{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:47Z","timestamp":1776926327044,"version":"3.51.2"},"reference-count":128,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064903","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T03:54:28Z","timestamp":1751601268000},"page":"4055-4104","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection in Internet of Medical Things Using Digital Twins\u2014A Review"],"prefix":"10.32604","volume":"84","author":[{"given":"Tony","family":"Thomas","sequence":"first","affiliation":[]},{"given":"Ravi","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"Soumya","family":"Pal","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2023 IEEE Smart World Congress (SWC); 2023 Aug 28\u201331; Portsmouth, UK","first-page":"1","article-title":"Digital twins in Industry 4.0 cyber security","author":"Lo"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1016\/j.cie.2018.11.030","article-title":"A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements","volume":"127","author":"Manavalan","year":"2019","journal-title":"Comput Ind Eng"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2405","DOI":"10.1109\/TII.2018.2873186","article-title":"Digital twin in industry: state-of-the-Art","volume":"15","author":"Tao","year":"2019","journal-title":"IEEE Trans Ind Inform"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1109\/COMST.2022.3171465","article-title":"Digital twin: a comprehensive survey of security threats","volume":"24","author":"Alcaraz","year":"2022","journal-title":"IEEE Commun Surv Tutorials"},{"key":"ref5","first-page":"1546","article-title":"IoT-Enabled plant monitoring system with power optimization and secure authentication","volume":"81","author":"Huda","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1007\/s11277-020-07446-4","article-title":"Internet of things (IoT), applications and challenges: a comprehensive review","volume":"114","author":"Khanna","year":"2020","journal-title":"Wireless Personal Commun"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"9475","DOI":"10.1109\/JIOT.2019.2929263","article-title":"Design of multipath transmission control for information-centric Internet of Things: a distributed stochastic optimization framework","volume":"6","author":"Wang","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref8","first-page":"1","author":"Kamath","year":"2020 Jun 3\u20135","journal-title":"2020 Global Internet of Things Summit (GIoTS)"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","article-title":"TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems","volume":"8","author":"Alsaedi","year":"2020","journal-title":"IEEE Access"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"23080","DOI":"10.1109\/JIOT.2024.3387294","article-title":"Meta-IDS: meta-learning based smart intrusion detection system for internet of medical things (IoMT) network","volume":"11","author":"Zukaib","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref11","series-title":"2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA); 2021 Sep 7\u201310; Vasteras, Sweden","first-page":"1","article-title":"A security framework in digital twins for cloud-based industrial control systems: intrusion detection and mitigation","author":"Akbarian"},{"key":"ref12","series-title":"2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops); 2022 Mar 21\u201325; Pisa, Italy","first-page":"611","article-title":"Digital twin-based intrusion detection for industrial control systems","author":"Varghese"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2","DOI":"10.3390\/machines7010002","article-title":"Application of IoT-aided simulation to manufacturing systems in cyber-physical system","volume":"7","author":"Tan","year":"2019","journal-title":"Machines"},{"key":"ref14","first-page":"31","author":"Khujamatov","year":"2021","journal-title":"IoT, IIoT, and cyber-physical systems integration. In: Emergence of cyber physical system and IoT in smart automation and robotics: computer engineering in automation"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.jmsy.2020.11.017","article-title":"Cyber-physical systems architectures for industrial internet of things applications in Industry 4.0: a literature review","volume":"58","author":"Pivoto","year":"2021","journal-title":"J Manufac Syst"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2156","DOI":"10.3390\/app13042156","article-title":"Design of a smart factory based on cyber-physical systems and Internet of Things towards Industry 4.0","volume":"13","author":"Ryalat","year":"2023","journal-title":"Appl Sci"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-981-19-2416-3_8","author":"Mitra","year":"2022","journal-title":"Next generation healthcare informatics"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1080\/02564602.2021.1927863","article-title":"Internet of