381},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43220001459121704},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40790000557899475},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.35249999165534973},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32710000872612},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.323199987411499},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3208000063896179},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3019999861717224},{"id":"https://openalex.org/C5481197","wikidata":"https://www.wikidata.org/wiki/Q16766476","display_name":"Decision tree learning","level":3,"score":0.2978000044822693},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.29319998621940613},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.28299999237060547},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28189998865127563},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.2800000011920929},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.2687999904155731},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.14305","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.14305","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.14305","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.14305","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,62,111],"increase":[1],"in":[2,107,151,165,176,219,253],"the":[3,14,33,57,104,115,120,172,187,214,242],"number":[4],"of":[5,7,17,32,117,127,132,145,153,217,228,234],"Internet":[6],"Things":[8],"(IoT)":[9],"devices":[10,206],"has":[11,169],"tremendously":[12],"increased":[13],"attack":[15],"surface":[16],"cyber":[18],"threats":[19],"thus":[20,56],"making":[21],"a":[22,29,108,140,248],"strong":[23],"intrusion":[24],"detection":[25,49,224],"system":[26,113],"(IDS)":[27],"with":[28,48,82,123],"clear":[30],"explanation":[31],"process":[34],"essential":[35],"towards":[36],"resource-constrained":[37,249],"environments.":[38,255],"Nevertheless,":[39],"current":[40],"IoT":[41,60,250],"IDS":[42],"systems":[43],"are":[44,163],"usually":[45],"traded":[46],"off":[47],"quality,":[50],"model":[51],"elucidability,":[52],"and":[53,85,98,129,134,182,221,238,245],"computational":[54],"effectiveness,":[55],"deployment":[58],"on":[59,76,119,226],"devices.":[61],"present":[63],"paper":[64],"counteracts":[65],"these":[66],"difficulties":[67],"by":[68,139],"suggesting":[69],"an":[70,77],"explainable":[71],"AI":[72],"(XAI)":[73],"framework":[74,243],"based":[75],"optimized":[78],"Decision":[79],"Tree":[80],"classifier":[81],"both":[83],"local":[84,96],"global":[86,109],"importance":[87,106],"methods:":[88],"SHAP":[89,181],"values":[90],"that":[91,102,162],"estimate":[92],"feature":[93,105,177],"attribution":[94],"using":[95],"explanations,":[97],"Morris":[99,183],"sensitivity":[100],"analysis":[101],"identifies":[103],"view.":[110],"proposed":[112],"attains":[114],"state":[116],"art":[118],"test":[121],"performance":[122,233],"99.91%":[124],"accuracy,":[125,236],"F1-score":[126],"99.51%":[128],"Cohen":[130],"Kappa":[131],"0.9960":[133],"high":[135,223,235],"stability":[136],"is":[137,148],"confirmed":[138],"cross":[141],"validation":[142],"mean":[143],"accuracy":[144],"98.93%.":[146],"Efficiency":[147],"also":[149],"enhanced":[150],"terms":[152],"computations":[154],"to":[155,160,180,186,201,204,213],"provide":[156],"faster":[157],"inferences":[158],"compared":[159],"those":[161],"generalized":[164],"ensemble":[166],"models.":[167],"SrcMac":[168],"shown":[170],"as":[171,247],"most":[173],"significant":[174],"predictor":[175],"analyses":[178],"according":[179],"methods.":[184],"Compared":[185],"previous":[188],"work,":[189],"our":[190],"solution":[191],"eliminates":[192],"its":[193],"major":[194],"drawback":[195],"lack":[196],"because":[197],"it":[198,203],"allows":[199],"us":[200],"apply":[202],"edge":[205],"and,":[207],"therefore,":[208],"achieve":[209,222],"real-time":[210],"processing,":[211],"adhere":[212],"new":[215],"regulation":[216],"transparency":[218],"AI,":[220],"rates":[225],"attacks":[227],"dissimilar":[229],"classes.":[230],"This":[231],"combination":[232],"explainability,":[237],"low":[239],"computation":[240],"make":[241],"useful":[244],"reliable":[246],"security":[251],"problem":[252],"real":[254]},"counts_by_year":[],"updated_date":"2026-01-23T23:24:52.574035","created_date":"2026-01-23T00:00:00"}
