{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:42:58Z","timestamp":1768423378011,"version":"3.49.0"},"reference-count":81,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.053861","type":"journal-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:36:42Z","timestamp":1726043802000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":6,"title":["Enhancing Internet of Things Intrusion Detection Using Artificial Intelligence"],"prefix":"10.32604","volume":"81","author":[{"given":"Shachar","family":"Bar","sequence":"first","affiliation":[]},{"given":"P. W. C.","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"Md Shohel","family":"Sayeed","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","unstructured":"Statista, \u201cIoT connected devices worldwide 2019\u20132030, with forecasts from 2022 to 2030,\u201d 2024. Accessed: May 11, 2024. [Online]. Available: https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide"},{"key":"ref2","author":"Agarwal","year":"2022","journal-title":"IoT for Sustainable Smart Cities and Society"},{"key":"ref3","author":"Mohd","year":"2023","journal-title":"Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100855","article-title":"Critical infrastructure awareness based on IoT context data","volume":"23","author":"Vila","year":"2023","journal-title":"Internet of Things"},{"key":"ref5","first-page":"925","article-title":"Distributed ensemble method using deep learning to detect DDoS attacks in IoT networks","volume":"127","author":"Shukla","year":"2024","journal-title":"Arab. J. Sci. Eng."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1186\/s40537-021-00444-8","article-title":"Review of deep learning: Concepts, CNN architectures, challenges, applications, future directions","volume":"8","author":"Alzubaidi","year":"2021","journal-title":"J. Big Data"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"13037","DOI":"10.1007\/s10489-022-04119-6","article-title":"A two-phase random forest with differential privacy","volume":"53","author":"Liu","year":"2023","journal-title":"Appl. Intell."},{"key":"ref8","article-title":"Research on intrusion detection based on an enhanced random forest algorithm","volume":"14","author":"Lu","year":"2024","journal-title":"J. Appl. Sci."},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108732","article-title":"An explainable efficient flow-based industrial IoT intrusion detection system","volume":"108","author":"Alani","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1186\/s40537-024-00892-y","article-title":"Optimizing IoT intrusion detection system: Feature selection versus feature extraction in machine learning","volume":"11","author":"Jing","year":"2024","journal-title":"J. Big Data"},{"key":"ref11","first-page":"1203","article-title":"Detection of botnet in IoT network through machine learning based optimized feature importance via ensemble models","volume":"16","author":"Saika","year":"2024","journal-title":"Int. J. Inform. Technol."},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1201\/9781003107354","author":"Gupta","year":"2021","journal-title":"Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges, and Countermeasures"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"4503","DOI":"10.1007\/s10489-020-02086-4","article-title":"Label flipping attacks against Naive Bayes on spam filtering systems","volume":"51","author":"Ning","year":"2021","journal-title":"Appl. Intell."},{"key":"ref14","article-title":"A novel evil twin MiTM attack through 802.11v protocol exploitation","volume":"130","author":"Constantinos","year":"2023","journal-title":"Comput. Secur."},{"key":"ref15","series-title":"7th Int. Conf. Comput., Commun., Control Autom. (ICCUBEA)","article-title":"Zero-day attack detection and prevention","author":"Sanjay","year":"2023"},{"key":"ref16","author":"Yang","year":"2020","journal-title":"Federated Learning"},{"key":"ref17","article-title":"Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach","volume":"238","author":"Sharma","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100656","article-title":"Deep learning-enabled anomaly detection for IoT systems","volume":"21","author":"Abusitta","year":"2023","journal-title":"Internet of Things"},{"key":"ref19","series-title":"IEEE 91st Vehicular Technol. Conf. (VTC2020-Spring)","article-title":"Feed-forward neural network for network intrusion detection","author":"Arnaud","year":"2020"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.neunet.2023.04.026","article-title":"Long short-term memory with activation on gradient","volume":"164","author":"Qin","year":"2023","journal-title":"Neural Netw."