{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T06:24:50Z","timestamp":1773469490352,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:00:00Z","timestamp":1718150400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:00:00Z","timestamp":1718150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001776","name":"University of Western Sydney","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001776","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Internet of Things (IoT) integrates more than billions of intelligent devices over the globe with the capability of communicating with other connected devices with little to no human intervention. IoT enables data aggregation and analysis on a large scale to improve life quality in many domains. In particular, data collected by IoT contain a tremendous amount of information for anomaly detection. The heterogeneous nature of IoT is both a challenge and an opportunity for cybersecurity. Traditional approaches in cybersecurity monitoring often require different kinds of data pre-processing and handling for various data types, which might be problematic for datasets that contain heterogeneous features. However, heterogeneous types of network devices can often capture a more diverse set of signals than a single type of device readings, which is particularly useful for anomaly detection. In this paper, we present a comprehensive study on using ensemble machine learning methods for enhancing IoT cybersecurity via anomaly detection. Rather than using one single machine learning model, ensemble learning combines the predictive power from multiple models, enhancing their predictive accuracy in heterogeneous datasets rather than using one single machine learning model. We propose a unified framework with ensemble learning that utilises Bayesian hyperparameter optimisation to adapt to a network environment that contains multiple IoT sensor readings. Experimentally, we illustrate their high predictive power when compared to traditional methods.<\/jats:p>","DOI":"10.1186\/s42400-024-00238-4","type":"journal-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T01:02:09Z","timestamp":1718154129000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis"],"prefix":"10.1186","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0641-5250","authenticated-orcid":false,"given":"Tin","family":"Lai","sequence":"first","affiliation":[]},{"given":"Farnaz","family":"Farid","sequence":"additional","affiliation":[]},{"given":"Abubakar","family":"Bello","sequence":"additional","affiliation":[]},{"given":"Fariza","family":"Sabrina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,12]]},"reference":[{"issue":"2","key":"238_CR1","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1080\/00401706.1989.10488517","volume":"31","author":"B Abraham","year":"1989","unstructured":"Abraham B, Chuang A (1989) Outlier detection and time series modeling. Technometrics: J Stat Phys Chem Eng Sci 31(2):241\u2013248. https:\/\/doi.org\/10.1080\/00401706.1989.10488517","journal-title":"Technometrics: J Stat Phys Chem Eng Sci"},{"key":"238_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102748","volume":"118","author":"D Akgun","year":"2022","unstructured":"Akgun D, Hizal S, Cavusoglu U (2022) A new ddos attacks intrusion detection model based on deep learning for cybersecurity. Comput Secur 118:102748","journal-title":"Comput Secur"},{"key":"238_CR3","doi-asserted-by":"publisher","unstructured":"Aleskerov E, Freisleben B, Rao B (1997) Cardwatch: A neural network based database mining system for credit card fraud detection. In: Proceedings of the IEEE\/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), pp. 220\u2013226. IEEE. https:\/\/doi.org\/10.1109\/CIFER.1997.618940","DOI":"10.1109\/CIFER.1997.618940"},{"issue":"3","key":"238_CR4","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutor 22(3):1646\u20131685. https:\/\/doi.org\/10.1109\/COMST.2020.2988293","journal-title":"IEEE Commun Surv Tutor"},{"key":"238_CR5","doi-asserted-by":"publisher","unstructured":"Alghamdi R, Bellaiche M (2021) A deep intrusion detection system in lambda architecture based on edge cloud computing for IoT. In: 2021 4th international conference on artificial intelligence and Big Data (ICAIBD). IEEE, pp 561\u2013566. https:\/\/doi.org\/10.1109\/ICAIBD51990.2021.9458974","DOI":"10.1109\/ICAIBD51990.2021.9458974"},{"key":"238_CR6","unstructured":"Bergstra