{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:08:42Z","timestamp":1777129722258,"version":"3.51.4"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031649530","type":"print"},{"value":"9783031649547","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T00:00:00Z","timestamp":1728950400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T00:00:00Z","timestamp":1728950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-64954-7_3","type":"book-chapter","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T10:02:17Z","timestamp":1728900137000},"page":"45-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Lightweight Intrusion Detection for\u00a0IoT Systems Using Artificial Neural Networks"],"prefix":"10.1007","author":[{"given":"Radhwan A. A.","family":"Saleh","sequence":"first","affiliation":[]},{"given":"Louai","family":"Al-Awami","sequence":"additional","affiliation":[]},{"given":"Mustafa","family":"Ghaleb","sequence":"additional","affiliation":[]},{"given":"Anas A.","family":"Abudaqa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,15]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020)","journal-title":"IEEE Access"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180\u2013187. IEEE (2015)","DOI":"10.1109\/ISCC.2015.7405513"},{"issue":"8","key":"3_CR3","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.3390\/s19081929","volume":"19","author":"F Azzedin","year":"2019","unstructured":"Azzedin, F., Ghaleb, M.: Internet-of-things and information fusion: trust perspective survey. Sensors 19(8), 1929 (2019)","journal-title":"Sensors"},{"issue":"4","key":"3_CR4","doi-asserted-by":"publisher","first-page":"3496","DOI":"10.1109\/COMST.2018.2844742","volume":"20","author":"E Benkhelifa","year":"2018","unstructured":"Benkhelifa, E., Welsh, T., Hamouda, W.: A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun. Surv. Tutor. 20(4), 3496\u20133509 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., den Hartog, F.T.: TON_IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion datasets. IEEE Internet Things J. (2021)","DOI":"10.1109\/JIOT.2021.3085194"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.24846\/v30i2y202111","volume":"30","author":"A Duraisamy","year":"2021","unstructured":"Duraisamy, A., Subramaniam, M., Robin, C.R.R.: An optimized deep learning based security enhancement and attack detection on IoT using ids and KH-AES for smart cities. Stud. Inf. Control 30(2), 121\u2013131 (2021)","journal-title":"Stud. Inf. Control"},{"issue":"11","key":"3_CR7","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.3390\/electronics10111257","volume":"10","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Shu, L., Djallel, H., Choo, K.K.R.: Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics 10(11), 1257 (2021)","journal-title":"Electronics"},{"issue":"9","key":"3_CR8","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.3390\/s21092986","volume":"21","author":"M Ghaleb","year":"2021","unstructured":"Ghaleb, M., Azzedin, F.: Towards scalable and efficient architecture for modeling trust in IoT environments. Sensors 21(9), 2986 (2021)","journal-title":"Sensors"},{"issue":"6","key":"3_CR9","doi-asserted-by":"publisher","first-page":"3665","DOI":"10.3390\/app13063665","volume":"13","author":"M Ghaleb","year":"2023","unstructured":"Ghaleb, M., Azzedin, F.: Trust-aware fog-based IoT environments: artificial reasoning approach. Appl. Sci. 13(6), 3665 (2023)","journal-title":"Appl. Sci."},{"key":"3_CR10","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-030-78459-1_12","volume-title":"Future Access Enablers for Ubiquitous and Intelligent Infrastructures","author":"I Cviti\u0107","year":"2021","unstructured":"Cviti\u0107, I., Perakovi\u0107, D., Peri\u0161a, M., Krsti\u0107, M., Gupta, B.: Analysis of IoT concept applications: smart home perspective. In: Perakovic, D., Knapcikova, L. (eds.) FABULOUS 2021. LNICST, vol. 382, pp. 167\u2013180. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78459-1_12"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-030-83274-2_4","volume-title":"Quantum Computing: An Applied Approach","author":"JD Hidary","year":"2021","unstructured":"Hidary, J.D.: Complexity theory. In: Hidary, J.D. (ed.) Quantum Computing: An Applied Approach, pp. 43\u201350. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-83274-2_4"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","volume":"7","author":"SU Jan","year":"2019","unstructured":"Jan, S.U., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the internet of things. IEEE Access 7, 42450\u201342471 (2019)","journal-title":"IEEE Access"},{"key":"3_CR13","unstructured":"Khan, M.A., et al.: Voting classifier-based intrusion detection for IoT networks. arXiv preprint arXiv:2104.10015 (2021)"},{"key":"3_CR14","unstructured":"Kohavi, R., et\u00a0al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai, Montreal, Canada, vol.\u00a014, pp. 1137\u20131145 (1995)"},{"key":"3_CR15","unstructured":"Kumar, P.: Computational complexity of ml models (2019). https:\/\/medium.com\/analytics-vidhya\/time-complexity-of-ml-models-4ec39fad2770"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014)","journal-title":"Adv. Eng. Softw."