},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117120","article-title":"Knowledge graph random neural networks for recommender systems","volume":"201","author":"Ma","year":"2022","journal-title":"Expert. Syst. Appl."},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119000","article-title":"An explainable deep learning-enabled intrusion detection framework in IoT networks","volume":"639","author":"Keshk","year":"2023","journal-title":"Inform. Sci."},{"key":"ref23","series-title":"Int. Conf. Complex Netw. Appl. XII","first-page":"61","article-title":"Graph neural networks","author":"Drif","year":"2024"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100936","article-title":"Enhancing IoT network security through deep learning-powered intrusion detection system","volume":"24","author":"Bakhsh","year":"2023","journal-title":"Internet of Things"},{"key":"ref25","series-title":"Proc. Hum. Factors Ergon. Soc. Annu. Meet.","first-page":"220","article-title":"A controlled experiment on the impact of intrusion detection false alarm rate on analyst performance","volume":"67","author":"Layman","year":"2023"},{"key":"ref26","first-page":"2705","article-title":"Enhancing IoT intrusion detection system with modified E\u2010GraphSAGE: A graph neural network approach","volume":"16","author":"Mirlashari","year":"2024","journal-title":"Int. J. Inform. Technol."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"930","DOI":"10.1016\/j.egyr.2022.11.116","article-title":"An improved GraphSAGE to detect power system anomaly based on time-neighbor feature","volume":"9","author":"Chen","year":"2023","journal-title":"Energy Rep."},{"key":"ref28","series-title":"Graph-Based Rep. Pattern Recognit. 13th IAPR-TC-15 Int. Workshop","first-page":"25","article-title":"Graph-based vs. vector-based classification: A fair comparison","author":"Gillioz","year":"Sep. 2023"},{"key":"ref29","first-page":"532","volume":"13905","author":"Hamdi","year":"2023","journal-title":"Applied Cryptography and Network Security"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-031-40286-9_35","author":"Wei","year":"2023","journal-title":"Knowledge Science, Engineering and Management"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100818","article-title":"A new concatenated multigraph neural network for IoT intrusion detection","volume":"22","author":"Altaf","year":"2023","journal-title":"Internet of Things"},{"key":"ref32","series-title":"Seventh Int. Conf. Image Inform. Process. (ICIIP)","first-page":"450","article-title":"Predictive and comparative analysis of LENET, ALEXNET and VGG-16 network architecture in smart behavior monitoring","author":"Reshma","year":"2023"},{"key":"ref33","author":"Arslan","year":"2024","journal-title":"Accelerators for Convolutional Neural Networks"},{"key":"ref34","series-title":"3rd Int. Conf. Innov. Technol. (INOCON)","first-page":"1","article-title":"Classification of network security attack using KNN (K-Nearest Neighbour) and comparison of different attacks through different machine learning techniques","author":"Muskan","year":"2024"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.3390\/jsan12020029","article-title":"Intrusion detection system using feature extraction with machine learning algorithms in IoT","volume":"12","author":"Musleh","year":"2023","journal-title":"J. Sens. Actuator Netw."},{"key":"ref36","series-title":"IEEE\/ACM Trans. Netw.","first-page":"332","article-title":"Network-wide forwarding anomaly detection and localization in software defined networks","volume":"29","author":"Zhang","year":"2021"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"70542","DOI":"10.1109\/ACCESS.2023.3292267","article-title":"Enhancing intrusion detection in IoT communications through ML Model generalization with a new dataset (IDSAI)","volume":"11","author":"Fernando","year":"2023","journal-title":"IEEE Access"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/s11036-021-01838-x","volume":"27","author":"Du","year":"2022","journal-title":"Mobile Networks and Applications"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1848","DOI":"10.1155\/2023\/5997304","article-title":"Identification of network traffic intrusion using decision tree","volume":"2023","author":"Chen","year":"2023","journal-title":"J. Sens."},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.3390\/su15119001","article-title":"Intrusion detection framework for industrial Internet of Things using software defined network","volume":"15","author":"Alshahrani","year":"2023","journal-title":"Sustainability"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"12521","DOI":"10.1109\/JIOT.2023.3248259","volume":"10","author":"Ma","year":"2023","journal-title":"IEEE Internet Things"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.3390\/s23167038","article-title":"Cross-layer federated learning for lightweight IoT intrusion detection systems","volume":"23","author":"Hajj","year":"2023","journal-title":"Sensors"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103381","article-title":"Dependable federated learning for IoT intrusion detection against poisoning attacks","volume":"132","author":"Yang","year":"2023","journal-title":"Comput. Secur."