{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:13:55Z","timestamp":1772500435048,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T00:00:00Z","timestamp":1631059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T00:00:00Z","timestamp":1631059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s00521-021-06441-5","type":"journal-article","created":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T18:02:36Z","timestamp":1631124156000},"page":"15-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A threat intelligence framework for protecting smart satellite-based healthcare networks"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4690-2256","authenticated-orcid":false,"given":"Muna","family":"Al-Hawawreh","sequence":"first","affiliation":[]},{"given":"Nour","family":"Moustafa","sequence":"additional","affiliation":[]},{"given":"Jill","family":"Slay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,8]]},"reference":[{"issue":"20","key":"6441_CR1","doi-asserted-by":"publisher","first-page":"16119","DOI":"10.1007\/s00521-020-04772-3","volume":"32","author":"H HaddadPajouh","year":"2020","unstructured":"HaddadPajouh H, Khayami R, Dehghantanha A, Choo KKR, Parizi RM (2020) AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things. Neural Comput Appl 32(20):16119","journal-title":"Neural Comput Appl"},{"key":"6441_CR2","doi-asserted-by":"publisher","first-page":"102141","DOI":"10.1016\/j.scs.2020.102141","volume":"59","author":"R Patan","year":"2020","unstructured":"Patan R, Ghantasala GP, Sekaran R, Gupta D, Ramachandran M (2020) Smart healthcare and quality of service in IoT using grey filter convolutional based cyber physical system. Sustainable Cities Soc 59:102141","journal-title":"Sustainable Cities Soc"},{"issue":"4","key":"6441_CR3","doi-asserted-by":"publisher","first-page":"2489","DOI":"10.1109\/COMST.2020.3011208","volume":"22","author":"K Tange","year":"2020","unstructured":"Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial internet of things security: requirements and fog computing opportunities. IEEE Commun Surv Tutorials 22(4):2489","journal-title":"IEEE Commun Surv Tutorials"},{"key":"6441_CR4","doi-asserted-by":"crossref","unstructured":"AL-Hawawreh M, Sitnikova E (2020) Developing a security testbed for industrial internet of things. IEEE IOT J","DOI":"10.1109\/JIOT.2020.3032093"},{"key":"6441_CR5","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.procs.2017.05.323","volume":"109","author":"M Iglesias-Urkia","year":"2017","unstructured":"Iglesias-Urkia M, Orive A, Urbieta A (2017) Analysis of CoAP implementations for industrial Internet of Things: a survey. Procedia Comput Sci 109:188","journal-title":"Procedia Comput Sci"},{"key":"6441_CR6","doi-asserted-by":"crossref","unstructured":"Mishra S, Paul A (2020) A critical analysis of attack detection schemes in IoT and open challenges. In: 2020 IEEE international conference on computing, power and communication technologies (GUCON) (IEEE, 2020), pp 57\u201362","DOI":"10.1109\/GUCON48875.2020.9231077"},{"key":"6441_CR7","doi-asserted-by":"crossref","unstructured":"Washiro T (2016) Electric RFID communication via human body. In: 2016 IEEE international conference on RFID technology and applications (RFID-TA) (IEEE, 2016), pp 129\u2013132","DOI":"10.1109\/RFID-TA.2016.7750748"},{"issue":"6","key":"6441_CR8","doi-asserted-by":"publisher","first-page":"9338","DOI":"10.1109\/JIOT.2019.2942085","volume":"6","author":"AG Roselin","year":"2019","unstructured":"Roselin AG, Nanda P, Nepal S, He X, Wright J (2019) Exploiting the remote server access support of CoAP protocol. IEEE Internet Things J 6(6):9338","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"6441_CR9","doi-asserted-by":"publisher","first-page":"7137","DOI":"10.1109\/JIOT.2019.2914390","volume":"6","author":"M Al-Hawawreh","year":"2019","unstructured":"Al-Hawawreh M, den Hartog F, Sitnikova E (2019) Targeted ransomware: a new cyber threat to edge system of brownfield industrial Internet of Things. IEEE Internet Things J 6(4):7137","journal-title":"IEEE Internet Things J"},{"key":"6441_CR10","doi-asserted-by":"crossref","unstructured":"Khalil K, Elgazzar K, Abdelgawad