{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:28Z","timestamp":1750309588917,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute For Advance Research, United International University","award":["UIU-IAR-02-2023-SE-14"],"award-info":[{"award-number":["UIU-IAR-02-2023-SE-14"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723179","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning-Enhanced Cross-Tier Security and Anomaly Detection in Wireless Body Area Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1052-1424","authenticated-orcid":false,"given":"Md","family":"Shamshuzzoha","sequence":"first","affiliation":[{"name":"United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8030-3225","authenticated-orcid":false,"given":"Md. Motaharul","family":"Islam","sequence":"additional","affiliation":[{"name":"United International University, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Preethichandra D.M.G. Piyathilaka L. Izhar U. Samarasinghe R. and De Silva L.C. 2023. Wireless body area networks and their applications\u2014A review. IEEE Access 11 pp.9202-9220.","key":"e_1_3_3_1_2_2","DOI":"10.1109\/ACCESS.2023.3239008"},{"doi-asserted-by":"crossref","unstructured":"Manirabona A. and Fourati L.C. 2018. A 4-tiers architecture for mobile WBAN based health remote monitoring system. Wireless Networks 24 pp.2179-2190.","key":"e_1_3_3_1_3_2","DOI":"10.1007\/s11276-017-1456-7"},{"doi-asserted-by":"crossref","unstructured":"Awad M. Sallabi F. Shuaib K. and Naeem F. 2022. Artificial intelligence-based fault prediction framework for WBAN. Journal of King Saud University-Computer and Information Sciences 34(9) pp.7126-7137.","key":"e_1_3_3_1_4_2","DOI":"10.1016\/j.jksuci.2021.09.017"},{"doi-asserted-by":"crossref","unstructured":"Saif S. Das P. Biswas S. Khari M. and Shanmuganathan V. 2022. HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocessors and Microsystems p.104622.","key":"e_1_3_3_1_5_2","DOI":"10.1016\/j.micpro.2022.104622"},{"doi-asserted-by":"crossref","unstructured":"Akhtar M. and Feng T. 2022. An Intelligent and Secured Privacy Preserving Framework For Wireless Body Area Networks (WBANs). EAI Endorsed Transactions on Creative Technologies 9(30).","key":"e_1_3_3_1_6_2","DOI":"10.4108\/eai.15-3-2022.173609"},{"doi-asserted-by":"crossref","unstructured":"Aldabbas H. Albashish D. Khatatneh K. and Amin R. 2022. An architecture of IoT-aware healthcare smart system by leveraging machine learning. Int. Arab J. Inf. Technol. 19(2) pp.160-172.","key":"e_1_3_3_1_7_2","DOI":"10.34028\/iajit\/19\/2\/3"},{"doi-asserted-by":"crossref","unstructured":"Xu B. Sun L. Mao X. Ding R. and Liu C. 2023. IoT Intrusion Detection System Based on Machine Learning. Electronics 12(20) p.4289.","key":"e_1_3_3_1_8_2","DOI":"10.3390\/electronics12204289"},{"doi-asserted-by":"crossref","unstructured":"Saif S. Karmakar K. Biswas S. and Neogy S. 2022. MLIDS: Machine learning enabled intrusion detection system for health monitoring framework using BA-WSN. International journal of wireless information networks 29(4) pp.491-502.","key":"e_1_3_3_1_9_2","DOI":"10.1007\/s10776-022-00574-7"},{"doi-asserted-by":"crossref","unstructured":"Verner A. and Butvinik D. 2017 December. A machine learning approach to detecting sensor data modification intrusions in WBANs. In 2017 16th IEEE international conference on machine learning and applications (ICMLA) (pp. 161-169). IEEE.","key":"e_1_3_3_1_10_2","DOI":"10.1109\/ICMLA.2017.0-163"},{"doi-asserted-by":"crossref","unstructured":"Mucchi L. Jayousi S. Martinelli A. Caputo S. and Marcocci P. 2019 May. An overview of security threats solutions and challenges in wbans for healthcare. In 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) (pp. 1-6). IEEE.","key":"e_1_3_3_1_11_2","DOI":"10.1109\/ISMICT.2019.8743798"},{"doi-asserted-by":"crossref","unstructured":"Hajar M.S. Kalutarage H.K. and Al-Kadri M.O. 2023. 3R: A reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks. Computer Networks 237 p.110073.","key":"e_1_3_3_1_12_2","DOI":"10.1016\/j.comnet.2023.110073"},{"doi-asserted-by":"crossref","unstructured":"Shamshuzzoha M. and Islam M.M. 2023. Early Prediction Model of Macrosomia Using Machine Learning for Clinical Decision Support. Diagnostics 13(17) p.2754.","key":"e_1_3_3_1_13_2","DOI":"10.3390\/diagnostics13172754"},{"doi-asserted-by":"crossref","unstructured":"Ryu H. and Kim H. 2021 August. Privacy-preserving authentication protocol for wireless body area networks in healthcare applications. In Healthcare (Vol. 9 No. 9 p. 1114). MDPI.","key":"e_1_3_3_1_14_2","DOI":"10.3390\/healthcare9091114"},{"unstructured":"Singla R. Kaur N. Koundal D. and Bharadwaj A. 2022. Challenges and developments in secure routing protocols for healthcare in WBAN: A comparative analysis. Wireless Personal Communications pp.1-40.","key":"e_1_3_3_1_15_2"},{"unstructured":"Islam Md Motaharul et al. \"Energy efficient framework for mobility supported smart IP-WSN.\" Computational Collective Intelligence. Technologies and Applications: Second International Conference ICCCI 2010 Kaohsiung Taiwan November 10-12 2010. Proceedings Part III 2. Springer Berlin Heidelberg 2010.","key":"e_1_3_3_1_16_2"},{"doi-asserted-by":"crossref","unstructured":"Islam Md Motaharul Mohammad Abdullah-Al-Wadud and Eui-Nam Huh. \"Energy-efficient multilayer routing protocol for SPMIPv6-based IP-WSN.\" International Journal of Sensor Networks 18.3-4 (2015): 114-129.","key":"e_1_3_3_1_17_2","DOI":"10.1504\/IJSNET.2015.070405"}],"event":{"acronym":"ICCA 2024","name":"ICCA 2024: 3rd International Conference on Computing Advancements","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723179","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:46Z","timestamp":1750298206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723179"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":16,"alternative-id":["10.1145\/3723178.3723179","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723179","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}