{"id":"https://openalex.org/W7127907540","doi":"https://doi.org/10.7717/peerj-cs.3553","title":"A comparative study of dimensionality reduction techniques for intrusion detection in IoT networks","display_name":"A comparative study of dimensionality reduction techniques for intrusion detection in IoT networks","publication_year":2026,"publication_date":"2026-02-06","ids":{"openalex":"https://openalex.org/W7127907540","doi":"https://doi.org/10.7717/peerj-cs.3553"},"language":"en","primary_location":{"id":"doi:10.7717/peerj-cs.3553","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3553","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.7717/peerj-cs.3553","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000914211","display_name":"Jos\u00e9 Carlos Garc\u00eda-Merino","orcid":"https://orcid.org/0000-0002-9326-0578"},"institutions":[{"id":"https://openalex.org/I178450904","display_name":"Universidad Nacional de Educaci\u00f3n a Distancia","ror":"https://ror.org/02msb5n36","country_code":"ES","type":"education","lineage":["https://openalex.org/I178450904"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Jos\u00e9 Carlos Garc\u00eda-Merino","raw_affiliation_strings":["Programa de Doctorado en Sistemas Inteligentes, Escuela Internacional de Doctorado UNED (EIDUNED), Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain","Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"],"raw_orcid":"https://orcid.org/0000-0002-9326-0578","affiliations":[{"raw_affiliation_string":"Programa de Doctorado en Sistemas Inteligentes, Escuela Internacional de Doctorado UNED (EIDUNED), Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain","institution_ids":["https://openalex.org/I178450904"]},{"raw_affiliation_string":"Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain","institution_ids":["https://openalex.org/I178450904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056271706","display_name":"Llanos Tobarra","orcid":"https://orcid.org/0000-0003-2779-4042"},"institutions":[{"id":"https://openalex.org/I178450904","display_name":"Universidad Nacional de Educaci\u00f3n a Distancia","ror":"https://ror.org/02msb5n36","country_code":"ES","type":"education","lineage":["https://openalex.org/I178450904"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Llanos Tobarra","raw_affiliation_strings":["Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"],"raw_orcid":"https://orcid.org/0000-0003-2779-4042","affiliations":[{"raw_affiliation_string":"Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain","institution_ids":["https://openalex.org/I178450904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046821670","display_name":"Antonio Robles-G\u00f3mez","orcid":"https://orcid.org/0000-0002-5181-0199"},"institutions":[{"id":"https://openalex.org/I178450904","display_name":"Universidad Nacional de Educaci\u00f3n a Distancia","ror":"https://ror.org/02msb5n36","country_code":"ES","type":"education","lineage":["https://openalex.org/I178450904"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Antonio Robles-G\u00f3mez","raw_affiliation_strings":["Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"],"raw_orcid":"https://orcid.org/0000-0002-5181-0199","affiliations":[{"raw_affiliation_string":"Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain","institution_ids":["https://openalex.org/I178450904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062862686","display_name":"Rafael Pastor-Vargas","orcid":null},"institutions":[{"id":"https://openalex.org/I178450904","display_name":"Universidad Nacional de Educaci\u00f3n a Distancia","ror":"https://ror.org/02msb5n36","country_code":"ES","type":"education","lineage":["https://openalex.org/I178450904"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Rafael Pastor-Vargas","raw_affiliation_strings":["Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"],"raw_orcid":"https://orcid.org/0000-0002-4089-9538","affiliations":[{"raw_affiliation_string":"Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain","institution_ids":["https://openalex.org/I178450904"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123682385","display_name":"Joao Sarraipa","orcid":null},"institutions":[{"id":"https://openalex.org/I83558840","display_name":"Universidade Nova de Lisboa","ror":"https://ror.org/02xankh89","country_code":"PT","type":"education","lineage":["https://openalex.org/I83558840"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Jo\u00e3o Sarraipa","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Universidade Nova de Lisboa, Lisbon, Portugal"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Universidade Nova de Lisboa, Lisbon, Portugal","institution_ids":["https://openalex.org/I83558840"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000914211"],"corresponding_institution_ids":["https://openalex.org/I178450904"],"apc_list":{"value":1395,"currency":"USD","value_usd":1395},"apc_paid":{"value":1395,"currency":"USD","value_usd":1395},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18946259,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"e3553","last_page":"e3553"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8176000118255615,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8176000118255615,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.05810000002384186,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.016699999570846558,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.8021000027656555},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6122999787330627},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5758000016212463},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5570999979972839},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.5546000003814697},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.550000011920929},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.48249998688697815},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.44130000472068787}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.8021000027656555},