A, Bayoumi M (2020) A security approach for CoAP-based internet of things resource discovery. In: 2020 IEEE 6th world forum on internet of things (WF-IoT) (IEEE), pp 1\u20136","DOI":"10.1109\/WF-IoT48130.2020.9221153"},{"key":"6441_CR11","unstructured":"Asert. Coap attacks in the wild (2019). https:\/\/www.netscout.com\/blog\/asert\/coap-attacks-wild"},{"issue":"2","key":"6441_CR12","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/JIOT.2018.2847733","volume":"6","author":"W Zhou","year":"2018","unstructured":"Zhou W, Jia Y, Peng A, Zhang Y, Liu P (2018) The effect of iot new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J 6(2):1606","journal-title":"IEEE Internet Things J"},{"key":"6441_CR13","doi-asserted-by":"crossref","unstructured":"Al-Hawawreh M, Moustafa N, Garg S, Hossain MS (2020) deep learning-enabled threat intelligence scheme in the internet of things networks. In: IEEE transactions on network science and engineering","DOI":"10.1109\/TNSE.2020.3032415"},{"key":"6441_CR14","doi-asserted-by":"crossref","unstructured":"Bou-Harb E, Neshenko N (2020) Generating and sharing IoT-centric cyber threat intelligence. In: Cyber Threat Intelligence for the Internet of Things (Springer), pp 77\u201384","DOI":"10.1007\/978-3-030-45858-4_4"},{"key":"6441_CR15","doi-asserted-by":"crossref","unstructured":"Montasari R, Carroll F, Macdonald S, Jahankhani H, Hosseinian-Far A, Daneshkhah A (2021) Application of artificial intelligence and machine learning in producing actionable cyber threat intelligence. In: Digital forensic investigation of internet of things (IoT) devices (Springer), pp 47\u201364","DOI":"10.1007\/978-3-030-60425-7_3"},{"key":"6441_CR16","unstructured":"Crest. what is cyber threat intelligence and how is it used? (2019). https:\/\/www.crest-approved.org\/wp-content\/uploads\/CREST-Cyber-Threat-Intelligence.pdf"},{"issue":"21","key":"6441_CR17","doi-asserted-by":"publisher","first-page":"30257","DOI":"10.1007\/s11042-018-7005-2","volume":"78","author":"H Zhang","year":"2019","unstructured":"Zhang H, Yi Y, Wang J, Cao N, Duan Q (2019) Network attack prediction method based on threat intelligence for IoT. Multimedia Tools Appl 78(21):30257","journal-title":"Multimedia Tools Appl"},{"key":"6441_CR18","doi-asserted-by":"crossref","unstructured":"Alladi T, Chamola V et al (2020) HARCI: a two-way authentication protocol for three entity healthcare IoT networks. IEEE J Sel Areas Commun","DOI":"10.1109\/JSAC.2020.3020605"},{"key":"6441_CR19","unstructured":"Routray SK, Hussein HM (2019) Satellite based IoT networks for emerging applications. arXiv preprint arXiv:1904.00520"},{"key":"6441_CR20","doi-asserted-by":"crossref","unstructured":"Pradhan B, Bhattacharyya S, Pal K (2021) IoT-based applications in healthcare devices. J Healthcare Eng","DOI":"10.1155\/2021\/6632599"},{"key":"6441_CR21","doi-asserted-by":"publisher","first-page":"215013272094796","DOI":"10.1177\/2150132720947963","volume":"11","author":"PE Molling","year":"2020","unstructured":"Molling PE, Holst TT, Anderson BG, Fitzgerald K, Eddy M, Weber BD, Schwan B, Heiderscheit CJ, Jagim AR (2020) Drive-through satellite testing: an efficient precautionary method of screening patients for SARS-CoV-2 in a rural healthcare setting. J Primary Care Commun Health 11:2150132720947963","journal-title":"J Primary Care Commun Health"},{"issue":"6","key":"6441_CR22","first-page":"385","volume":"37","author":"JS Williams","year":"2003","unstructured":"Williams JS (2003) Manufacturers move to help hospitals comply with joint commission requirements on clinical alarms. Biomed Instrum Technol 37(6):385","journal-title":"Biomed Instrum Technol"},{"key":"6441_CR23","doi-asserted-by":"crossref","unstructured":"Hassija V, Chamola V, Bajpai BC, Zeadally S, et al (2020) Security issues in implantable medical devices: fact or fiction? Sustainable Cities and Society p. 102552","DOI":"10.1016\/j.scs.2020.102552"},{"key":"6441_CR24","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.cose.2017.09.001","volume":"72","author":"W Tounsi","year":"2018","unstructured":"Tounsi W, Rais H (2018) A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput Secur 72:212","journal-title":"Comput