medical things (IoMT): overview, emerging technologies, and case studies","volume":"39","author":"Razdan","year":"2022","journal-title":"IETE Techn Rev"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3611","DOI":"10.1109\/JIOT.2022.3228795","article-title":"Internet of Things: device capabilities, architectures, protocols, and smart applications in healthcare domain","volume":"10","author":"Islam","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/JBHI.2022.3181823","article-title":"Federated learning for privacy preservation in smart healthcare systems: a comprehensive survey","volume":"27","author":"Ali","year":"2022","journal-title":"IEEE J Biomed Health Inform"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"5143","DOI":"10.1109\/JBHI.2022.3205506","article-title":"Digital twins in healthcare: an architectural proposal and its application in a social distancing case study","volume":"27","author":"De Benedictis","year":"2022","journal-title":"IEEE J Biomed Health Inform"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"8707","DOI":"10.1109\/JIOT.2020.3045653","article-title":"Recent advances in the internet-of-medical-things (IoMT) systems security","volume":"8","author":"Ghubaish","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref23","first-page":"19","article-title":"IoMT-based smart healthcare of elderly people using deep extreme learning machine","volume":"76","author":"Jarrah","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s11761-023-00382-8","article-title":"Metaheuristic-based hyperparameter optimization for multi-disease detection and diagnosis in machine learning","volume":"18","author":"Singh","year":"2024","journal-title":"Serv Oriented Comput Appl"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"122259","DOI":"10.1109\/ACCESS.2020.3006424","article-title":"A healthcare monitoring system for the diagnosis of heart disease in the IoMT cloud environment using MSSO-ANFIS","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"5727","DOI":"10.3390\/app12115727","article-title":"Applications of digital twin across industries: a review","volume":"12","author":"Singh","year":"2022","journal-title":"Appl Sci"},{"key":"ref27","series-title":"2020 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT); 2020 Dec 12\u201316; Dubai, United Arab Emirates","first-page":"1","article-title":"Interactive digital twins framework for asset management through internet","author":"Kong"},{"key":"ref28","first-page":"1","article-title":"The place and role of digital twin in supply chain management","volume":"20","author":"Barykin","year":"2021","journal-title":"Acad Strategic Manag J"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/s42524-021-0186-9","article-title":"Digital twin-driven smart supply chain","volume":"9","author":"Wang","year":"2022","journal-title":"Front Eng Manag"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"601","DOI":"10.3390\/su14020601","article-title":"Overview on digital twin for autonomous electrical vehicles propulsion drive system","volume":"14","author":"Ibrahim","year":"2022","journal-title":"Sustainability"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"105942","DOI":"10.1016\/j.compag.2020.105942","article-title":"Introducing digital twins to agriculture","volume":"184","author":"Pylianidis","year":"2021","journal-title":"Comput Electron Agric"},{"key":"ref32","series-title":"2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM); 2020 Sep 17\u201319; Online","first-page":"1","article-title":"Intrusion detection in digital twins for industrial control systems","author":"Akbarian"},{"key":"ref33","series-title":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS); 2025 Jan 6\u201310; Bengaluru, India","first-page":"721","article-title":"Towards secure AI-driven industrial metaverse with NFT digital twins","author":"Prakash"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"4099","DOI":"10.1109\/ACCESS.2023.3349379","article-title":"A systematic literature review of digital twin research for healthcare systems: research trends, gaps, and realization challenges","volume":"12","author":"Xames","year":"2024","journal-title":"IEEE Access"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-024-11101-w","article-title":"A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities","volume":"58","author":"Naghib","year":"2025","journal-title":"Artif Intell Rev"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s41745-020-00185-2","article-title":"Digital twin for drug discovery and development-the virtual liver","volume":"100","author":"Subramanian","year":"2020","journal-title":"J Indian Inst Sci"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"928387","DOI":"10.3389\/fsysb.2022.928387","article-title":"Drug development digital twins for drug discovery, testing and repurposing: a schema for requirements and