J, Bardenet R, Bengio Y, K\u00e9gl B (2011) Algorithms for hyper-parameter optimization. Adv Neural Inform Process Syst 24"},{"key":"238_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","volume":"54","author":"E Borgia","year":"2014","unstructured":"Borgia E (2014) The Internet of Things vision: key features, applications and open issues. Comput Commun 54:1\u201331. https:\/\/doi.org\/10.1016\/j.comcom.2014.09.008","journal-title":"Comput Commun"},{"key":"238_CR8","doi-asserted-by":"crossref","unstructured":"B\u00fchlmann P (2012) Bagging, boosting and ensemble methods. In: Handbook of computational statistics. Springer, pp 985\u20131022","DOI":"10.1007\/978-3-642-21551-3_33"},{"key":"238_CR9","doi-asserted-by":"crossref","unstructured":"Carbonell JG, Michalski RS, Mitchell TM (1983) An overview of machine learning. Mach Learn 3\u201323","DOI":"10.1016\/B978-0-08-051054-5.50005-4"},{"issue":"3","key":"238_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):1\u201358. https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput Surv (CSUR)"},{"key":"238_CR11","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd Acm Sigkdd international conference on knowledge discovery and data mining, pp 785\u2013794. https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"issue":"7","key":"238_CR12","doi-asserted-by":"publisher","first-page":"6481","DOI":"10.1109\/JIOT.2019.2958185","volume":"7","author":"AA Cook","year":"2020","unstructured":"Cook AA, M\u0131s\u0131rl\u0131 G, Fan Z (2020) Anomaly detection for IoT time-series data: a survey. IEEE Internet Things J 7(7):6481\u20136494. https:\/\/doi.org\/10.1109\/JIOT.2019.2958185","journal-title":"IEEE Internet Things J"},{"key":"238_CR13","doi-asserted-by":"crossref","unstructured":"Dietterich TG (2022) Machine learning for sequential data: a review. In: Joint IAPR international workshops on statistical techniques in pattern recognition (SPR) and structural and syntactic pattern recognition (SSPR). Springer, pp 15\u201330","DOI":"10.1007\/3-540-70659-3_2"},{"issue":"3","key":"238_CR14","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1023\/B:MACH.0000039778.69032ab","volume":"57","author":"PA Flach","year":"2004","unstructured":"Flach PA, Lachiche N (2004) Naive Bayesian classification of structured data. Mach Learn 57(3):233\u2013269. https:\/\/doi.org\/10.1023\/B:MACH.0000039778.69032ab","journal-title":"Mach Learn"},{"key":"238_CR15","doi-asserted-by":"crossref","unstructured":"Friedman JH (2001) Greedy function approximation: a gradient boosting machine. Ann Stat 1189\u20131232","DOI":"10.1214\/aos\/1013203451"},{"key":"238_CR16","doi-asserted-by":"publisher","unstructured":"Fujimaki R, Yairi T, Machida K (2005) An approach to spacecraft anomaly detection problem using kernel feature space. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining, pp 401\u2013410. https:\/\/doi.org\/10.1145\/1081870.1081917","DOI":"10.1145\/1081870.1081917"},{"key":"238_CR17","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4743746","author":"S Garcia","year":"2020","unstructured":"Garcia S, Parmisano A, Erquiaga MJ (2020) IoT-23: A labeled dataset with malicious and benign IoT network traffic. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.4743746","journal-title":"Zenodo"},{"issue":"14\u201315","key":"238_CR18","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1016\/S1352-2310(97)00447-0.","volume":"32","author":"MW Gardner","year":"1998","unstructured":"Gardner MW, Dorling SR (1998) Artificial neural networks (the multilayer Perceptron)-a review of applications in the atmospheric sciences. Atmos Environ 32(14\u201315):2627\u20132636. https:\/\/doi.org\/10.1016\/S1352-2310(97)00447-0.","journal-title":"Atmos Environ"},{"key":"238_CR19","doi-asserted-by":"publisher","first-page":"122583","DOI":"10.1109\/ACCESS.2019.2938249","volume":"7","author":"R Geraldes","year":"2019","unstructured":"Geraldes R, Goncalves A, Lai T, Villerabel M, Deng W, Salta A, Nakayama K, Matsuo Y, Prendinger H (2019) UAV-based situational awareness system using deep learning. IEEE Access: Pract Innov Open Solut 7:122583\u2013122594. https:\/\/doi.org\/10.1109\/ACCESS.2019.2938249","journal-title":"IEEE Access: Pract Innov Open Solut"},{"issue":"1","key":"238_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts P, Ernst D, Wehenkel L (2006) Extremely randomized trees. Mach Learn 