{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:48:47Z","timestamp":1776077327451,"version":"3.50.1"},"reference-count":115,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T00:00:00Z","timestamp":1737504000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T00:00:00Z","timestamp":1737504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00099-4","type":"journal-article","created":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T13:47:54Z","timestamp":1737553674000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review"],"prefix":"10.1007","volume":"5","author":[{"given":"S. Kumar Reddy","family":"Mallidi","sequence":"first","affiliation":[]},{"given":"Rajeswara Rao","family":"Ramisetty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,22]]},"reference":[{"key":"99_CR1","unstructured":"Vailshery LS. Number of IoT connected devices worldwide 2022 to 2023, with forecasts from 2024 to 2033. Statista. 2022. Accessed 20 Jun 2022."},{"key":"99_CR2","unstructured":"Duarte F. Number of IoT devices. explodingtopics. 2024. Accessed 19 Feb 2024"},{"key":"99_CR3","unstructured":"Petrosyan A. Increase of customers targeted by IoT malware 2022, by sector. Statista. https:\/\/www.statista.com\/statistics\/1359165\/global-increase-in-annual-share-of-customers-targeted-by-iot-malware\/. Accessed 22 Nov 2023."},{"key":"99_CR4","unstructured":"Petrosyan A. Global annual number of IoT cyber attacks 2018-2022. Statista. https:\/\/www.statista.com\/statistics\/1377569\/worldwide-annual-internet-of-things-attacks\/. Accessed 05 Jan 2024."},{"key":"99_CR5","unstructured":"Staff C. Guarding Against IoT Attacks: Strategies and Best Practices. coursera. 2024. https:\/\/www.coursera.org\/articles\/iot-attacks. Accessed 14 Mar 2024."},{"key":"99_CR6","unstructured":"Infisim: 2024 IoT malware trends: Navigating the evolving landscape of cyber threats. 2024. https:\/\/infisim.com\/blog\/iot-malware-trends. Accessed 18 Mar 2024."},{"key":"99_CR7","unstructured":"Daws R. Luis Mirabal, Globalstar: Satellite IoT for increased efficiency and cost reduction. IoT News. 2024. https:\/\/www.iottechnews.com\/news\/2024\/jun\/03\/luis-mirabal-globalstar-satellite-iot-increased-efficiency-cost-reduction\/. Accessed 15 Jun 2024."},{"key":"99_CR8","unstructured":"TelenorIoT: AIoT to Emerge as the Defining Enabler of Digital Transformation. 2024. https:\/\/iot.telenor.com\/technologies\/iot-trends\/aiot\/. Accessed 02 Nov 2024."},{"key":"99_CR9","unstructured":"Analytics I. State of IoT Spring 2024. 2024. https:\/\/iot-analytics.com\/product\/state-of-iot-spring-2024\/. Accessed 03 Jan 2024."},{"key":"99_CR10","unstructured":"Networks PA. 2023 Benchmark Report on IoT Security. 2023. https:\/\/start.paloaltonetworks.com\/2023-benchmark-report-on-iot-security. Accessed 11 Dec 2023."},{"key":"99_CR11","unstructured":"Daws R. IoT Security Remains a Top Concern for Enterprises in 2024. IoT News. 2024. https:\/\/www.iottechnews.com\/news\/2024\/feb\/14\/iot-security-remains-top-concern-enterprises-in-2024\/. Accessed 25 Feb 2024."},{"issue":"3","key":"99_CR12","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11277-020-07134-3","volume":"112","author":"SS Dhanda","year":"2020","unstructured":"Dhanda SS, Singh B, Jindal P. Lightweight cryptography: a solution to secure IoT. Wireless Pers Commun. 2020;112(3):1947\u201380. https:\/\/doi.org\/10.1007\/s11277-020-07134-3.","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"99_CR13","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1007\/s11276-020-02535-5","volume":"27","author":"SK Mousavi","year":"2021","unstructured":"Mousavi SK, Ghaffari A, Besharat S, Afshari H. Security of internet of things based on cryptographic algorithms: a survey. Wireless Netw. 2021;27(2):1515\u201355. https:\/\/doi.org\/10.1007\/s11276-020-02535-5.","journal-title":"Wireless Netw"},{"key":"99_CR14","doi-asserted-by":"publisher","DOI":"10.3390\/s21051809","author":"P Malhotra","year":"2021","unstructured":"Malhotra P, Singh Y, Anand P, Bangotra DK, Singh PK, Hong W-C. Internet of things: evolution, concerns and security challenges. Sensors. 2021. https:\/\/doi.org\/10.3390\/s21051809.","journal-title":"Sensors"},{"key":"99_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/app10124102","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M. Iot privacy and security: challenges and solutions. Appl Sci. 2020. https:\/\/doi.org\/10.3390\/app10124102.","journal-title":"Appl Sci"},{"key":"99_CR16","doi-asserted-by":"publisher","first-page":"219709","DOI":"10.1109\/ACCESS.2020.3037359","volume":"8","author":"S Khanam","year":"2020","unstructured":"Khanam S, Ahmedy IB, Idna Idris MY, Jaward MH, Bin Md Sabri AQ. A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access. 2020;8:219709\u201343. https:\/\/doi.org\/10.1109\/ACCESS.2020.3037359.","journal-title":"IEEE Access"},{"issue":"1","key":"99_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101866","volume":"36","author":"GA Mukhaini","year":"2024","unstructured":"Mukhaini GA, Anbar M, Manickam S, Al-Amiedy TA, Momani AA. A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in internet of things networks. J King Saud Univ Comp Info Sci. 2024;36(1): 101866. https:\/\/doi.org\/10.1016\/j.jksuci.2023.101866.","journal-title":"J King Saud Univ Comp Info Sci"},{"key":"99_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04388-5","author":"R Saadouni","year":"2024","unstructured":"Saadouni R, Gherbi C, Aliouat Z, Harbi Y, Khacha A. Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature. Cluster Comput. 2024. https:\/\/doi.org\/10.1007\/s10586-024-04388-5.","journal-title":"Cluster Comput."},{"issue":"6","key":"99_CR19","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari A, Jabraeil Jamali MA. Internet of things intrusion detection systems: a comprehensive review and future directions. Clust Comput. 2023;26(6):3753\u201380. https:\/\/doi.org\/10.1007\/s10586-022-03776-z.","journal-title":"Clust Comput"},{"issue":"1","key":"99_CR20","doi-asserted-by":"publisher","first-page":"8981988","DOI":"10.1155\/2023\/8981988","volume":"2023","author":"SVN Santhosh Kumar","year":"2023","unstructured":"Santhosh Kumar SVN, Selvi M, Kannan A. A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Comput Intell Neurosci. 2023;2023(1):8981988. https:\/\/doi.org\/10.1155\/2023\/8981988.","journal-title":"Comput Intell Neurosci"},{"key":"99_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108661","volume":"203","author":"EM Campos","year":"2022","unstructured":"Campos EM, Saura PF, Gonz\u00e1lez-Vidal A, Hern\u00e1ndez-Ramos JL, Bernab\u00e9 JB, Baldini G, Skarmeta A. Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput Netw. 2022;203: 108661. https:\/\/doi.org\/10.1016\/j.comnet.2021.108661.","journal-title":"Comput Netw"},{"key":"99_CR22","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jpdc.2022.01.015","volume":"162","author":"U Farooq","year":"2022","unstructured":"Farooq U, Tariq N, Asim M, Baker T, Al-Shamma\u2019a A. Machine learning and the internet of things security: solutions and open challenges. J Parallel Distrib Comput. 2022;162:89\u2013104. https:\/\/doi.org\/10.1016\/j.jpdc.2022.01.015.","journal-title":"J Parallel Distrib Comput"},{"key":"99_CR23","doi-asserted-by":"publisher","DOI":"10.3390\/s22103744","author":"E Gyamfi","year":"2022","unstructured":"Gyamfi E, Jurcut A. Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets. Sensors. 2022. https:\/\/doi.org\/10.3390\/s22103744.","journal-title":"Sensors."},{"issue":"1","key":"99_CR24","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat A, Alazab A. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity. 2021;4(1):18. https:\/\/doi.org\/10.1186\/s42400-021-00077-7.","journal-title":"Cybersecurity"},{"issue":"4","key":"99_CR25","doi-asserted-by":"publisher","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","volume":"28","author":"A Thakkar","year":"2021","unstructured":"Thakkar A, Lohiya R. A review on machine learning and deep learning perspectives of ids for IoT: recent updates, security issues, and challenges. Arch Comput Methods Eng. 2021;28(4):3211\u201343. https:\/\/doi.org\/10.1007\/s11831-020-09496-0.","journal-title":"Arch Comput Methods Eng"},{"key":"99_CR26","doi-asserted-by":"publisher","unstructured":"Petticrew M, Roberts H. Systematic reviews in the social sciences: a practical guide. Blackwell Publishing. 2006. https:\/\/doi.org\/10.1002\/9780470754887.","DOI":"10.1002\/9780470754887"},{"key":"99_CR27","doi-asserted-by":"publisher","unstructured":"Sommer R, Paxson V. Outside the closed world: On using machine learning for network intrusion detection. In: Proceedings of the IEEE Symposium on Security and Privacy, IEEE 2010. https:\/\/doi.org\/10.1109\/SP.2010.25 .","DOI":"10.1109\/SP.2010.25"},{"key":"99_CR28","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2017","unstructured":"Ahmed M, Mahmood AN, Hu J. A survey of network anomaly detection techniques. J Netw Comput Appl. 2017;60:19\u201331. https:\/\/doi.org\/10.1016\/j.jnca.2015.11.016.","journal-title":"J Netw Comput Appl"},{"issue":"12","key":"99_CR29","doi-asserted-by":"publisher","first-page":"13241","DOI":"10.1007\/s11227-023-05197-0","volume":"79","author":"O Elnakib","year":"2023","unstructured":"Elnakib O, Shaaban E, Mahmoud M, Emara K. EIDM: deep learning model for IoT intrusion detection systems. J Supercomput. 2023;79(12):13241\u201361. https:\/\/doi.org\/10.1007\/s11227-023-05197-0.","journal-title":"J Supercomput"},{"issue":"1","key":"99_CR30","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy MF, Awad AI, Hamed HFA. Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput. 2018;7(1):21. https:\/\/doi.org\/10.1186\/s13677-018-0123-6.","journal-title":"J Cloud Comput"},{"issue":"1","key":"99_CR31","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s43926-023-00034-5","volume":"3","author":"M Bhavsar","year":"2023","unstructured":"Bhavsar M, Roy K, Kelly J, Olusola O. Anomaly-based intrusion detection system for IoT application. Discov IoT. 2023;3(1):5. https:\/\/doi.org\/10.1007\/s43926-023-00034-5.","journal-title":"Discov IoT"},{"key":"99_CR32","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071120","author":"C Liang","year":"2020","unstructured":"Liang C, Shanmugam B, Azam S, Karim A, Islam A, Zamani M, Kavianpour S, Idris NB. Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics. 2020. https:\/\/doi.org\/10.3390\/electronics9071120.","journal-title":"Electronics."},{"key":"99_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102324","volume":"61","author":"MA Rahman","year":"2020","unstructured":"Rahman MA, Asyhari AT, Leong LS, Satrya GB, Hai Tao M, Zolkipli MF. Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc. 2020;61: 102324. https:\/\/doi.org\/10.1016\/j.scs.2020.102324.","journal-title":"Sustain Cities Soc"},{"issue":"10","key":"99_CR34","doi-asserted-by":"publisher","first-page":"9555","DOI":"10.1007\/s12652-020-02696-3","volume":"12","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R. A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J Ambient Intell Humaniz Comput. 2021;12(10):9555\u201372. https:\/\/doi.org\/10.1007\/s12652-020-02696-3.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"9","key":"99_CR35","doi-asserted-by":"publisher","first-page":"10488","DOI":"10.1007\/s11227-021-03697-5","volume":"77","author":"S Gavel","year":"2021","unstructured":"Gavel S, Raghuvanshi AS, Tiwari S. Distributed intrusion detection scheme using dual-axis dimensionality reduction for internet of things (IoT). J Supercomput. 2021;77(9):10488\u2013511. https:\/\/doi.org\/10.1007\/s11227-021-03697-5.","journal-title":"J Supercomput"},{"issue":"8","key":"99_CR36","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari M, Janjua ZH, Vecchio M, Antonelli F. Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 2020;7(8):6882\u201397. https:\/\/doi.org\/10.1109\/JIOT.2020.2970501.","journal-title":"IEEE Internet Things J"},{"key":"99_CR37","doi-asserted-by":"publisher","unstructured":"Bovenzi G, Aceto G, Ciuonzo D, Persico V, Pescap\u00e9 A. A hierarchical hybrid intrusion detection approach in iot scenarios. In: GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020;1\u20137. https:\/\/doi.org\/10.1109\/GLOBECOM42002.2020.9348167","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"issue":"8","key":"99_CR38","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","volume":"17","author":"B Li","year":"2021","unstructured":"Li B, Wu Y, Song J, Lu R, Li T, Zhao L. Deepfed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans Industr Inf. 2021;17(8):5615\u201324. https:\/\/doi.org\/10.1109\/TII.2020.3023430.","journal-title":"IEEE Trans Industr Inf"},{"issue":"6","key":"99_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics13061053","volume":"13","author":"S Yaras","year":"2024","unstructured":"Yaras S, Dener M. IoT-based intrusion detection system using new hybrid deep learning algorithm. Electronics. 2024;13(6):1. https:\/\/doi.org\/10.3390\/electronics13061053.","journal-title":"Electronics"},{"key":"99_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.fraope.2023.100056","volume":"6","author":"Z Sun","year":"2024","unstructured":"Sun Z, An G, Yang Y, Liu Y. Optimized machine learning enabled intrusion detection 2 system for internet of medical things. Franklin Open. 2024;6: 100056. https:\/\/doi.org\/10.1016\/j.fraope.2023.100056.","journal-title":"Franklin Open"},{"issue":"1","key":"99_CR41","doi-asserted-by":"publisher","first-page":"37","DOI":"10.22044\/jadm.2023.13539.2471","volume":"12","author":"R Morshedi","year":"2024","unstructured":"Morshedi R, Matinkhah SM, Sadeghi MT. Intrusion detection for IoT network security with deep learning. J AI Data Mining. 2024;12(1):37\u201355. https:\/\/doi.org\/10.22044\/jadm.2023.13539.2471.","journal-title":"J AI Data Mining"},{"key":"99_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103784","volume":"221","author":"S Latif","year":"2024","unstructured":"Latif S, Boulila W, Koubaa A, Zou Z, Ahmad J. Dtl-ids: An optimized intrusion detection framework using deep transfer learning and genetic algorithm. J Netw Comput Appl. 2024;221: 103784. https:\/\/doi.org\/10.1016\/j.jnca.2023.103784.","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"99_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/math12040571","volume":"12","author":"D Kilichev","year":"2024","unstructured":"Kilichev D, Turimov D, Kim W. Next-generation intrusion detection for IoT EVCS: Integrating CNN, LSTM, and GRU models. Mathematics. 2024;12(4):1. https:\/\/doi.org\/10.3390\/math12040571.","journal-title":"Mathematics"},{"issue":"1","key":"99_CR44","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1038\/s41598-023-50554-x","volume":"14","author":"M Karthikeyan","year":"2024","unstructured":"Karthikeyan M, Manimegalai D, RajaGopal K. Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection. Sci Rep. 2024;14(1):231. https:\/\/doi.org\/10.1038\/s41598-023-50554-x.","journal-title":"Sci Rep"},{"issue":"4","key":"99_CR45","doi-asserted-by":"publisher","first-page":"929","DOI":"10.26599\/TST.2023.9010033","volume":"29","author":"C Hazman","year":"2024","unstructured":"Hazman C, Guezzaz A, Benkirane S, Azrour M. Enhanced ids with deep learning for IoT-based smart cities security. Tsinghua Sci Technol. 2024;29(4):929\u201347. https:\/\/doi.org\/10.26599\/TST.2023.9010033.","journal-title":"Tsinghua Sci Technol"},{"issue":"1","key":"99_CR46","doi-asserted-by":"publisher","first-page":"2321381","DOI":"10.1080\/21642583.2024.2321381","volume":"12","author":"A Almotairi","year":"2024","unstructured":"Almotairi A, Atawneh S, Khashan OA, Khafajah NM. Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models. Syst Sci Control Eng. 2024;12(1):2321381. https:\/\/doi.org\/10.1080\/21642583.2024.2321381.","journal-title":"Syst Sci Control Eng"},{"key":"99_CR47","doi-asserted-by":"publisher","DOI":"10.3390\/s23249869","author":"A Aldaej","year":"2023","unstructured":"Aldaej A, Ahanger TA, Ullah I. Deep learning-inspired IoT-IDS mechanism for edge computing environments. Sensors. 