{"id":"https://openalex.org/W7134058473","doi":"https://doi.org/10.7717/peerj-cs.3612","title":"Cybersecurity risk mitigation and network anomaly detection in smart homes using machine learning and data mining","display_name":"Cybersecurity risk mitigation and network anomaly detection in smart homes using machine learning and data mining","publication_year":2026,"publication_date":"2026-03-06","ids":{"openalex":"https://openalex.org/W7134058473","doi":"https://doi.org/10.7717/peerj-cs.3612"},"language":"en","primary_location":{"id":"doi:10.7717/peerj-cs.3612","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3612","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.7717/peerj-cs.3612","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128237148","display_name":"Mahmood Hijran Abdulrazaq","orcid":null},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Mahmood Hijran Abdulrazaq","raw_affiliation_strings":["Computer Engineering, Gazi University Institute of Science, Ankara, Turkey"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Engineering, Gazi University Institute of Science, Ankara, Turkey","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101464941","display_name":"Cemal Ko\u00e7ak","orcid":"https://orcid.org/0000-0002-8902-0934"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Cemal Ko\u00e7ak","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Technology, Gazi University Ankara, Ankara, Turkey"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Technology, Gazi University Ankara, Ankara, Turkey","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060134461","display_name":"Saadin Oyucu","orcid":"https://orcid.org/0000-0003-3880-3039"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Saadin Oyucu","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Technology, Gazi University Ankara, Ankara, Turkey"],"raw_orcid":"https://orcid.org/0000-0003-3880-3039","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Technology, Gazi University Ankara, Ankara, Turkey","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032501804","display_name":"Bur\u00e7ak Asal","orcid":null},"institutions":[{"id":"https://openalex.org/I50379099","display_name":"Adana Science and Technology University","ror":"https://ror.org/013z3yn41","country_code":"TR","type":"education","lineage":["https://openalex.org/I50379099"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Bur\u00e7ak Asal","raw_affiliation_strings":["Department of Computer Engineering, Adana Alparslan T\u00fcrke\u015f Science and Technology University, Adana, Turkey"],"raw_orcid":"https://orcid.org/0009-0003-3729-8170","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Adana Alparslan T\u00fcrke\u015f Science and Technology University, Adana, Turkey","institution_ids":["https://openalex.org/I50379099"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5128237148"],"corresponding_institution_ids":["https://openalex.org/I95634034"],"apc_list":{"value":1395,"currency":"USD","value_usd":1395},"apc_paid":{"value":1395,"currency":"USD","value_usd":1395},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38469968,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"e3612","last_page":"e3612"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3912999927997589,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3912999927997589,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.1103999987244606,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.04569999873638153,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6538000106811523},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6018999814987183},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5789999961853027},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.42260000109672546},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4146000146865845},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.38089999556541443},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.3792000114917755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6654999852180481},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6538000106811523},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6018999814987183},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5835000276565552},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5789999961853027},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5641999840736389},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5307999849319458},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.42260000109672546},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4146000146865845},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.38089999556541443},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3792000114917755},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.36649999022483826},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.32100000977516174},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.3188000023365021},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.28209999203681946},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2816999852657318},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.26489999890327454}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.7717/peerj-cs.3612","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3612","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7d151482fcd246699b702ce5336294fa","is_oa":true,"landing_page_url":"https://doaj.org/article/7d151482fcd246699b702ce5336294fa","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"PeerJ Computer Science, Vol 12, p e3612 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.7717/peerj-cs.3612","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3612","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.46176114678382874,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1543124527","https://openalex.org/W2069098720","https://openalex.org/W2393763864","https://openalex.org/W2623166382","https://openalex.org/W2811000347","https://openalex.org/W2967158271","https://openalex.org/W2999155878","https://openalex.org/W3035026414","https://openalex.org/W3045657706","https://openalex.org/W3066888720","https://openalex.org/W3129898739","https://openalex.org/W3139008799","https://openalex.org/W3144717505","https://openalex.org/W3208975567","https://openalex.org/W3215157738","https://openalex.org/W4206596779","https://openalex.org/W4221084224","https://openalex.org/W4281671322","https://openalex.org/W4283778635","https://openalex.org/W4285286125","https://openalex.org/W4306645406","https://openalex.org/W4307810440","https://openalex.org/W4311529065","https://openalex.org/W4313216104","https://openalex.org/W4313328146","https://openalex.org/W4322722384","https://openalex.org/W4322760971","https://openalex.org/W4385614342","https://openalex.org/W4385697917","https://openalex.org/W4391021045","https://openalex.org/W4392124928","https://openalex.org/W4393035644","https://openalex.org/W4394721453","https://openalex.org/W4396573326","https://openalex.org/W4396951282","https://openalex.org/W4399307582","https://openalex.org/W4399347096","https://openalex.org/W4400700048","https://openalex.org/W4401974240","https://openalex.org/W4403759023","https://openalex.org/W4403835123","https://openalex.org/W4408359233","https://openalex.org/W4410428346"],"related_works":[],"abstract_inverted_index":{"The":[0,109],"quick":[1],"spread":[2],"of":[3,5,114,118,122,131,159,173],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8],"in":[9,193,231],"smart":[10,73,142,211],"homes":[11],"has":[12],"raised":[13],"cybersecurity":[14,75,93,138,213],"concerns,":[15],"calling":[16],"for":[17,140,202],"smart,":[18],"flexible,":[19],"and":[20,31,40,68,80,103,124,205,219],"active":[21],"ways":[22],"to":[23,71,166,190,210],"reduce":[24],"threats.":[25,43],"Standard":[26],"Intrusion":[27],"Detection":[28],"Systems":[29],"(IDS)":[30],"basic":[32],"anomaly":[33],"detection":[34,204],"have":[35,170],"trouble":[36],"spotting":[37],"new":[38],"attacks":[39,192],"changing":[41,191],"cyber":[42,229],"To":[44],"fix":[45],"these":[46],"problems,":[47],"this":[48],"article":[49],"puts":[50],"forward":[51],"a":[52,116,120,125,136,199,216],"Reinforcement":[53,181],"Learning-Based":[54],"Adaptive":[55],"Threat":[56],"Mitigation":[57],"(RL-ATM)":[58],"model.":[59],"It":[60,226],"uses":[61],"methods":[62,163],"like":[63],"reinforcement":[64,105],"learning,":[65,67],"deep":[66,104],"data":[69],"mining":[70],"make":[72],"home":[74,143,212],"better":[76,90,200],"by":[77,214],"reducing":[78],"risks":[79],"finding":[81],"network":[82],"issues.":[83],"Tests":[84],"show":[85],"that":[86,148],"RL-ATM":[87,198],"does":[88],"much":[89],"than":[91],"current":[92],"options,":[94],"such":[95],"as":[96],"signature-based":[97],"IDS,":[98],"anomaly-based":[99],"machine":[100],"learning":[101,106],"models,":[102],"(DRL)":[107],"setups.":[108],"model":[110],"got":[111],"an":[112,157,171],"accuracy":[113,165,186],"98.87%,":[115],"precision":[117],"97.49%,":[119],"recall":[121],"98.36%,":[123],"low":[126],"false":[127],"positive":[128],"rate":[129],"(FPR)":[130],"1.8%.":[132],"This":[133,196,207],"makes":[134,197],"it":[135],"dependable":[137,203],"choice":[139,201],"actual":[141],"use.":[144],"A":[145],"comparison":[146],"shows":[147],"standard":[149],"IDS":[150],"models":[151,183],"are":[152],"only":[153],"87.42%":[154],"accurate":[155],"with":[156],"FPR":[158,172],"6.3%.":[160],"Anomaly-based":[161],"ML":[162],"improve":[164],"91.15%":[167],"but":[168,187],"still":[169],"4.9%.":[174],"Hybrid":[175],"Convolutional":[176],"Neural":[177],"Network":[178],"(CNN)":[179],"+":[180],"Learning":[182],"reach":[184],"92.84%":[185],"can\u2019t":[188],"adapt":[189],"real":[194,232],"time.":[195,233],"response.":[206],"work":[208],"adds":[209],"giving":[215],"scalable,":[217],"adaptive,":[218],"independent":[220],"artificial":[221],"intelligence":[222],"(AI)-driven":[223],"security":[224],"system.":[225],"can":[227],"lower":[228],"threats":[230]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-03-07T00:00:00"}
