{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T08:04:17Z","timestamp":1766390657037,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031962301"},{"type":"electronic","value":"9783031962318"}],"license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-96231-8_26","type":"book-chapter","created":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T01:56:35Z","timestamp":1750470995000},"page":"353-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Explainable AI-Driven Feature Selection for Improved Intrusion Detection Systems in the Internet of Medical Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2250-5460","authenticated-orcid":false,"given":"Mohammed","family":"Yacoubi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0467-7735","authenticated-orcid":false,"given":"Omar","family":"Moussaoui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1636-9462","authenticated-orcid":false,"given":"Cyril","family":"Drocourt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3526883","author":"G Akar","year":"2025","unstructured":"Akar, G., Sahmoud, S., Onat, M., Cavusoglu, U., Malondo, E.: L2D2: a novel LSTM model for multi-class intrusion detection systems in the era of IoMT. IEEE Access (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3526883","journal-title":"IEEE Access"},{"issue":"11","key":"26_CR2","doi-asserted-by":"publisher","first-page":"8707","DOI":"10.1109\/JIOT.2020.3045653","volume":"8","author":"A Ghubaish","year":"2021","unstructured":"Ghubaish, A., Salman, T., Zolanvari, M., Unal, D., Al-Ali, A., Jain, R.: Recent advances in the internet-of-medical-things (IoMT) systems security. IEEE Internet Things J. 8(11), 8707\u20138718 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3045653","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"publisher","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., Akin, E.: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6), 1333 (2023). https:\/\/doi.org\/10.3390\/ELECTRONICS12061333","key":"26_CR3","DOI":"10.3390\/ELECTRONICS12061333"},{"doi-asserted-by":"publisher","unstructured":"Towards, A., et al.: Towards a secure and sustainable internet of medical things (IoMT): requirements, design challenges, security techniques, and future trends. Sustainability 15(7), 6177 (2023), https:\/\/doi.org\/10.3390\/SU15076177","key":"26_CR4","DOI":"10.3390\/SU15076177"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/J.PROCS.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213\u2013217 (2016). https:\/\/doi.org\/10.1016\/J.PROCS.2016.06.047","journal-title":"Procedia Comput. Sci."},{"doi-asserted-by":"publisher","unstructured":"Idrissi, I., Boukabous, M., Grari, M., Azizi, M., Moussaoui, O.: An intrusion detection system using machine learning for internet of medical things. In: Bekkay, H., Mellit, A., Gagliano, A., Rabhi, A., Amine Koulali, M. (eds.) ICEERE 2022. LNEE, vol. 954, pp. 641\u2013649. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-981-19-6223-3_66","key":"26_CR6","DOI":"10.1007\/978-981-19-6223-3_66"},{"doi-asserted-by":"publisher","unstructured":"Sy, I., Diouf, B., Diop, A.K., Drocourt, C., Durand, D.: Enhancing security in connected medical IoT networks through deep learning-based anomaly detection. In: Bouzefrane, S., Banerjee, S., Mourlin, F., Boumerdassi, S., Renault, \u00c9. (eds.) MSPN 2023. LNCS (LNAI and LNB), vol. 14482, pp. 87\u201399. Springer, Cham (2024), https:\/\/doi.org\/10.1007\/978-3-031-52426-4_7","key":"26_CR7","DOI":"10.1007\/978-3-031-52426-4_7"},{"doi-asserted-by":"publisher","unstructured":"Megantara, A.A., Ahmad, T.: Feature importance ranking for increasing performance of intrusion detection system. In: 2020 3rd International Conference on Computer and Informatics Engineering, IC2IE 2020, pp. 37\u201342 (2020). https:\/\/doi.org\/10.1109\/IC2IE50715.2020.9274570","key":"26_CR8","DOI":"10.1109\/IC2IE50715.2020.9274570"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"27468","DOI":"10.1109\/ACCESS.2020.2971654","volume":"8","author":"K Wei","year":"2020","unstructured":"Wei, K., Zhang, L., Guo, Y., Jiang, X.: Health monitoring based on internet of medical things: architecture, enabling technologies, and applications. IEEE Access 8, 27468\u201327478 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2971654","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Debauche, O., et al.: RAMi: a new real-time internet of medical things architecture for elderly patient monitoring. Information 13(9), 423 (2022). https:\/\/doi.org\/10.3390\/INFO13090423","key":"26_CR10","DOI":"10.3390\/INFO13090423"},{"key":"26_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/J.IOT.2023.100887","volume":"23","author":"ML Hernandez-Jaimes","year":"2023","unstructured":"Hernandez-Jaimes, M.L., Martinez-Cruz, A., Ram\u00edrez-Guti\u00e9rrez, K.A., Feregrino-Uribe, C.: Artificial intelligence for IoMT security: a review of intrusion detection systems, attacks, datasets and Cloud\u2013Fog\u2013Edge architectures. Internet Things 23, 100887 (2023). https:\/\/doi.org\/10.1016\/J.IOT.2023.100887","journal-title":"Internet Things"},{"doi-asserted-by":"publisher","unstructured":"Cunningham, P., Cord, M., Delany, S.J.: Supervised learning. Cogn. Technol. 21\u201349 (2008). https:\/\/doi.org\/10.1007\/978-3-540-75171-7_2","key":"26_CR12","DOI":"10.1007\/978-3-540-75171-7_2"},{"issue":"1","key":"26_CR13","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/J.ACI.2018.08.003\/FULL\/PDF","volume":"17","author":"A Tharwat","year":"2018","unstructured":"Tharwat, A.: Classification assessment methods. Appl. Comput. Inform. 