2023. https:\/\/doi.org\/10.3390\/s23249869.","journal-title":"Sensors."},{"key":"99_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108439","volume":"118","author":"L Gupta","year":"2022","unstructured":"Gupta L, Salman T, Ghubaish A, Unal D, Al-Ali AK, Jain R. Cybersecurity of multi-cloud healthcare systems: a hierarchical deep learning approach. Appl Soft Comput. 2022;118: 108439. https:\/\/doi.org\/10.1016\/j.asoc.2022.108439.","journal-title":"Appl Soft Comput"},{"key":"99_CR49","doi-asserted-by":"publisher","unstructured":"Gad AR, Haggag M, Nashat AA, Barakat TM. A distributed intrusion detection system using machine learning for IoT based on TON-IoT dataset. Int J Adv Comp Sci Appl. 2022; https:\/\/doi.org\/10.14569\/IJACSA.2022.0130667.","DOI":"10.14569\/IJACSA.2022.0130667"},{"issue":"1","key":"99_CR50","doi-asserted-by":"publisher","first-page":"3424819","DOI":"10.1155\/2022\/3424819","volume":"2022","author":"A Alferaidi","year":"2022","unstructured":"Alferaidi A, Yadav K, Alharbi Y, Razmjooy N, Viriyasitavat W, Gulati K, Kautish S, Dhiman G. Distributed deep CNN-LSTM model for intrusion detection method in IoT-based vehicles. Math Probl Eng. 2022;2022(1):3424819. https:\/\/doi.org\/10.1155\/2022\/3424819.","journal-title":"Math Probl Eng"},{"key":"99_CR51","doi-asserted-by":"publisher","first-page":"88263","DOI":"10.1109\/ACCESS.2022.3200477","volume":"10","author":"F Alasmary","year":"2022","unstructured":"Alasmary F, Alraddadi S, Al-Ahmadi S, Al-Muhtadi J. Shieldrnn: a distributed flow-based DDOS detection solution for IoT using sequence majority voting. IEEE Access. 2022;10:88263\u201375. https:\/\/doi.org\/10.1109\/ACCESS.2022.3200477.","journal-title":"IEEE Access"},{"key":"99_CR52","doi-asserted-by":"publisher","first-page":"14271","DOI":"10.1109\/ACCESS.2021.3051530","volume":"9","author":"A Tabassum","year":"2021","unstructured":"Tabassum A, Erbad A, Mohamed A, Guizani M. Privacy-preserving distributed ids using incremental learning for IoT health systems. IEEE Access. 2021;9:14271\u201383. https:\/\/doi.org\/10.1109\/ACCESS.2021.3051530.","journal-title":"IEEE Access"},{"key":"99_CR53","doi-asserted-by":"publisher","first-page":"81736","DOI":"10.1109\/ACCESS.2024.3410046","volume":"12","author":"SS Mahadik","year":"2024","unstructured":"Mahadik SS, Pawar PM, Muthalagu R. Edge-federated learning-based intelligent intrusion detection system for heterogeneous internet of things. IEEE Access. 2024;12:81736\u201357. https:\/\/doi.org\/10.1109\/ACCESS.2024.3410046.","journal-title":"IEEE Access"},{"key":"99_CR54","doi-asserted-by":"publisher","first-page":"52215","DOI":"10.1109\/ACCESS.2024.3386631","volume":"12","author":"MH Bhavsar","year":"2024","unstructured":"Bhavsar MH, Bekele YB, Roy K, Kelly JC, Limbrick D. Fl-ids: Federated learning-based intrusion detection system using edge devices for transportation IoT. IEEE Access. 2024;12:52215\u201326. https:\/\/doi.org\/10.1109\/ACCESS.2024.3386631.","journal-title":"IEEE Access"},{"key":"99_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103388","volume":"133","author":"I Zakariyya","year":"2023","unstructured":"Zakariyya I, Kalutarage H, Al-Kadri MO. Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring. Comp Secur. 2023;133: 103388. https:\/\/doi.org\/10.1016\/j.cose.2023.103388.","journal-title":"Comp Secur"},{"key":"99_CR56","doi-asserted-by":"publisher","first-page":"7157","DOI":"10.1109\/ACCESS.2023.3237554","volume":"11","author":"J Jithish","year":"2023","unstructured":"Jithish J, Alangot B, Mahalingam N, Yeo KS. Distributed anomaly detection in smart grids: a federated learning-based approach. IEEE Access. 2023;11:7157\u201379. https:\/\/doi.org\/10.1109\/ACCESS.2023.3237554.","journal-title":"IEEE Access"},{"key":"99_CR57","unstructured":"Chathoth AK, Jagannatha A, Lee S. Federated intrusion detection for iot with heterogeneous cohort privacy. CoRR arXiv:2101.09878. 2021"},{"key":"99_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103540","volume":"162","author":"D Javeed","year":"2024","unstructured":"Javeed D, Saeed MS, Adil M, Kumar P, Jolfaei A. A federated learning-based zero trust intrusion detection system for internet of things. Ad Hoc Netw. 2024;162: 103540. https:\/\/doi.org\/10.1016\/j.adhoc.2024.103540.","journal-title":"Ad Hoc Netw"},{"key":"99_CR59","doi-asserted-by":"publisher","first-page":"2518","DOI":"10.1016\/j.matpr.2021.06.400","volume":"80","author":"C Malathi","year":"2023","unstructured":"Malathi C, Padmaja IN. Identification of cyber attacks using machine learning in smart IoT networks. Mater Today Proc. 2023;80:2518\u201323. https:\/\/doi.org\/10.1016\/j.matpr.2021.06.400. (SI:5 NANO 2021).","journal-title":"Mater Today Proc"},{"key":"99_CR60","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.ins.2019.10.069","volume":"513","author":"MM Hassan","year":"2020","unstructured":"Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G. A hybrid deep learning model for efficient intrusion detection in big data environment. Inf Sci. 2020;513:386\u201396. https:\/\/doi.org\/10.1016\/j.ins.2019.10.069.","journal-title":"Inf Sci"},{"issue":"1","key":"99_CR61","doi-asserted-by":"publisher","first-page":"6473507","DOI":"10.1155\/2022\/6473507","volume":"2022","author":"A Dahou","year":"2022","unstructured":"Dahou A, Abd\u00a0Elaziz M, Chelloug SA, Awadallah MA, Al-Betar MA, Al-qaness MAA, Forestiero A. Intrusion detection system for IoT based on deep learning and modified reptile search algorithm. Comput Intell Neurosci. 