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7067999839782715},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6122999787330627},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5758000016212463},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5570999979972839},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.5546000003814697},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.550000011920929},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.48249998688697815},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4514999985694885},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.44130000472068787},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.39469999074935913},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3928000032901764},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.3571999967098236},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34929999709129333},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34130001068115234},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.27959999442100525},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2766999900341034},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.26100000739097595}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.7717/peerj-cs.3553","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3553","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9556cafea8f2459da504c503e03a40ac","is_oa":true,"landing_page_url":"https://doaj.org/article/9556cafea8f2459da504c503e03a40ac","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"PeerJ Computer Science, Vol 12, p e3553 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.7717/peerj-cs.3553","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3553","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7615164518356323,"id":"https://metadata.un.org/sdg/2","display_name":"Zero hunger"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1875061881","https://openalex.org/W1989352541","https://openalex.org/W2102636708","https://openalex.org/W2913811025","https://openalex.org/W2939847281","https://openalex.org/W2946170942","https://openalex.org/W2963748489","https://openalex.org/W3014178782","https://openalex.org/W3014601769","https://openalex.org/W3033675321","https://openalex.org/W3045788690","https://openalex.org/W3092465628","https://openalex.org/W3121453273","https://openalex.org/W3123908207","https://openalex.org/W3137469478","https://openalex.org/W3141436557","https://openalex.org/W3157871125","https://openalex.org/W3162956350","https://openalex.org/W3196743383","https://openalex.org/W3198200730","https://openalex.org/W3199139386","https://openalex.org/W3216000677","https://openalex.org/W4205136287","https://openalex.org/W4205922727","https://openalex.org/W4226319939","https://openalex.org/W4250610213","https://openalex.org/W4280535971","https://openalex.org/W4280610250","https://openalex.org/W4297813081","https://openalex.org/W4312910656","https://openalex.org/W4317727238","https://openalex.org/W4321325892","https://openalex.org/W4324142623","https://openalex.org/W4382281941","https://openalex.org/W4386066331","https://openalex.org/W4386140607","https://openalex.org/W4387694066","https://openalex.org/W4388214606","https://openalex.org/W4389328663","https://openalex.org/W4390738702","https://openalex.org/W4391812155","https://openalex.org/W4392120324","https://openalex.org/W4400132444","https://openalex.org/W4402483050","https://openalex.org/W4402542170","https://openalex.org/W4403400523","https://openalex.org/W4404180258","https://openalex.org/W4404473029","https://openalex.org/W4405531921","https://openalex.org/W4405631660","https://openalex.org/W4405726967","https://openalex.org/W4408409109","https://openalex.org/W4408446993","https://openalex.org/W4409603439"],"related_works":[],"abstract_inverted_index":{"The":[0],"widespread":[1],"adoption":[2],"of":[3,5,29,73,76,96,104,146],"Internet":[4],"Things":[6],"(IoT)":[7],"technology":[8],"has":[9],"driven":[10],"significant":[11],"advancements":[12],"in":[13,81,114,149],"fields":[14],"such":[15],"as":[16],"agriculture,":[17],"manufacturing,":[18],"industry,":[19],"and":[20,26,60,106,135],"transportation.":[21],"However,":[22],"the":[23,74,94,102,118,126,144],"highly":[24],"interconnected":[25],"resource-constrained":[27,158],"nature":[28],"IoT":[30,50,115],"ecosystems":[31],"makes":[32],"them":[33],"particularly":[34],"vulnerable":[35],"to":[36,55,83],"cyberattacks.":[37],"Although":[38],"AI-based":[39],"intrusion":[40],"detection":[41,113],"systems":[42],"provide":[43],"an":[44],"effective":[45],"protection,":[46],"their":[47],"deployment":[48,148],"on":[49,156],"devices":[51],"is":[52,69],"hindered":[53],"due":[54],"limited":[56],"memory,":[57],"processing":[58],"power,":[59],"storage":[61],"capacity.":[62],"One":[63],"strategy":[64],"for":[65,101,111],"addressing":[66],"these":[67],"limitations":[68],"dimensionality":[70,98],"reduction,":[71],"consisting":[72],"removal":[75],"redundant":[77],"or":[78],"irrelevant":[79],"features":[80],"order":[82],"reduce":[84],"computational":[85],"demands":[86],"without":[87],"compromising":[88],"model":[89,133,147],"accuracy.":[90],"This":[91],"work":[92],"analyses":[93],"effectiveness":[95],"various":[97],"reduction":[99],"approaches":[100],"development":[103],"efficient":[105],"lightweight":[107],"Random":[108],"Forest":[109],"models":[110],"anomaly":[112],"environments.":[116],"Among":[117],"considered":[119],"methods,":[120],"Permutation":[121],"Feature":[122],"Importance":[123],"consistently":[124],"produced":[125],"most":[127],"balanced":[128],"models,":[129],"reducing":[130],"inference":[131],"time,":[132],"size,":[134],"RAM":[136],"usage,":[137],"while":[138],"slightly":[139],"enhancing":[140],"predictive":[141],"performance.":[142],"Furthermore,":[143],"feasibility":[145],"real-world":[150],"environments":[151],"was":[152],"assessed":[153],"through":[154],"experiments":[155],"a":[157],"Raspberry":[159],"Pi":[160],"device.":[161]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-07T00:00:00"}
