{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T13:20:47Z","timestamp":1771680047506,"version":"3.50.1"},"reference-count":51,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.059271","type":"journal-article","created":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T09:07:11Z","timestamp":1732266431000},"page":"4265-4283","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["IoT-CDS: Internet of Things Cyberattack Detecting System Based on Deep Learning Models"],"prefix":"10.32604","volume":"81","author":[{"given":"Monir","family":"Abdullah","sequence":"first","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/JAS.2021.1004261","article-title":"Deep learning based attack detection for cyber-physical system cybersecurity: A survey","volume":"9","author":"Zhang","year":"Mar. 2022","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-020-00201-3","article-title":"Security considerations for Internet of Things: A survey","volume":"1","author":"Jurcut","year":"2020","journal-title":"SN Comput. Sci."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/JIOT.2015.2417684","article-title":"An IoT-aware architecture for smart healthcare systems","volume":"2","author":"Catarinucci","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.simpat.2019.102031","article-title":"Deep recurrent neural network for IoT intrusion detection system","volume":"101","author":"Almiani","year":"2020, Art. no. 102031","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","article-title":"A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges","volume":"28","author":"Thakkar","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"22133","DOI":"10.1109\/JIOT.2021.3106898","article-title":"Deep learning in security of Internet of Things","volume":"9","author":"Li","year":"Nov. 15, 2022","journal-title":"IEEE Internet Things J."},{"key":"ref7","article-title":"Toward a deep learning-based intrusion detection system for IoT against botnet attacks","volume":"10","author":"Idrissi","year":"2021","journal-title":"IAES Int. J. Artif. Intell. (IJ-AI)"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3993","DOI":"10.1007\/s11042-019-7495-6","article-title":"Adaptive hybrid intrusion detection system for crowd sourced multimedia internet of things systems","volume":"79","author":"Venkatraman","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.3390\/electronics9071177","article-title":"A review of intrusion detection systems using machine and deep learning in Internet of Things: Challenges, solutions and future directions","volume":"9","author":"Asharf","year":"2020, Art. no. 1177","journal-title":"Electronics"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/s13042-020-01096-5","article-title":"Recent advances in deep learning","volume":"11","author":"Wang","year":"2020","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.3390\/electronics9122152","article-title":"An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks","volume":"9","author":"Abu Al-Haija","year":"2020, Art. no. 2152","journal-title":"Electronics"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.3390\/jsan11010018","article-title":"ELBA-IoT: An ensemble learning model for botnet attack detection in IoT networks","volume":"11","author":"Abu Al-Haija","year":"2022","journal-title":"J. Sens. Actuator Netw."},{"key":"ref13","unstructured":"Pioneering deep learning in the cyber security space: The new standard? Information Age,\u201d Mar. 25, 2020. Accessed: Oct. 19, 2024. [Online]. Available: https:\/\/www.information-age.com\/pioneering-deep-learning-cyber-security-new-standard-123488524\/"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2021.100389","article-title":"A systematic review on deep learning approaches for IoT security","volume":"40","author":"Aversano","year":"2021, Art. no. 100389","journal-title":"Comput. Sci. Rev."},{"key":"ref15","first-page":"1","article-title":"Deep learning in IoT intrusion detection","volume":"30","author":"Stefanos","year":"2022","journal-title":"J. Netw. Syst. Manage."},{"key":"ref16","article-title":"Automated federated learning-based adversarial attack and defence in industrial control systems","volume":"6","author":"Zeng","year":"2024, Art. no. e12117","journal-title":"IET Cyber-Syst. Robot."},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100568","article-title":"IoT anomaly detection methods and applications: A survey","volume":"19","author":"Chatterjee","year":"2022, Art. no. 100568","journal-title":"Internet of Things"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"120131","DOI":"10.1109\/ACCESS.2024.3445287","article-title":"Machine learning-based multiclass anomaly detection and classification in hybrid active distribution networks","volume":"12","author":"Chandio","year":"2024","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100059","article-title":"Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches","volume":"7","author":"Hasan","year":"2019, Art. no. 100059","journal-title":"Internet of Things"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1080\/17517575.2021.2023764","article-title":"A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system","volume":"17","author":"Gaurav","year":"2023, Art. no. 2023764","journal-title":"Enterp. Inform. Syst."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","article-title":"Network intrusion detection for IoT security based on learning techniques","volume":"21","author":"Chaabouni","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.3390\/app11188383","article-title":"Anomaly-based intrusion detection systems in IoT using deep learning: A systematic literature review","volume":"11","author":"Alsoufi","year":"2021, Art. no. 8383","journal-title":"Appl. Sci."},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/s10515-021-00298-7","article-title":"Deep learning approach for intrusion detection in IoT-multi cloud environment","volume":"28","author":"Selvapandian","year":"2021","journal-title":"Autom. Softw. Eng."