2022;2022(1):6473507. https:\/\/doi.org\/10.1155\/2022\/6473507.","journal-title":"Comput Intell Neurosci"},{"key":"99_CR62","doi-asserted-by":"publisher","unstructured":"Pantelakis V, Bountakas P, Farao A, Xenakis C. Adversarial machine learning attacks on multiclass classification of iot network traffic. In: Proceedings of the 18th International Conference on Availability, Reliability and Security. ARES \u201923. Association for Computing Machinery, New York, NY, USA 2023. https:\/\/doi.org\/10.1145\/3600160.3605086 .","DOI":"10.1145\/3600160.3605086"},{"key":"99_CR63","doi-asserted-by":"publisher","DOI":"10.3390\/app9020238","author":"Y Yang","year":"2019","unstructured":"Yang Y, Zheng K, Wu C, Niu X, Yang Y. Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks. Appl Sci. 2019. https:\/\/doi.org\/10.3390\/app9020238.","journal-title":"Appl Sci."},{"key":"99_CR64","doi-asserted-by":"publisher","first-page":"127669","DOI":"10.1109\/ACCESS.2023.3332213","volume":"11","author":"M Alajmi","year":"2023","unstructured":"Alajmi M, Mengash HA, Alqahtani H, Aljameel SS, Hamza MA, Salama AS. Automated threat detection using flamingo search algorithm with optimal deep learning on cyber-physical system environment. IEEE Access. 2023;11:127669\u201378. https:\/\/doi.org\/10.1109\/ACCESS.2023.3332213.","journal-title":"IEEE Access"},{"key":"99_CR65","doi-asserted-by":"publisher","first-page":"79256","DOI":"10.1109\/ACCESS.2023.3298056","volume":"11","author":"H Alamro","year":"2023","unstructured":"Alamro H, Mahmood K, Aljameel SS, Yafoz A, Alsini R, Mohamed A. Modified red fox optimizer with deep learning enabled false data injection attack detection. IEEE Access. 2023;11:79256\u201364. https:\/\/doi.org\/10.1109\/ACCESS.2023.3298056.","journal-title":"IEEE Access"},{"issue":"1","key":"99_CR66","doi-asserted-by":"publisher","first-page":"3955514","DOI":"10.1155\/2022\/3955514","volume":"2022","author":"A Raghuvanshi","year":"2022","unstructured":"Raghuvanshi A, Singh UK, Sajja GS, Pallathadka H, Asenso E, Kamal M, Singh A, Phasinam K. Intrusion detection using machine learning for risk mitigation in iot-enabled smart irrigation in smart farming. J Food Qual. 2022;2022(1):3955514. https:\/\/doi.org\/10.1155\/2022\/3955514.","journal-title":"J Food Qual."},{"key":"99_CR67","doi-asserted-by":"publisher","unstructured":"Ioannou C, Vassiliou V. Classifying security attacks in iot networks using supervised learning. In: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019;652\u2013658. https:\/\/doi.org\/10.1109\/DCOSS.2019.00118","DOI":"10.1109\/DCOSS.2019.00118"},{"key":"99_CR68","doi-asserted-by":"publisher","unstructured":"Chaudhary P, Gupta BB. Ddos detection framework in resource constrained internet of things domain. In: 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), 2019;675\u2013678. https:\/\/doi.org\/10.1109\/GCCE46687.2019.9015465","DOI":"10.1109\/GCCE46687.2019.9015465"},{"key":"99_CR69","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.future.2020.02.017","volume":"107","author":"M Shafiq","year":"2020","unstructured":"Shafiq M, Tian Z, Sun Y, Du X, Guizani M. Selection of effective machine learning algorithm and bot-IoT attacks traffic identification for internet of things in smart city. Futur Gener Comput Syst. 2020;107:433\u201342. https:\/\/doi.org\/10.1016\/j.future.2020.02.017.","journal-title":"Futur Gener Comput Syst"},{"key":"99_CR70","doi-asserted-by":"publisher","unstructured":"Kocher G, Kumar G. Analysis of machine learning algorithms with feature selection for intrusion detection using unsw-nb15 dataset. 2021;13(1):21\u201331. https:\/\/doi.org\/10.2139\/ssrn.3784406.","DOI":"10.2139\/ssrn.3784406"},{"key":"99_CR71","doi-asserted-by":"publisher","unstructured":"Alrashdi I, Alqazzaz A, Aloufi E, Alharthi R, Zohdy M, Ming H. Ad-iot: Anomaly detection of iot cyberattacks in smart city using machine learning. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019; 0305\u20130310. https:\/\/doi.org\/10.1109\/CCWC.2019.8666450","DOI":"10.1109\/CCWC.2019.8666450"},{"issue":"4","key":"99_CR72","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","volume":"111","author":"A Verma","year":"2020","unstructured":"Verma A, Ranga V. Machine learning based intrusion detection systems for IoT applications. Wireless Pers Commun. 2020;111(4):2287\u2013310. https:\/\/doi.org\/10.1007\/s11277-019-06986-8.","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"99_CR73","doi-asserted-by":"publisher","first-page":"1668676","DOI":"10.1155\/2022\/1668676","volume":"2022","author":"D Rani","year":"2022","unstructured":"Rani D, Gill NS, Gulia P, Chatterjee JM. An ensemble-based multiclass classifier for intrusion detection using internet of things. Comput Intell Neurosci. 2022;2022(1):1668676. https:\/\/doi.org\/10.1155\/2022\/1668676.","journal-title":"Comput Intell Neurosci."},{"key":"99_CR74","doi-asserted-by":"publisher","DOI":"10.3390\/computers11100142","author":"S Kaushik","year":"2022","unstructured":"Kaushik S, Bhardwaj A, Alomari A, Bharany S, Alsirhani A, Mujib Alshahrani M. Efficient, lightweight cyber intrusion detection system for iot ecosystems using mi2g algorithm. Computers. 