{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:17:26Z","timestamp":1778347046550,"version":"3.51.4"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia (USM) through Short Term Grant Research","doi-asserted-by":"publisher","award":["04\/PNAV\/6315576"],"award-info":[{"award-number":["04\/PNAV\/6315576"]}],"id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3238664","type":"journal-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T18:50:02Z","timestamp":1674240602000},"page":"9136-9148","source":"Crossref","is-referenced-by-count":121,"title":["Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures"],"prefix":"10.1109","volume":"11","author":[{"given":"Irfan Ali","family":"Kandhro","sequence":"first","affiliation":[{"name":"Department of Computer Science, Sindh Madressatul Islam University, Karachi, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8827-9290","authenticated-orcid":false,"given":"Sultan M.","family":"Alanazi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Northern Border University, Arar, Saudi Arabia"}]},{"given":"Fayyaz","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Sir Syed University of Engineering and Technology, Karachi Sindh, Pakistan"}]},{"given":"Asadullah","family":"Kehar","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Shah Abdul Latif University, Khairpur, Karachi Sindh, Pakistan"}]},{"given":"Kanwal","family":"Fatima","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sindh Madressatul Islam University, Karachi, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1919-3407","authenticated-orcid":false,"given":"Mueen","family":"Uddin","sequence":"additional","affiliation":[{"name":"College of Computing and Information Technology, University of Doha For Science and Technology, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4801-6370","authenticated-orcid":false,"given":"Shankar","family":"Karuppayah","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor, Penang, Malaysia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CAIDA51941.2021.9425117"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3547"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070109"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4108\/eai.1-2-2017.152155"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115524"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v9i430229"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7618-5_27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref13","first-page":"1","article-title":"How transferable are features in deep neural networks?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"27","author":"Yosinski"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3169\/mta.4.187"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2013\/v6i2.11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/0471671746"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.11989\/JEST.1674-862X.61103113"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2598394.2602287"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s22103744"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s22165986"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3130434"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000428"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100462"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.03.024"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10151854"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108158"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2793284"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2922936"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.11.013"},{"issue":"6","key":"ref37","first-page":"4375","article-title":"Improving performance of mobile ad hoc networks using efficient tactical on demand distance vector (TAODV) routing algorithm","volume":"8","author":"Uddin","year":"2012","journal-title":"Int. J. Innov. Comput., Inf. Control"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108234"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.09.014"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3194195"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3813841"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref46","article-title":"Deep adversarial learning in intrusion detection: A data augmentation enhanced framework","author":"Zhang","year":"2019","journal-title":"arXiv:1901.07949"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3207677.3278054"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.33851\/jmis.2019.6.4.165"},{"key":"ref49","first-page":"1","article-title":"A two-stage deep learning approach for can intrusion detection","volume-title":"Proc. Ground Vehicle Syst. Eng. Technol. Symp. (GVSETS)","author":"Zhang"},{"key":"ref50","article-title":"HashTran-DNN: A framework for enhancing robustness of deep neural networks against adversarial malware samples","author":"Li","year":"2018","journal-title":"arXiv:1809.06498"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/app12052534"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2018.00071"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2983860"},{"key":"ref55","first-page":"1","article-title":"Healthcare ledger management: A blockchain and machine learning-enabled novel and secure architecture for medical industry","volume":"12","author":"Khan","year":"2022","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuri.2021.100030"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3195106.3195117"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.39"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/drones6120377"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966342"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223370"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893871"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100516"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.018518"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01843-0"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108708"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/jsan10040061"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102930"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3200048"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3130156"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10023499.pdf?arnumber=10023499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T06:02:09Z","timestamp":1707804129000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10023499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3238664","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}