},{"key":"ref44","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1186\/s13677-024-00640-w","article-title":"IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge\u2010cloud networks","volume":"13","author":"Lakhan","year":"2023","journal-title":"J. Cloud Comput."},{"key":"ref45","series-title":"IEEE 21st Int. Conf. Softw. Qual., Reliab. Secur. (QRS)","first-page":"768","article-title":"An efficient network intrusion detection model based on temporal convolutional networks","author":"Chen","year":"2021"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"3555","DOI":"10.1177\/01423312211037621","article-title":"Stacked sparse autoencoders that preserve the local and global feature structures for fault detection","volume":"43","author":"Yin","year":"2021","journal-title":"Trans. Inst. Meas. Control"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1007\/s12083-023-01510-z","article-title":"IoT intrusion detection model based on gated recurrent unit and residual network","volume":"16","author":"Zhao","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref48","doi-asserted-by":"crossref","first-page":"72357","DOI":"10.1007\/s11042-024-18333-6","volume":"83","author":"Figen","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref49","series-title":"IEEE 21st Consum. Commun. Netw. Conf. (CCNC)","first-page":"107","article-title":"Deceiving post-hoc explainable AI (XAI) methods in network intrusion detection","author":"Senevirathna","year":"2024"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109724","article-title":"Efficient intrusion detection toward IoT networks using cloud\u2013edge collaboration","volume":"228","author":"Yang","year":"2023","journal-title":"Comput. Netw."},{"key":"ref51","doi-asserted-by":"crossref","first-page":"5476","DOI":"10.1109\/JIOT.2020.3030072","article-title":"A survey on federated learning: The journey from centralized to distributed on-site learning and beyond","volume":"8","author":"Abdulrahman","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref52","doi-asserted-by":"crossref","first-page":"186604","DOI":"10.1007\/s11704-023-2791-8","article-title":"Federated learning-outcome prediction with multi-layer privacy protection","volume":"18","author":"Zhang","year":"2024","journal-title":"Front. Comput. Sci."},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.1186\/s40537-023-00829-x","article-title":"From distributed machine to distributed deep learning: A comprehensive survey","volume":"10","author":"Dehghani","year":"2023","journal-title":"J. Big Data"},{"key":"ref54","article-title":"A review of federated meta-learning and its application in cyberspace security","volume":"12","author":"Liu","year":"2023","journal-title":"Electronics"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1007\/s10207-023-00807-7","volume":"23","author":"Yesi","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref56","series-title":"IEEE Int. Perform., Comput., Commun. Conf. (IPCCC)","first-page":"202","article-title":"Deep convolutional autoencoder for energy-efficient smart health wearables in the era of big data","author":"Wong","year":"2022"},{"key":"ref57","author":"Mohd","year":"2024","journal-title":"Cluster Comput."},{"key":"ref58","doi-asserted-by":"crossref","first-page":"13241","DOI":"10.1007\/s11227-023-05197-0","article-title":"EIDM: Deep learning model for IoT intrusion detection systems","volume":"79","author":"Elnakib","year":"2023","journal-title":"J. Supercomput."},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.1007\/s42979-023-01770-9","article-title":"Intrusion detection framework in IoT networks","volume":"4","author":"Bajpai","year":"2023","journal-title":"SN Comput. Sci."},{"key":"ref60","doi-asserted-by":"crossref","first-page":"14489","DOI":"10.1007\/s11227-024-06021-z","article-title":"Securing IoT networks in cloud computing environments: A real\u2011time IDS","volume":"80","author":"Biswas","year":"2024","journal-title":"J. Supercomput."},{"key":"ref61","article-title":"Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing","volume":"12","author":"Doaa","year":"2023","journal-title":"J. Cloud Comput."},{"key":"ref62","first-page":"1365","article-title":"Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning","volume":"16","author":"Kumar","year":"2024","journal-title":"Int. J. Inform. Technol."