{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:38:31Z","timestamp":1773524311190,"version":"3.50.1"},"reference-count":29,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.058052","type":"journal-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T08:20:46Z","timestamp":1732004446000},"page":"4149-4169","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["Robust Network Security: A Deep Learning Approach to Intrusion Detection in IoT"],"prefix":"10.32604","volume":"81","author":[{"given":"Ammar","family":"Odeh","sequence":"first","affiliation":[]},{"given":"Anas Abu","family":"Taleb","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100721","article-title":"The Internet of Things (IoT) in healthcare: Taking stock and moving forward","volume":"22","author":"Rejeb","year":"2023","journal-title":"Internet Things"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1007\/s11831-021-09622-6","article-title":"A review and state of art of Internet of Things (IoT)","volume":"29","author":"Laghari","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.54060\/a2zjournals.jase.42","article-title":"Cyber security threats and countermeasures in digital age","volume":"4","author":"Thakur","year":"2024","journal-title":"J. Appli. Sci. Educ."},{"key":"ref4","first-page":"1","article-title":"Detecting cyber threats in IoT networks: A machine learning approach","volume":"16","author":"Alaa Hammad","year":"2024","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"ref5","first-page":"253","author":"Sivagami","journal-title":"Secure Communication in Internet of Things"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1016\/j.clsr.2024.106009","article-title":"Cyber resilience act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark?","volume":"54","author":"Shaffique","year":"2024","journal-title":"Comput. Law Secur. Rev."},{"key":"ref7","series-title":"Proc. 28th Int. Conf. Eval. Assess. Softw. Eng.","first-page":"686","article-title":"Study for integrating IoT-IDS datasets: Machine and deep learning for secure IoT network system","author":"Rani","year":"2024"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1765","DOI":"10.1007\/s00500-023-09452-7","article-title":"ML-IDS: An efficient ML-enabled intrusion detection system for securing IoT networks and applications","volume":"28","author":"Al-Ambusaidi","year":"2024","journal-title":"Soft Comput."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.procs.2024.05.048","article-title":"A blockchain-based intrusion detection\/pre vention systems in IoT network: A systematic review","volume":"236","author":"Shalabi","year":"2024","journal-title":"Procedia Comput. Sci."},{"key":"ref10","article-title":"Analysis of extreme learning machines (ELMs) for intelligent intrusion detection systems: A survey","volume":"253","author":"Al-Haija","year":"2024","journal-title":"Expert. Syst. Appl."},{"key":"ref11","author":"Ullah","year":"2024","journal-title":"Future Communication Systems Using Artificial Intelligence, Internet of Things and Data Science"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1201\/9781003426974-11","author":"Khalil","year":"2024","journal-title":"Low-Power Wide Area Network for Large Scale Internet of Things"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.3390\/s24020713","article-title":"Anomaly detection IDS for detecting DoS attacks in IoT networks based on machine learning algorithms","volume":"24","author":"Altulaihan","year":"2024","journal-title":"Sensors"},{"key":"ref14","article-title":"A critical review of artificial intelligence based approaches in intrusion detection: A comprehensive analysis","volume":"2024","author":"Muneer","year":"2024","journal-title":"J. Eng."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.30574\/wjarr.2024.21.1.0315","article-title":"Machine learning in cybersecurity: A review of threat detection and defense mechanisms","volume":"21","author":"Okoli","year":"2024","journal-title":"World J. Adv. Res. Rev."},{"key":"ref16","first-page":"242","article-title":"Future horizons: AI-enhanced threat detection in cloud environments: Unveiling opportunities for research","volume":"3","author":"Arif","year":"2024","journal-title":"Int. J. Multidiscip. Sci. Arts"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.3758\/s13423-013-0421-4","article-title":"The visual detection of threat: A cautionary tale","volume":"20","author":"Quinlan","year":"2013","journal-title":"Psychono. Bull. Rev."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1080\/02724980143000659","article-title":"Searching for threat","volume":"55","author":"Tipples","year":"2002","journal-title":"Q. J. Exp. Psychol. Sec. A"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.comcom.2022.08.022","article-title":"iNIDS: SWOT analysis and TOWS inferences of state-of-the-art NIDS solutions for the development of intelligent network intrusion detection system","volume":"195","author":"Verma","year":"2022","journal-title":"Comput. Commun."},{"key":"ref20","article-title":"A comprehensive study on cybersecurity challenges and opportunities in the IoT world","volume":"6","author":"Lone","year":"2023","journal-title":"Secur. Priv."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"3609","DOI":"10.1007\/s12652-019-01611-9","article-title":"Retracted article: Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment","volume":"12","author":"Mayuranathan","year":"2021","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106997","article-title":"An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment","volume":"100","author":"SaiSindhuTheja","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"3926","DOI":"10.1007\/s10489-020-01727-y","article-title":"Transient search optimization: A new meta-heuristic optimization algorithm","volume":"50","author":"Qais","year":"2020","journal-title":"Appl. Intell."},{"key":"ref24","first-page":"30","article-title":"A self organizing map intrusion detection system for RPL protocol attacks","volume":"11","author":"Kfoury","year":"2019","journal-title":"Int. J. Interdiscip. Telecomm. Netw. (IJITN)"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3417987","article-title":"Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures","volume":"53","author":"Waheed","year":"2020","journal-title":"ACM Comput. Surv. (csur)"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1186\/s40537-024-00892-y","article-title":"Optimizing IoT intrusion detection system: Feature selection versus feature extraction in machine learning","volume":"11","author":"Li","year":"2024","journal-title":"J. Big Data"},{"key":"ref27","first-page":"188","article-title":"A novel data preprocessing model for lightweight sensory IoT intrusion detection","volume":"9","author":"Khanday","year":"2024","journal-title":"Int. J. Math. Eng. Manag. Sci."},{"key":"ref28","series-title":"IEEE Trans. Consum. Electron.","article-title":"DDoS intrusions detection in low power SD-IoT devices leveraging effective machine learning","author":"Ali","year":"2024"},{"key":"ref29","series-title":"2015 Mil. Commun. Inform. Syst. Conf. (MilCIS)","first-page":"1","article-title":"UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59053\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:10:23Z","timestamp":1741327823000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.058052","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-09-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}