2022. https:\/\/doi.org\/10.3390\/computers11100142.","journal-title":"Computers."},{"key":"99_CR75","doi-asserted-by":"publisher","unstructured":"Guezzaz A, Azrour M, Benkirane S, Mohy-eddine M, Attou H, Douiba M. A lightweight hybrid intrusion detection framework using machine learning for edge-based iiot security. Int Arab J Info Technol 2022. https:\/\/doi.org\/10.34028\/iajit\/19\/5\/14","DOI":"10.34028\/iajit\/19\/5\/14"},{"key":"99_CR76","doi-asserted-by":"publisher","unstructured":"Lopez MM, Shao S, Hariri S, Salehi S. Machine learning for intrusion detection: Stream classification guided by clustering for sustainable security in IoT. In: Proceedings of the Great Lakes Symposium on VLSI 2023. GLSVLSI \u201923, pp. 691\u2013696. Association for Computing Machinery, New York, NY, USA 2023. https:\/\/doi.org\/10.1145\/3583781.3590271 .","DOI":"10.1145\/3583781.3590271"},{"issue":"1","key":"99_CR77","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s42400-022-00133-w","volume":"6","author":"R Alghamdi","year":"2023","unstructured":"Alghamdi R, Bellaiche M. An ensemble deep learning based ids for IoT using lambda architecture. Cybersecurity. 2023;6(1):5. https:\/\/doi.org\/10.1186\/s42400-022-00133-w.","journal-title":"Cybersecurity"},{"key":"99_CR78","doi-asserted-by":"publisher","DOI":"10.3390\/s22020432","author":"X-H Nguyen","year":"2022","unstructured":"Nguyen X-H, Nguyen X-D, Huynh H-H, Le K-H. Realguard: A lightweight network intrusion detection system for IoT gateways. Sensors. 2022. https:\/\/doi.org\/10.3390\/s22020432.","journal-title":"Sensors."},{"key":"99_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107450","volume":"154","author":"Y Li","year":"2020","unstructured":"Li Y, Xu Y, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y, Cui L. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement. 2020;154: 107450. https:\/\/doi.org\/10.1016\/j.measurement.2019.107450.","journal-title":"Measurement"},{"issue":"8","key":"99_CR80","doi-asserted-by":"publisher","first-page":"3135","DOI":"10.1007\/s00521-019-04152-6","volume":"32","author":"AS Qureshi","year":"2020","unstructured":"Qureshi AS, Khan A, Shamim N, Durad MH. Intrusion detection using deep sparse auto-encoder and self-taught learning. Neural Comput Appl. 2020;32(8):3135\u201347. https:\/\/doi.org\/10.1007\/s00521-019-04152-6.","journal-title":"Neural Comput Appl"},{"key":"99_CR81","doi-asserted-by":"publisher","first-page":"165907","DOI":"10.1109\/ACCESS.2021.3132127","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah I, Mahmoud QH. A framework for anomaly detection in IoT networks using conditional generative adversarial networks. IEEE Access. 2021;9:165907\u201331. https:\/\/doi.org\/10.1109\/ACCESS.2021.3132127.","journal-title":"IEEE Access"},{"key":"99_CR82","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941","author":"ECP Neto","year":"2023","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ciciot Ghorbani AA. A real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors. 2023. https:\/\/doi.org\/10.3390\/s23135941.","journal-title":"Sensors."},{"key":"99_CR83","doi-asserted-by":"publisher","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications: centralized and federated learning. https:\/\/doi.org\/10.21227\/mbc1-1h68.","DOI":"10.21227\/mbc1-1h68"},{"key":"99_CR84","unstructured":"Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R. WUSTL-IIOT-2021 Dataset for IIoT Cybersecurity Research. Washington University in St. Louis, USA. 2021. http:\/\/www.cse.wustl.edu\/~jain\/iiot2\/index.html"},{"key":"99_CR85","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-030-47358-7_52","volume-title":"Adv Artif Intell","author":"I Ullah","year":"2020","unstructured":"Ullah I, Mahmoud QH. A scheme for generating a dataset for anomalous activity detection in IoT networks. In: Goutte C, Zhu X, editors. Adv Artif Intell. Cham: Springer; 2020. p. 508\u201320."},{"key":"99_CR86","doi-asserted-by":"publisher","unstructured":"Hindy H, Tachtatzis C, Atkinson R, Bayne E, Bellekens X. MQTT-IoT-IDS2020: MQTT internet of things intrusion detection dataset. https:\/\/doi.org\/10.21227\/bhxy-ep04.","DOI":"10.21227\/bhxy-ep04"},{"key":"99_CR87","unstructured":"Moustafa N. New generations of internet of things datasets for cybersecurity applications based machine learning: Ton_iot datasets. In: Proceedings of the eResearch Australasia Conference, Brisbane, Australia 2019. https:\/\/research.unsw.edu.au\/projects\/toniot-datasets"},{"key":"99_CR88","doi-asserted-by":"publisher","unstructured":"Garcia S, Parmisano A, Erquiaga MJ. IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic. https:\/\/doi.org\/10.5281\/zenodo.4743745 . https:\/\/data.niaid.nih.gov\/resources?id=ZENODO_4743745","DOI":"10.5281\/zenodo.4743745"},{"key":"99_CR89","doi-asserted-by":"crossref","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Turnbull B. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset 2018. arXiv:1811.00701","DOI":"10.1016\/j.future.2019.05.041"},{"issue":"3","key":"99_CR90","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y. N-BAIOT-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018;17(3):12\u201322. https:\/\/doi.org\/10.1109\/MPRV.2018.03367731.","journal-title":"IEEE Pervasive Comput"},{"issue":"1","key":"99_CR91","doi-asserted-by":"publisher","first-page":"13","DOI":"10.21608\/ijicis.2024.262382.1315","volume":"24","author":"O Elnakib","year":"2024","unstructured":"Elnakib O, Shaaban E, Mahmoud M, Emara K. Federated learning enabled ids for internet of things on non-IID data. Int J Intell Comput Info Sci. 2024;24(1):13\u201328. https:\/\/doi.org\/10.21608\/ijicis.2024.262382.1315.","journal-title":"Int J Intell Comput Info Sci"},{"key":"99_CR92","doi-asserted-by":"publisher","DOI":"10.3390\/s24072188","author":"M Alazab","year":"2024","unstructured":"Alazab M, Awajan A, Alazzam H, Wedyan M, Alshawi B, Alturki R. A novel ids with a dynamic access control algorithm to detect and defend intrusion at IoT nodes. Sensors. 2024. https:\/\/doi.org\/10.3390\/s24072188.","journal-title":"Sensors."},{"issue":"9","key":"99_CR93","doi-asserted-by":"publisher","first-page":"15140","DOI":"10.1109\/JIOT.2023.3342638","volume":"11","author":"C Wang","year":"2024","unstructured":"Wang C, Xu D, Li Z, Niyato D. Effective intrusion detection in highly imbalanced IoT networks with lightweight s2cgan-ids. IEEE Internet Things J. 2024;11(9):15140\u201351. https:\/\/doi.org\/10.1109\/JIOT.2023.3342638.","journal-title":"IEEE Internet Things J"},{"key":"99_CR94","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1109\/ACCESS.2022.3233775","volume":"11","author":"OD Okey","year":"2023","unstructured":"Okey OD, Melgarejo DC, Saadi M, Rosa RL, Kleinschmidt JH, Rodr\u00edguez DZ. Transfer learning approach to IDS on cloud IoT devices using optimized CNN. IEEE Access. 2023;11:1023\u201338. https:\/\/doi.org\/10.1109\/ACCESS.2022.3233775.","journal-title":"IEEE Access"},{"issue":"2","key":"99_CR95","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10922-023-09722-7","volume":"31","author":"O Jullian","year":"2023","unstructured":"Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R. Deep-learning based detection for cyber-attacks in IoT networks: a distributed attack detection framework. J Netw Syst Manage. 2023;31(2):33. https:\/\/doi.org\/10.1007\/s10922-023-09722-7.","journal-title":"J Netw Syst Manage"},{"key":"99_CR96","doi-asserted-by":"publisher","first-page":"65675","DOI":"10.1109\/ACCESS.2023.3281893","volume":"11","author":"N Hussen","year":"2023","unstructured":"Hussen N, Elghamrawy SM, Salem M, El-Desouky AI. A fully streaming big data framework for cyber security based on optimized deep learning algorithm. IEEE Access. 2023;11:65675\u201388. https:\/\/doi.org\/10.1109\/ACCESS.2023.3281893.","journal-title":"IEEE Access"},{"key":"99_CR97","doi-asserted-by":"crossref","unstructured":"Belarbi O, Spyridopoulos T, Anthi E, Mavromatis I, Carnelli P, Khan A. Federated Deep Learning for Intrusion Detection in IoT Networks 2023. arXiv:2306.02715","DOI":"10.1109\/GLOBECOM54140.2023.10437860"},{"key":"99_CR98","doi-asserted-by":"publisher","first-page":"115668","DOI":"10.1109\/ACCESS.2023.3322369","volume":"11","author":"L Almuqren","year":"2023","unstructured":"Almuqren L, Alqahtani H, Aljameel SS, Salama AS, Yaseen I, Alneil AA. Hybrid metaheuristics with machine learning based botnet detection in cloud assisted internet of things environment. IEEE Access. 2023;11:115668\u201376. https:\/\/doi.org\/10.1109\/ACCESS.2023.3322369.","journal-title":"IEEE Access"},{"key":"99_CR99","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108693","volume":"204","author":"V Rey","year":"2022","unstructured":"Rey V, S\u00e1nchez S\u00e1nchez PM, Huertas Celdr\u00e1n A, Bovet G. Federated learning for malware detection in IoT devices. Comput Netw. 2022;204: 108693. https:\/\/doi.org\/10.1016\/j.comnet.2021.108693.","journal-title":"Comput Netw"},{"key":"99_CR100","doi-asserted-by":"publisher","unstructured":"Ponniah KK, Retnaswamy B A novel mwkf-lstm based intrusion detection system for the iot-cloud platform with efficient user authentication and data encryption models. Res Square 2022. https:\/\/doi.org\/10.21203\/rs.3.rs-1840953\/v1 . PREPRINT (Version 1)","DOI":"10.21203\/rs.3.rs-1840953\/v1"},{"issue":"4","key":"99_CR101","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","volume":"9","author":"V Mothukuri","year":"2022","unstructured":"Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G. Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 2022;9(4):2545\u201354. https:\/\/doi.org\/10.1109\/JIOT.2021.3077803.","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"99_CR102","doi-asserted-by":"publisher","first-page":"5087","DOI":"10.1109\/TII.2021.3116085","volume":"18","author":"W Liang","year":"2022","unstructured":"Liang W, Hu Y, Zhou X, Pan Y, Wang KI-K. Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT. IEEE Trans Industr Inf. 2022;18(8):5087\u201395. https:\/\/doi.org\/10.1109\/TII.2021.3116085.","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"99_CR103","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11277-022-09548-7","volume":"125","author":"Y Labiod","year":"2022","unstructured":"Labiod Y, Amara Korba A, Ghoualmi N. Fog computing-based intrusion detection architecture to protect IoT networks. Wireless Pers Commun. 