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: 2014 IEEE Conference on Communications and Network Security, pp. 79\u201384. IEEE (2014)","DOI":"10.1109\/CNS.2014.6997469"},{"key":"3_CR18","unstructured":"Nour, M.: TON-IoT datasets (2020). https:\/\/cloudstor.aarnet.edu.au\/plus\/s\/ds5zW91vdgjEj9i"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Rahmany, I., Mnassri, H., Moulahi, T., El\u00a0Khediri, S.: Grey wolf optimizer enhanced SVM for IoT fault detection. In: 2021 International Wireless Communications and Mobile Computing (IWCMC), pp. 1483\u20131488. IEEE (2021)","DOI":"10.1109\/IWCMC51323.2021.9498759"},{"key":"3_CR20","unstructured":"Raja, S.: FNNs, RNNs, LSTM and BLSTM (2021)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Saba, T., Khan, A.R., Sadad, T., Hong, S.P.: Securing the IoT system of smart city against cyber threats using deep learning. Discrete Dyn. Nat. Soc. 2022 (2022)","DOI":"10.1155\/2022\/1241122"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"SALEH, N.A., ERTUN\u00c7, H.M., SALEH, R.A., RASSAM, M.A.: A simple mask detection model based on a multi-layer perception neural network. In: 2021 International Conference of Technology, Science and Administration (ICTSA), pp.\u00a01\u20135. IEEE (2021)","DOI":"10.1109\/ICTSA52017.2021.9406523"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Saleh, R.A., Konyar, M.Z., Kaplan, K., Ertun\u00e7, H.M.: Tire defect detection model using machine learning. In: 2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA), pp.\u00a01\u20135. IEEE (2022)","DOI":"10.1109\/eSmarTA56775.2022.9935140"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-030-04191-5_17","volume-title":"Artificial Intelligence XXXV","author":"HM Sani","year":"2018","unstructured":"Sani, H.M., Lei, C., Neagu, D.: Computational complexity analysis of decision tree algorithms. In: Bramer, M., Petridis, M. (eds.) SGAI 2018. LNCS (LNAI), vol. 11311, pp. 191\u2013197. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04191-5_17"},{"key":"3_CR25","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-72802-1_9","volume-title":"Big Data Technologies and Applications","author":"M Sarhan","year":"2021","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: NetFlow datasets for machine learning-based network intrusion detection systems. In: Deze, Z., Huang, H., Hou, R., Rho, S., Chilamkurti, N. (eds.) BDTA\/WiCON -2020. LNICST, vol. 371, pp. 117\u2013135. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72802-1_9"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Layeghy, S., Portmann, M.: Towards a standard feature set for network intrusion detection system datasets. Mob. Netw. Appl. 1\u201314 (2022)","DOI":"10.1007\/s11036-021-01843-0"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"issue":"2","key":"3_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4014","volume":"32","author":"I Sumaiya Thaseen","year":"2021","unstructured":"Sumaiya Thaseen, I., Saira Banu, J., Lavanya, K., Rukunuddin Ghalib, M., Abhishek, K.: An integrated intrusion detection system using correlation-based attribute selection and artificial neural network. Trans. Emerg. Telecommun. Technol. 32(2), e4014 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"3_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102630","volume":"161","author":"SM Tahsien","year":"2020","unstructured":"Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning based solutions for security of internet of things (IoT): a survey. J. Netw. Comput. Appl. 161, 102630 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"100631","DOI":"10.1016\/j.swevo.2019.100631","volume":"53","author":"A Thakkar","year":"2020","unstructured":"Thakkar, A., Lohiya, R.: Role of swarm and evolutionary algorithms for intrusion detection system: a survey. Swarm Evol. Comput. 53, 100631 (2020)","journal-title":"Swarm Evol. Comput."},{"issue":"4","key":"3_CR31","doi-asserted-by":"publisher","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","volume":"28","author":"A Thakkar","year":"2021","unstructured":"Thakkar, A., Lohiya, R.: A review on machine learning and deep learning perspectives of ids for IoT: recent updates, security issues, and challenges. Arch. Comput. Methods Eng. 28(4), 3211\u20133243 (2021)","journal-title":"Arch. Comput. Methods Eng."},{"issue":"1","key":"3_CR32","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert, D.H., Macready, W.G.: No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1(1), 67\u201382 (1997)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Yadav, S., Shukla, S.: Analysis of k-fold cross-validation over hold-out validation on colossal datasets for quality classification. In: 2016 IEEE 6th International Conference on Advanced Computing (IACC), pp. 78\u201383. IEEE (2016)","DOI":"10.1109\/IACC.2016.25"},{"issue":"1","key":"3_CR34","doi-asserted-by":"publisher","first-page":"e4169","DOI":"10.1002\/dac.4169","volume":"33","author":"S Zeadally","year":"2020","unstructured":"Zeadally, S., Tsikerdekis, M.: Securing internet of things (IoT) with machine learning. Int. J. Commun. Syst. 33(1), e4169 (2020)","journal-title":"Int. J. Commun. Syst."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64954-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T10:03:58Z","timestamp":1728900238000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64954-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,15]]},"ISBN":["9783031649530","9783031649547"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64954-7_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,15]]},"assertion":[{"value":"15 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"180","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}