63(1):3\u201342. https:\/\/doi.org\/10.1007\/s10994-006-6226-1","journal-title":"Mach Learn"},{"issue":"8","key":"238_CR21","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.3390\/electronics9081246","volume":"9","author":"M-D Gonz\u00e1lez-Zamar","year":"2020","unstructured":"Gonz\u00e1lez-Zamar M-D, Abad-Segura E, V\u00e1zquez-Cano E, L\u00f3pez-Meneses E (2020) IoT technology applications-based smart cities: Research analysis. Electronicsweek 9(8):1246. https:\/\/doi.org\/10.3390\/electronics9081246","journal-title":"Electronicsweek"},{"key":"238_CR22","doi-asserted-by":"publisher","unstructured":"Gou Q, Yan L, Liu Y, Li Y (2013) Construction and strategies in IoT security system. In: 2013 IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing. IEEE, pp 1129\u20131132. https:\/\/doi.org\/10.1109\/GreenCom-iThings-CPSCom.2013.195","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.195"},{"key":"238_CR23","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"WH Hassan","year":"2019","unstructured":"Hassan WH (2019) Current research on Internet of Things (IoT) security: a survey. Comput Netw 148:283\u2013294. https:\/\/doi.org\/10.1016\/j.comnet.2018.11.025","journal-title":"Comput Netw"},{"key":"238_CR24","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access: Pract Innov Open Solut 7:82721\u201382743. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924045","journal-title":"IEEE Access: Pract Innov Open Solut"},{"issue":"3","key":"238_CR26","doi-asserted-by":"publisher","first-page":"349","DOI":"10.4310\/SII.2009.v2.n3.a8","volume":"2","author":"T Hastie","year":"2009","unstructured":"Hastie T, Rosset S, Zhu J, Zou H (2009) Multi-class adaboost. Stat Interface 2(3):349\u2013360. https:\/\/doi.org\/10.4310\/SII.2009.v2.n3.a8","journal-title":"Stat Interface"},{"key":"238_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of outliers","author":"DM Hawkins","year":"1980","unstructured":"Hawkins DM (1980) Identification of outliers, vol 11. Springer, New York"},{"issue":"1","key":"238_CR28","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1080\/00401706.1970.10488634","volume":"12","author":"AE Hoerl","year":"1970","unstructured":"Hoerl AE, Kennard RW (1970) Ridge regression: Biased estimation for nonorthogonal problems. Technometrics: J Stat Phys Chem Eng Sci 12(1):55\u201367","journal-title":"Technometrics: J Stat Phys Chem Eng Sci"},{"key":"238_CR29","doi-asserted-by":"crossref","unstructured":"Hussain A, Mohamed A, Razali S (2020) A review on cybersecurity: Challenges & emerging threats. In: Proceedings of the 3rd international conference on networking, information systems & security, pp 1\u20137","DOI":"10.1145\/3386723.3387847"},{"key":"238_CR30","unstructured":"Hutter F, Hoos H, Leyton-Brown K (2014) An efficient approach for assessing hyperparameter importance. In: Proceedings of the 31st international conference on machine learning, pp 754\u2013762"},{"key":"238_CR31","doi-asserted-by":"publisher","unstructured":"Hwang YH (2015) Iot security & privacy: threats and challenges. In: Proceedings of the 1st ACM workshop on IoT privacy, trust, and security, p 1. https:\/\/doi.org\/10.1145\/2732209.2732216","DOI":"10.1145\/2732209.2732216"},{"key":"238_CR32","doi-asserted-by":"publisher","unstructured":"Kaur J, Wongthongtham P, Abu-Salih B, Fathy S (2018) Analysis of scientific production of IoE big data research. In: 2018 32nd international conference on advanced information networking and applications workshops (WAINA). IEEE, pp 715\u2013720. https:\/\/doi.org\/10.1109\/WAINA.2018.00173","DOI":"10.1109\/WAINA.2018.00173"},{"key":"238_CR33","volume-title":"IoT network intrusion dataset","author":"HK Kim","year":"2019","unstructured":"Kim HK (2019) IoT network intrusion dataset. Creative Commons Attribution, IEEE. tex.copyright"},{"issue":"1","key":"238_CR34","first-page":"3","volume":"160","author":"SB Kotsiantis","year":"2007","unstructured":"Kotsiantis SB, Zaharakis I, Pintelas P (2007) Supervised machine learning: a review of classification techniques. Emerg Artif Intell Appl Comput Eng 160(1):3\u201324","journal-title":"Emerg Artif Intell Appl Comput Eng"},{"key":"238_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2005.53","author":"V Kumar","year":"2005","unstructured":"Kumar V (2005) Parallel and distributed computing for cybersecurity. IEEE Distrib Syst Online. https:\/\/doi.org\/10.1109\/MDSO.2005.53","journal-title":"IEEE Distrib Syst Online"},{"key":"238_CR36","doi-asserted-by":"publisher","unstructured":"Lai T, Ramos F (2021) Plannerflows: Learning motion samplers with normalising flows. In: 2021 IEEE\/RSJ international conference on intelligent robots and systems (IROS). IEEE, pp 2542\u20132548. https:\/\/doi.org\/10.1109\/IROS51168.2021.9636190","DOI":"10.1109\/IROS51168.2021.9636190"},{"issue":"4","key":"238_CR37","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee I, Lee K (2015) The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus Horiz 58(4):431\u2013440. https:\/\/doi.org\/10.1016\/j.bushor.2015.03.008","journal-title":"Bus Horiz"},{"issue":"4","key":"238_CR38","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TNSE.2021.3100750","volume":"9","author":"H Lu","year":"2021","unstructured":"Lu H, Jin C, Helu X, Du X, Guizani M, Tian Z (2021) Deepautod: research on distributed machine learning oriented scalable mobile communication security unpacking system. IEEE Trans Netw Sci Eng 9(4):2052\u20132065","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"238_CR39","doi-asserted-by":"crossref","first-page":"381","DOI":"10.21275\/ART20203995","volume":"9","author":"B Mahesh","year":"2020","unstructured":"Mahesh B (2020) Machine learning algorithms-a review. Int J Sci Res (IJSR) 9:381\u2013386","journal-title":"Int J Sci Res (IJSR)"},{"key":"238_CR40","doi-asserted-by":"publisher","unstructured":"Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015) Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th international conference for internet technology and secured transactions (ICITST). IEEE, pp 336\u2013341. https:\/\/doi.org\/10.1109\/ICITST.2015.7412116","DOI":"10.1109\/ICITST.2015.7412116"},{"issue":"12","key":"238_CR41","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","volume":"83","author":"M Markou","year":"2003","unstructured":"Markou M, Singh S (2003) Novelty detection: a review-part 2: neural network based approaches. Signal Process 83(12):2499\u20132521","journal-title":"Signal Process"},{"issue":"1","key":"238_CR42","first-page":"87","volume":"4","author":"M Mijwil","year":"2023","unstructured":"Mijwil M, Salem IE, Ismaeel MM (2023) The significance of machine learning and deep learning techniques in cybersecurity: a comprehensive review. Iraqi J Comput Sci Math 4(1):87\u2013101","journal-title":"Iraqi J Comput Sci Math"},{"issue":"6","key":"238_CR43","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1002\/cem.873.","volume":"18","author":"AJ Myles","year":"2004","unstructured":"Myles AJ, Feudale RN, Liu Y, Woody NA, Brown SD (2004) An introduction to decision tree modeling. J Chemometrics: J Chemometrics Soc 18(6):275\u2013285. https:\/\/doi.org\/10.1002\/cem.873.","journal-title":"J Chemometrics: J Chemometrics Soc"},{"issue":"5","key":"238_CR44","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s10654-018-0390-z","volume":"33","author":"AI Naimi","year":"2018","unstructured":"Naimi AI, Balzer LB (2018) Stacked generalization: an introduction to super learning. Eur J Epidemiol 33(5):459\u2013464. https:\/\/doi.org\/10.1007\/s10654-018-0390-z","journal-title":"Eur J Epidemiol"},{"issue":"3","key":"238_CR45","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N Neshenko","year":"2019","unstructured":"Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Commun Surv Tutor 21(3):2702\u20132733. https:\/\/doi.org\/10.1109\/COMST.2019.2910750","journal-title":"IEEE Commun Surv Tutor"},{"key":"238_CR46","unstructured":"Okano MT (2017) IOT and industry 4.0: the industrial new revolution. In: International conference on management and information systems, vol 25, p 26"},{"issue":"1","key":"238_CR47","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/01431160412331269698","volume":"26","author":"M Pal","year":"2005","unstructured":"Pal M (2005) Random forest classifier for remote sensing classification. Int J Remote Sens 26(1):217\u2013222. https:\/\/doi.org\/10.1080\/01431160412331269698","journal-title":"Int J Remote Sens"},{"key":"238_CR48","doi-asserted-by":"crossref","unstructured":"Pisner DA, Schnyer DM (2020) Support vector machine. In: Machine learning. Elsevier, pp 101\u2013121","DOI":"10.1016\/B978-0-12-815739-8.00006-7"},{"key":"238_CR49","doi-asserted-by":"publisher","unstructured":"Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A systemic approach for IoT security. In: 2013 