2022;125(1):231\u201359. https:\/\/doi.org\/10.1007\/s11277-022-09548-7.","journal-title":"Wireless Pers Commun"},{"issue":"6","key":"99_CR104","doi-asserted-by":"publisher","first-page":"4059","DOI":"10.1109\/TII.2021.3088938","volume":"18","author":"J Li","year":"2022","unstructured":"Li J, Lyu L, Liu X, Zhang X, Lyu X. Fleam: a federated learning empowered architecture to mitigate DDOS in industrial IoT. IEEE Trans Industr Inf. 2022;18(6):4059\u201368. https:\/\/doi.org\/10.1109\/TII.2021.3088938.","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"99_CR105","doi-asserted-by":"publisher","first-page":"9173291","DOI":"10.1155\/2022\/9173291","volume":"2022","author":"N Dat-Thinh","year":"2022","unstructured":"Dat-Thinh N, Xuan-Ninh H, Kim-Hung L. Midsiot: a multistage intrusion detection system for internet of things. Wirel Commun Mob Comput. 2022;2022(1):9173291. https:\/\/doi.org\/10.1155\/2022\/9173291.","journal-title":"Wirel Commun Mob Comput"},{"issue":"1","key":"99_CR106","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s23010321","volume":"23","author":"N Abosata","year":"2023","unstructured":"Abosata N, Al-Rubaye S, Inalhan G. Customised intrusion detection for an industrial IoT heterogeneous network based on machine learning algorithms called ftl-cid. Sensors. 2023;23(1):1. https:\/\/doi.org\/10.3390\/s23010321.","journal-title":"Sensors"},{"key":"99_CR107","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10141633","author":"BS Khater","year":"2021","unstructured":"Khater BS, Abdul Wahab AW, Idris MYI, Hussain MA, Ibrahim AA, Amin MA, Shehadeh HA. Classifier performance evaluation for lightweight ids using fog computing in IoT security. Electronics. 2021. https:\/\/doi.org\/10.3390\/electronics10141633.","journal-title":"Electronics"},{"key":"99_CR108","doi-asserted-by":"publisher","first-page":"29696","DOI":"10.1109\/ACCESS.2021.3058528","volume":"9","author":"TT Huong","year":"2021","unstructured":"Huong TT, Bac TP, Long DM, Thang BD, Binh NT, Luong TD, Phuc TK. Lockedge: Low-complexity cyberattack detection in IoT edge computing. IEEE Access. 2021;9:29696\u2013710. https:\/\/doi.org\/10.1109\/ACCESS.2021.3058528.","journal-title":"IEEE Access"},{"key":"99_CR109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102662","volume":"163","author":"G De La Torre Parra","year":"2020","unstructured":"De La Torre Parra G, Rad P, Choo K-KR, Beebe N. Detecting internet of things attacks using distributed deep learning. J Netw Comput Appl. 2020;163: 102662. https:\/\/doi.org\/10.1016\/j.jnca.2020.102662.","journal-title":"J Netw Comput Appl"},{"key":"99_CR110","doi-asserted-by":"publisher","first-page":"73907","DOI":"10.1109\/ACCESS.2020.2988055","volume":"8","author":"J Pacheco","year":"2020","unstructured":"Pacheco J, Benitez VH, F\u00e9lix-Herr\u00e1n LC, Satam P. Artificial neural networks-based intrusion detection system for internet of things fog nodes. IEEE Access. 2020;8:73907\u201318. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988055.","journal-title":"IEEE Access"},{"key":"99_CR111","doi-asserted-by":"publisher","unstructured":"Khoa TV, Saputra YM, Hoang DT, Trung NL, Nguyen D, Ha NV, Dutkiewicz E. Collaborative learning model for cyberattack detection systems in iot industry 4.0. In: 2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020;1\u20136. https:\/\/doi.org\/10.1109\/WCNC45663.2020.9120761","DOI":"10.1109\/WCNC45663.2020.9120761"},{"issue":"11","key":"99_CR112","doi-asserted-by":"publisher","first-page":"7704","DOI":"10.1109\/TII.2020.3025755","volume":"17","author":"M Abdel-Basset","year":"2021","unstructured":"Abdel-Basset M, Chang V, Hawash H, Chakrabortty RK, Ryan M. Deep-IFS: intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Trans Industr Inf. 2021;17(11):7704\u201315. https:\/\/doi.org\/10.1109\/TII.2020.3025755.","journal-title":"IEEE Trans Industr Inf"},{"key":"99_CR113","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.cose.2019.05.016","volume":"85","author":"R Patil","year":"2019","unstructured":"Patil R, Dudeja H, Modi C. Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comp Secur. 2019;85:402\u201322. https:\/\/doi.org\/10.1016\/j.cose.2019.05.016.","journal-title":"Comp Secur"},{"key":"99_CR114","doi-asserted-by":"publisher","unstructured":"Nguyen TD, Marchal S, Miettinen M, Fereidooni H, Asokan N, Sadeghi A-R. D\u00cfot: A federated self-learning anomaly detection system for iot. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), 2019; 756\u2013767. https:\/\/doi.org\/10.1109\/ICDCS.2019.00080","DOI":"10.1109\/ICDCS.2019.00080"},{"issue":"1","key":"99_CR115","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.1007\/s10586-017-1105-z","volume":"22","author":"M Gajewski","year":"2019","unstructured":"Gajewski M, Batalla JM, Mastorakis G, Mavromoustakis CX. A distributedids architecture model for smart home systems. Clust Comput. 2019;22(1):1739\u201349. https:\/\/doi.org\/10.1007\/s10586-017-1105-z.","journal-title":"Clust Comput"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00099-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00099-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00099-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T13:48:03Z","timestamp":1737553683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00099-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,22]]},"references-count":115,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["99"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00099-4","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,22]]},"assertion":[{"value":"29 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"8"}}