Secur"},{"key":"6441_CR25","volume-title":"The evolution of cyber threat intelligence (CTI): 2019 SANS CTI survey","author":"R Brown","year":"2019","unstructured":"Brown R, Lee RM (2019) The evolution of cyber threat intelligence (CTI): 2019 SANS CTI survey. SANS Institute, Singapore"},{"issue":"3","key":"6441_CR26","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3390\/fi11030063","volume":"11","author":"A Yeboah-Ofori","year":"2019","unstructured":"Yeboah-Ofori A, Islam S (2019) Cyber security threat modeling for supply chain organizational environments. Future internet 11(3):63","journal-title":"Future internet"},{"key":"6441_CR27","unstructured":"D\u00edaz JEM (2020) Internet of things and distributed denial of service as risk factors in information security. In Bioethics (IntechOpen)"},{"issue":"2","key":"6441_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3381038","volume":"53","author":"S Figueroa-Lorenzo","year":"2020","unstructured":"Figueroa-Lorenzo S, A\u00f1orga J, Arrizabalaga S (2020) A survey of IIoT protocols: a measure of vulnerability risk analysis based on cvss. ACM Comput Surv (CSUR) 53(2):1","journal-title":"ACM Comput Surv (CSUR)"},{"key":"6441_CR29","doi-asserted-by":"crossref","unstructured":"Bhatt P, Morais A (2018) HADS: hybrid anomaly detection system for iot environments. In: 2018 international conference on internet of things, embedded systems and communications (IINTEC) (IEEE, 2018), pp 191\u2013196","DOI":"10.1109\/IINTEC.2018.8695303"},{"key":"6441_CR30","doi-asserted-by":"crossref","unstructured":"Granjal J, Pedroso A (2018) Intrusion detection and prevention with internet-integrated CoAP sensing applications. In: IoTBDS , pp 164\u2013172","DOI":"10.5220\/0006777901640172"},{"key":"6441_CR31","doi-asserted-by":"crossref","unstructured":"Kajwadkar VK Jain A (2018) novel algorithm for DoS and DDoS attack detection in internet of things. In: 2018 conference on information and communication technology (CICT) (IEEE, 2018), pp 1\u20134","DOI":"10.1109\/INFOCOMTECH.2018.8722397"},{"key":"6441_CR32","doi-asserted-by":"crossref","unstructured":"Tiloca M, Hoglund R, Al Atiiq S (2018) Sardos: self-adaptive reaction against denial of service in the internet of things. In: 2018 fifth international conference on internet of things: systems, management and security (IEEE, 2018), pp 54\u201361","DOI":"10.1109\/IoTSMS.2018.8554819"},{"key":"6441_CR33","doi-asserted-by":"crossref","unstructured":"Vieira L, Santos L, Gon\u00e7alves R, Rabad\u00e3o C (2019) Identifying attack signatures for the internet of things: an IP flow based approach. In: 2019 14th Iberian conference on information systems and technologies (CISTI) (IEEE, 2019), pp 1\u20137","DOI":"10.23919\/CISTI.2019.8760650"},{"key":"6441_CR34","doi-asserted-by":"crossref","unstructured":"Canuto L, Santos L, Vieira L, Gon\u00e7alves R, Rabad\u00e2o C (2019) CoAP flow signatures for the internet of things. In: 2019 14th Iberian conference on information systems and technologies (CISTI) (IEEE, 2019), pp 1\u20136","DOI":"10.23919\/CISTI.2019.8760759"},{"key":"6441_CR35","doi-asserted-by":"crossref","unstructured":"Bediya AK, Kumar R (2020) Real time DDoS intrusion detection and monitoring framework in 6LoWPAN for internet of things. In: 2020 IEEE international conference on computing, power and communication technologies (GUCON) (IEEE, 2020), pp 824\u2013828","DOI":"10.1109\/GUCON48875.2020.9231139"},{"key":"6441_CR36","doi-asserted-by":"crossref","unstructured":"Yaqoob I, Salah K, Jayaraman R, Al-Hammadi Y (2021) Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput Appl pp. 1\u201316","DOI":"10.1007\/s00521-020-05519-w"},{"issue":"5","key":"6441_CR37","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.3390\/s19051114","volume":"19","author":"L Fernandez Maimo","year":"2019","unstructured":"Fernandez Maimo L, Huertas Celdran A, Perales Gomez AL, Garcia Clemente FJ, Weimer J, Lee I (2019) Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments. Sensors 19(5):1114","journal-title":"Sensors"},{"key":"6441_CR38","doi-asserted-by":"crossref","unstructured":"Hathaliya JJ, Tanwar S (2020) An exhaustive survey on security and privacy issues in Healthcare 