IEEE international conference on distributed computing in sensor systems. IEEE, pp 351\u2013355. https:\/\/doi.org\/10.1109\/DCOSS.2013.78","DOI":"10.1109\/DCOSS.2013.78"},{"issue":"4","key":"238_CR50","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1049\/enc2.12091","volume":"4","author":"J Ruan","year":"2023","unstructured":"Ruan J, Liang G, Zhao J, Zhao H, Qiu J, Wen F, Dong ZY (2023) Deep learning for cybersecurity in smart grids: review and perspectives. Energy Convers Econ 4(4):233\u2013251","journal-title":"Energy Convers Econ"},{"issue":"1","key":"238_CR51","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.inffus.2004.04.008","volume":"6","author":"D Ruta","year":"2005","unstructured":"Ruta D, Gabrys B (2005) Classifier selection for majority voting. Inform Fusion 6(1):63\u201381. https:\/\/doi.org\/10.1016\/j.inffus.2004.04.008","journal-title":"Inform Fusion"},{"key":"238_CR52","doi-asserted-by":"publisher","unstructured":"Spence C, Parra L, Sajda P (2001) Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model. In: Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001), pp. 3\u201310. IEEE. https:\/\/doi.org\/10.1109\/MMBIA.2001.991693","DOI":"10.1109\/MMBIA.2001.991693"},{"issue":"22","key":"238_CR53","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari I, Chiola G, Aiello M, Mongelli M, Cambiaso E (2020) MQTTset, a new dataset for machine learning techniques on MQTT. Sensors 20(22):6578. https:\/\/doi.org\/10.3390\/s20226578. (Publisher: MDPI)","journal-title":"Sensors"},{"key":"238_CR54","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3130529","author":"X Wang","year":"2021","unstructured":"Wang X, Zhang H, Zhang Y, Wang M, Song J, Lai T, Khushi M (2021) Learning non-stationary time-series with dynamic pattern extractions. IEEE Trans Artif Intell. https:\/\/doi.org\/10.1109\/TAI.2021.3130529","journal-title":"IEEE Trans Artif Intell"},{"issue":"2","key":"238_CR55","doi-asserted-by":"publisher","first-page":"259","DOI":"10.3390\/iot1020016","volume":"1","author":"C Wheelus","year":"2020","unstructured":"Wheelus C, Zhu X (2020) IoT network security: threats, risks, and a data-driven defense framework. IoT 1(2):259\u2013285. https:\/\/doi.org\/10.3390\/iot1020016","journal-title":"IoT"},{"issue":"5","key":"238_CR56","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","volume":"35","author":"L Xiao","year":"2018","unstructured":"Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process Mag 35(5):41\u201349. https:\/\/doi.org\/10.1109\/MSP.2018.2825478","journal-title":"IEEE Signal Process Mag"},{"key":"238_CR57","doi-asserted-by":"publisher","unstructured":"Zhang Z-K, Cho MCY, Wang C-W, Hsu C-W, Chen C-K, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications. IEEE, pp 230\u2013234. https:\/\/doi.org\/10.1109\/SOCA.2014.58","DOI":"10.1109\/SOCA.2014.58"},{"issue":"2","key":"238_CR58","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Zhang Y, Meratnia N, Havinga P (2010) Outlier detection techniques for wireless sensor networks: a survey. IEEE Commun Surv Tutor 12(2):159\u2013170. https:\/\/doi.org\/10.1109\/SURV.2010.021510.00088","journal-title":"IEEE Commun Surv Tutor"},{"key":"238_CR59","doi-asserted-by":"publisher","first-page":"42749","DOI":"10.1109\/ACCESS.2020.2977114.","volume":"8","author":"R Zhu","year":"2020","unstructured":"Zhu R, Ji X, Yu D, Tan Z, Zhao L, Li J, Xia X (2020) KNN-based approximate outlier detection algorithm over IoT streaming data. IEEE Access: Pract Innov Open Solut 8:42749\u201342759. https:\/\/doi.org\/10.1109\/ACCESS.2020.2977114.","journal-title":"IEEE Access: Pract Innov Open Solut"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00238-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-024-00238-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00238-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T16:51:45Z","timestamp":1732207905000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-024-00238-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,12]]},"references-count":58,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["238"],"URL":"https:\/\/doi.org\/10.1186\/s42400-024-00238-4","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,12]]},"assertion":[{"value":"17 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors have read and agreed to the published version of the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"44"}}