},{"key":"ref63","doi-asserted-by":"crossref","first-page":"5870","DOI":"10.1007\/s11227-023-05685-3","article-title":"Protecting IoT devices from security attacks using effective decision\u2010making strategy of appropriate features","volume":"80","author":"Inam","year":"2024","journal-title":"J. Supercomput."},{"key":"ref64","author":"Sharma","year":"2024","journal-title":"Int. J. Inf. Tecnol."},{"key":"ref65","first-page":"3","author":"Iqbal","year":"2023","journal-title":"Securing IoT Using Supervised Machine Learning in Artificial Intelligence of Things"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"3563","DOI":"10.1007\/s10489-022-03578-1","article-title":"FedProLs: Federated learning for IoT perception data prediction","volume":"53","author":"Zeng","year":"2023","journal-title":"Appl. Intell."},{"key":"ref67","first-page":"1","article-title":"IoT-enabled sensors in automation systems and their security challenges in sensor networks","volume":"7","author":"Sauter","year":"2023","journal-title":"Sens. Netw."},{"key":"ref68","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1016\/j.procs.2020.01.039","article-title":"Performance analysis of distributed and federated learning models on private data","volume":"165","author":"Chandiramani","year":"2019","journal-title":"Procedia Comput. Sci."},{"key":"ref69","doi-asserted-by":"crossref","first-page":"8367","DOI":"10.1007\/s10586-024-04436-0","volume":"27","author":"Ahsan","year":"2024","journal-title":"Cluster Comput."},{"key":"ref70","doi-asserted-by":"crossref","first-page":"10511","DOI":"10.1007\/s11227-023-05846-4","volume":"80","author":"Jagarlamudi","year":"2023","journal-title":"J. Supercomput."},{"key":"ref71","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s11633-022-1343-2","article-title":"Federated learning with privacy-preserving and model IP-right-protection","volume":"20","author":"Yang","year":"2023","journal-title":"Mach. Intell. Res."},{"key":"ref72","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1186\/s13677-024-00618-8","article-title":"Privacy\u2011preserving federated learning based on partial low\u2011quality data","volume":"13","author":"Wang","year":"2024","journal-title":"J. Cloud Comput.: Adv., Syst. Appl."},{"key":"ref73","series-title":"IEEE 94th Veh. Technol. Conf. (VTC2021-Fall)","first-page":"1","article-title":"A semi-decentralized security framework for connected and autonomous vehicles","author":"Carvajal-Roca","year":"2021"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.neucom.2020.10.014","article-title":"An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation","volume":"422","author":"Anh-Tu","year":"2021","journal-title":"Neurocomputing"},{"key":"ref75","first-page":"375","author":"Song","year":"2024","journal-title":"Collaborative Computing: Networking, Applications and Worksharing"},{"key":"ref76","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103526","article-title":"Multi head self-attention gated graph convolutional network based multi\u2011attack intrusion detection in MANET","volume":"136","author":"Reka","year":"2024","journal-title":"Comput. Secur."},{"key":"ref77","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s42979-023-01736-x","article-title":"Context aware hybrid network architecture for IoT with machine learning based intelligent gateway","volume":"4","author":"Neeti","year":"2023","journal-title":"SN Comput. Sci."},{"key":"ref78","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1007\/s42979-023-01898-8","article-title":"Machine learning based low redundancy prediction model for IoT\u2011enabled Wireless Sensor Network","volume":"4","author":"Regilan","year":"2023","journal-title":"SN Comput. Sci."},{"key":"ref79","first-page":"213","author":"Miller","year":"2023","journal-title":"Information Security, Privacy and Digital Forensics"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"14663","DOI":"10.1007\/s10462-023-10513-4","article-title":"DeepThink IoT: The strength of deep learning in Internet of Things","volume":"56","author":"Divyansh","year":"2023","journal-title":"Artif. Intell. Rev."},{"key":"ref81","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/978-3-031-50580-5_27","author":"Zhang","year":"2024","journal-title":"Multimedia Technology and Enhanced Learning"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_53861\/TSP_CMC_53861.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:31:41Z","timestamp":1741314701000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":81,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.053861","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-05-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-31","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}