17(1), 168\u2013192 (2018). https:\/\/doi.org\/10.1016\/J.ACI.2018.08.003\/FULL\/PDF","journal-title":"Appl. Comput. Inform."},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"unstructured":"Prokhorenkova, L., Gusev, G., Vorobev, A., Dorogush, A.V., Gulin, A.: CatBoost: unbiased boosting with categorical features. In: Advances in Neural Information Processing Systems, vol. 2018-December, pp. 6638\u20136648 (2017). https:\/\/arxiv.org\/abs\/1706.09516v5. Accessed 25 Jan 2025","key":"26_CR15"},{"unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, vol. 30 (2017). https:\/\/github.com\/Microsoft\/LightGBM. Accessed 09 Feb 2025","key":"26_CR16"},{"doi-asserted-by":"publisher","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol. 13\u201317-August-2016, pp. 785\u2013794 (2016). https:\/\/doi.org\/10.1145\/2939672.2939785\/SUPPL_FILE\/KDD2016_CHEN_BOOSTING_SYSTEM_01-ACM.MP4","key":"26_CR17","DOI":"10.1145\/2939672.2939785\/SUPPL_FILE\/KDD2016_CHEN_BOOSTING_SYSTEM_01-ACM.MP4"},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","volume":"8","author":"AA Hady","year":"2020","unstructured":"Hady, A.A., Ghubaish, A., Salman, T., Unal, D., Jain, R.: Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8, 106576\u2013106584 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3000421","journal-title":"IEEE Access"},{"issue":"5","key":"26_CR19","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi, E., Williams, L., Slowinska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6(5), 9042\u20139053 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2926365","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"publisher","unstructured":"Alonso, E., et al.: On the detection capabilities of signature-based intrusion detection systems in the context of web attacks. Appl. Sci. 12(2), 852 (2022). https:\/\/doi.org\/10.3390\/APP12020852","key":"26_CR20","DOI":"10.3390\/APP12020852"},{"key":"26_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/J.INFFUS.2023.101805","volume":"99","author":"S Ali","year":"2023","unstructured":"Ali, S., et al.: Explainable artificial intelligence (XAI): what we know and what is left to attain Trustworthy Artificial Intelligence. Inf. Fusion 99, 101805 (2023). https:\/\/doi.org\/10.1016\/J.INFFUS.2023.101805","journal-title":"Inf. Fusion"},{"doi-asserted-by":"publisher","unstructured":"Phillips, P.J., et al.: Four Principles of Explainable Artificial Intelligence (Draft). National Institute of Standards and Technology Interagency or Internal Report, no. August (2020). https:\/\/doi.org\/10.6028\/NIST.IR.8312-DRAFT","key":"26_CR22","DOI":"10.6028\/NIST.IR.8312-DRAFT"},{"doi-asserted-by":"publisher","unstructured":"Barredo Arrieta, A., et al.: Explainable Artificial Intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf. Fusion 58, 82\u2013115 (2020). https:\/\/doi.org\/10.1016\/J.INFFUS.2019.12.012","key":"26_CR23","DOI":"10.1016\/J.INFFUS.2019.12.012"},{"unstructured":"IoMT Dataset 2024 | Datasets | Research | Canadian Institute for Cybersecurity | UNB. https:\/\/www.unb.ca\/cic\/datasets\/iomt-dataset-2024.html. Accessed 12 Feb 2025","key":"26_CR24"},{"key":"26_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/J.IOT.2024.101351","volume":"28","author":"S Dadkhah","year":"2024","unstructured":"Dadkhah, S., Neto, E.C.P., Ferreira, R., Molokwu, R.C., Sadeghi, S., Ghorbani, A.A.: CICIoMT2024: a benchmark dataset for multi-protocol security assessment in IoMT. Internet Things 28, 101351 (2024). https:\/\/doi.org\/10.1016\/J.IOT.2024.101351","journal-title":"Internet Things"},{"issue":"3","key":"26_CR26","doi-asserted-by":"publisher","first-page":"740","DOI":"10.3390\/make3030037","volume":"3","author":"S Knapi\u010d","year":"2021","unstructured":"Knapi\u010d, S., Malhi, A., Saluja, R., Fr\u00e4mling, K.: Explainable artificial intelligence for human decision-support system in medical domain. Mach. Learn. Knowl. Extr. 3(3), 740\u2013770 (2021). https:\/\/doi.org\/10.3390\/make3030037","journal-title":"Mach. Learn. Knowl. Extr."},{"doi-asserted-by":"publisher","unstructured":"Arreche, O., Guntur, T., Abdallah, M.: XAI-IDS: toward proposing an explainable artificial intelligence framework for enhancing network intrusion detection systems. Appl. Sci. 14(10), 4170 (2024). https:\/\/doi.org\/10.3390\/APP14104170","key":"26_CR27","DOI":"10.3390\/APP14104170"},{"unstructured":"Arreche, O., Guntur, T., Abdallah, M.: XAI-Based Feature Selection for Improved Network Intrusion Detection Systems (2024). https:\/\/arxiv.org\/abs\/2410.10050v1. Accessed 13 Feb 2025","key":"26_CR28"},{"doi-asserted-by":"publisher","unstructured":"Mohsin, M., Jony, A.I.: A comparative analysis of medical IoT device attacks using machine learning models. Malays. J. Sci. Adv. Technol. 429\u2013439 (2024). https:\/\/doi.org\/10.56532\/MJSAT.V4I4.318","key":"26_CR29","DOI":"10.56532\/MJSAT.V4I4.318"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-96231-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T06:23:05Z","timestamp":1760336585000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-96231-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"ISBN":["9783031962301","9783031962318"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-96231-8_26","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025,6,22]]},"assertion":[{"value":"22 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}