},{"key":"ref24","series-title":"Proc. 2020 IEEE Wireless Commun. Netw. Conf. (WCNC), Seoul, Republic of Korea,","first-page":"1","article-title":"Collaborative learning model for cyberattack detection systems in IoT Industry 4.0","author":"Khoa","year":"2020"},{"key":"ref25","first-page":"1785","article-title":"A real-time sequential deep extreme learning machine cybersecurity intrusion detection system","volume":"66","author":"Haider","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","article-title":"ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets","volume":"9","author":"Booij","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1109\/JIOT.2020.2973176","article-title":"Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture","volume":"7","author":"Ravi","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1155\/2018\/1914980","article-title":"Network intrusion detection method based on PCA and Bayes algorithm","volume":"2018","author":"Zhang","year":"2018, Art. no. 1914980","journal-title":"Secur. Commun. Netw."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"7704","DOI":"10.1109\/TII.2020.3025755","article-title":"Deep-IFS: Intrusion detection approach for industrial internet of things traffic in fog environment","volume":"17","author":"Abdel-Basset","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"6348","DOI":"10.1109\/JIOT.2020.3011726","article-title":"Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1109\/TNNLS.2020.2980749","article-title":"Anomaly detection of time series with smoothness-inducing sequential variational auto-encoder","volume":"32","author":"Li","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1109\/JIOT.2020.3009180","article-title":"Omni SCADA intrusion detection using deep learning algorithms","volume":"8","author":"Gao","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref33","article-title":"Detecting internet of things attacks using distributed deep learning","volume":"163","author":"Parra","year":"2020, Art. no. 102662","journal-title":"J. Netw. Comput. Appl."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"6325","DOI":"10.1016\/j.matpr.2021.04.643","article-title":"Optimal feature selection for machine learning based intrusion detection system by exploiting attribute dependence","volume":"47","author":"Dubey","year":"2021","journal-title":"Mater. Today Proc."},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109662","article-title":"Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks","volume":"225","author":"Syed","year":"2023, Art. no. 109662","journal-title":"Comput. Netw."},{"key":"ref36","first-page":"83","article-title":"A survey of intrusion detection using deep learning in internet of things","volume":"3","author":"Jasim","year":"2022","journal-title":"Iraqi J. Comput. Sci. Math."},{"key":"ref37","doi-asserted-by":"crossref","unstructured":"S. Popoola, B. Adebisi, G. Gui, M. Hammoudeh, H. Gacanin and D. Dancey, \u201cOptimizing deep learning model hyperparameters for botnet attack detection in IoT networks,\u201d 2022. doi: 10.36227\/techrxiv.19501885.","DOI":"10.36227\/techrxiv.19501885.v1"},{"key":"ref38","series-title":"Proc. 2022 IEEE Cloud Summit.","first-page":"57","article-title":"IDS-Chain: A collaborative intrusion detection framework empowered blockchain for Internet of Medical Things","author":"Aljuhani","year":"Oct. 20\u201321, 2022"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"56","DOI":"10.54216\/IJWAC.040106","article-title":"Semi-supervised transformer network for anomaly detection in cellular Internet of Things","volume":"4","author":"Abd Elkhalik","year":"2023","journal-title":"Int. J. Wirel. Ad Hoc Commun."},{"key":"ref40","first-page":"1769","article-title":"Development of PCCNN-based network intrusion detection system for EDGE computing","volume":"71","author":"Haq","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3448614","article-title":"Sustainable security for the Internet of Things using Artificial Intelligence architectures","volume":"21","author":"Iwendi","year":"2021","journal-title":"ACM Trans. Internet Technol."},{"key":"ref42","first-page":"1823","article-title":"Few-shot learning for discovering anomalous behaviors in edge networks","volume":"69","author":"Gamal","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"ref43","first-page":"4703","article-title":"A lightweight intrusion detection system using convolutional neural network and long short-term memory in fog computing","volume":"80","author":"Alzahrani","year":"2024","journal-title":"Comput. Mater. Contin."},{"key":"ref44","article-title":"A taxonomy of IDS in IoTs: ML classifiers, feature selection models, datasets and future directions","volume":"15","author":"Alqahtani","year":"2024","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"key":"ref45","series-title":"2023 10th Int. Conf. Comput. Sustain. Glob. Dev. (INDIACom)","first-page":"438","article-title":"BoT-IoT: Detection of DDoS attacks in Internet of Things for smart cities","author":"Sharma","year":"2023"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11223837","article-title":"Artificial Intelligence algorithms for detecting and classifying MQTT protocol Internet of Things attacks","volume":"11","author":"Alzahrani","year":"2022, Art. no. 3837","journal-title":"Electronics"},{"key":"ref47","doi-asserted-by":"crossref","DOI":"10.3390\/su15108076","article-title":"Design of efficient based Artificial Intelligence approaches for sustainable of cyber security in smart industrial control system","volume":"15","author":"Alzahrani","year":"2023, Art. no. 8076","journal-title":"Sustainability"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","article-title":"TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system","volume":"7","author":"Tama","year":"2019","journal-title":"IEEE Access"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102448","article-title":"An effective genetic algorithm-based feature selection method for intrusion detection systems","volume":"110","author":"Halim","year":"2021, Art. no. 102448","journal-title":"Comput. Secur."},{"key":"ref50","article-title":"Network intrusion detection using sparse autoencoder with swish-PReLU activation model","volume":"6","author":"Kannari","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.1007\/s10462-024-10890-4","article-title":"Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: A review","volume":"57","author":"Mutalib","year":"2024","journal-title":"Artif. Intell. Rev."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59068\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:13:55Z","timestamp":1741328035000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":51,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.059271","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-10-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}