4.0. Comput Commun 153: 311","DOI":"10.1016\/j.comcom.2020.02.018"},{"key":"6441_CR39","unstructured":"Wasilak M (2018) txthings. https:\/\/pypi.org\/project\/txThings"},{"key":"6441_CR40","unstructured":"Liljedahl F (2019) Exploring the possibilities of robustness testing of coap implementations using evolutionary fuzzing"},{"key":"6441_CR41","unstructured":"Alexander O, Belisle M, Steele J (2020) Mitre att&ck$${\\mathring{R}}$$ for industrial control systems: design and philosophy"},{"issue":"3","key":"6441_CR42","first-page":"877","volume":"20","author":"CC Wu","year":"2019","unstructured":"Wu CC, Cheng RS, Hsu CW, Wu LW (2019) Lightweight, low-rate denial-of-service attack prevention and control program for IoT devices. J Internet Technol 20(3):877","journal-title":"J Internet Technol"},{"key":"6441_CR43","doi-asserted-by":"crossref","unstructured":"Dahiya A, Gupta BB (2020) A QoS ensuring two-layered multi-attribute auction mechanism to mitigate DDoS attack. Mobile Netw Appl, pp 1\u201316","DOI":"10.1007\/s11036-020-01665-6"},{"issue":"10","key":"6441_CR44","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff K, Srivastava RK, Koutn\u00edk J, Steunebrink BR, Schmidhuber J (2016) LSTM: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"6441_CR45","doi-asserted-by":"crossref","unstructured":"Hartke K (2015) Observing resources in the constrained application protocol (CoAP), IETF RFC 7641","DOI":"10.17487\/RFC7641"},{"key":"6441_CR46","unstructured":"Maciej Wasilak CA The python coap library. https:\/\/aiocoap.readthedocs.io\/en\/latest\/"},{"key":"6441_CR47","doi-asserted-by":"crossref","unstructured":"Selander G, Mattsson J, Palombini F, Seitz L (2019) Object security for constrained restful environments (oscore). Work in Progress","DOI":"10.17487\/RFC8613"},{"issue":"10","key":"6441_CR48","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.3390\/electronics8101081","volume":"8","author":"G Marques","year":"2019","unstructured":"Marques G, Pitarma R, Garcia NM, Pombo N (2019) Internet of things architectures, technologies, applications, challenges, and future directions for enhanced living environments and healthcare systems: a review. Electronics 8(10):1081","journal-title":"Electronics"},{"key":"6441_CR49","doi-asserted-by":"crossref","unstructured":"Jaber AN, Zolkipli MF, Shakir HA, Jassim MR (2017) Host based intrusion detection and prevention model against DDoS attack in cloud computing. In: International conference on P2P. Parallel, grid, cloud and internet computing (Springer), pp 241\u2013252","DOI":"10.1007\/978-3-319-69835-9_23"},{"key":"6441_CR50","doi-asserted-by":"crossref","unstructured":"Mirkhan M, Haeri MA, Meybodi MR (2019) Analytical split value calculation for numerical attributes in hoeffding trees with misclassification-based impurity. Ann Data Sci, pp 1\u201321","DOI":"10.1007\/s40745-019-00225-4"},{"key":"6441_CR51","doi-asserted-by":"crossref","unstructured":"Al-Hawawreh MS (2017) SYN flood attack detection in cloud environment based on TCP\/IP header statistical features. In: 2017 8th international conference on information technology (ICIT) (IEEE, 2017), pp 236\u2013243","DOI":"10.1109\/ICITECH.2017.8080006"},{"issue":"3","key":"6441_CR52","doi-asserted-by":"publisher","first-page":"033024","DOI":"10.1117\/1.JEI.28.3.033024","volume":"28","author":"C Qian","year":"2019","unstructured":"Qian C, Cai X, Zhu J, Xu Y, Tang Z, Li C (2019) Learning large margin support correlation filter for visual tracking. J Electron Imag 28(3):033024","journal-title":"J Electron Imag"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06441-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-06441-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06441-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T23:05:33Z","timestamp":1744153533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-06441-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,8]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["6441"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-06441-5","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,8]]},"assertion":[{"value":"28 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}