development","volume":"2","author":"An","year":"2022","journal-title":"Front Syst Biol"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.3390\/biomedinformatics4020079","article-title":"Unlocking the future of drug development: generative AI, Digital Twins, and Beyond","volume":"4","author":"Mariam","year":"2024","journal-title":"BioMedInformatics"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"103605","DOI":"10.1016\/j.drudis.2023.103605","article-title":"Virtual patients, digital twins and causal disease models: paving the ground for in silico clinical trials","volume":"28","author":"Moingeon","year":"2023","journal-title":"Drug Discov Today"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"20918","DOI":"10.1109\/JIOT.2022.3176300","article-title":"Digital-Twin-Enabled IoMT system for surgical simulation using rAC-GAN","volume":"9","author":"Tai","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"30941","DOI":"10.1109\/ACCESS.2024.3369915","article-title":"Review on approaches of federated modeling in anomaly-based intrusion detection for IoT devices","volume":"12","author":"Isma\u2019ila","year":"2024","journal-title":"IEEE Access"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"103332","DOI":"10.1016\/j.jnca.2022.103332","article-title":"Security and privacy of internet of medical things: a contemporary review in the age of surveillance, botnets, and adversarial ML","volume":"201","author":"Rasool","year":"2022","journal-title":"J Netw Comput Appl"},{"key":"ref43","first-page":"67","author":"Hromada","year":"2023","journal-title":"Research anthology on convergence of blockchain, internet of things, and security"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"102060","DOI":"10.1016\/j.inffus.2023.102060","article-title":"Insights into Internet of Medical Things (IoMT): data fusion, security issues and potential solutions","volume":"102","author":"Ahmed","year":"2024","journal-title":"Inf Fusion"},{"key":"ref45","series-title":"2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET); 2022 Mar 3\u20134; Meknes, Morocco","first-page":"1","article-title":"Machine learning and deep learning methods for intrusion detection systems in IoMT: a survey","author":"Rbah"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"115370","DOI":"10.1109\/ACCESS.2024.3437214","article-title":"IoMT-TrafficData: dataset and tools for benchmarking intrusion detection in internet of medical things","volume":"12","author":"Areia","year":"2024","journal-title":"IEEE Access"},{"key":"ref47","series-title":"2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). 2019 Apr 18\u201319; Ghaziabad, India","first-page":"1","article-title":"ELNIDS: ensemble learning based network intrusion detection system for RPL based Internet of Things","author":"Verma"},{"key":"ref48","series-title":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC); 2022 Nov 19\u201320; Bhubaneswar, India","first-page":"1","article-title":"Lightweight Intrusion Detection System (L-IDS) for the Internet of Things","author":"Priya"},{"key":"ref49","series-title":"2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME); 2021 Oct 7\u20138; Mauritius","first-page":"1","article-title":"Intrusion detection and prevention in Industrial IoT: a technological survey","author":"Alruwaili"},{"key":"ref50","series-title":"2023 IFIP Networking Conference (IFIP Networking); 2023 Jun 12\u201315; Barcelona, Spain","first-page":"1","article-title":"An IoT\/IoMT security testbed for anomaly-based intrusion detection systems","author":"Zachos"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"100887","DOI":"10.1016\/j.iot.2023.100887","article-title":"Artificial intelligence for IoMT security: a review of intrusion detection systems, attacks, datasets and Cloud-Fog-Edge architectures","volume":"23","author":"Hernandez-Jaimes","year":"2023","journal-title":"Internet Things"},{"key":"ref52","unstructured":"VOSviewer version 1.6.20 [Internet]. [cited 2024 Nov 28]. Available from: https:\/\/app.vosviewer.com\/."},{"key":"ref53","doi-asserted-by":"crossref","first-page":"13789","DOI":"10.1109\/JIOT.2021.3079510","article-title":"Digital twin networks: a survey","volume":"8","author":"Wu","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref54","series-title":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC); 2021 Dec 13\u201315; Atlanta, GA, USA","first-page":"16","article-title":"Hierarchical federated learning based anomaly detection using digital twins for smart healthcare","author":"Gupta"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1969","DOI":"10.1109\/JBHI.2021.3101686","article-title":"An intrusion detection mechanism for secured IoMT framework based on swarm-neural network","volume":"26","author":"Nandy","year":"2021","journal-title":"IEEE J Biomed Health Informs"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"87","DOI":"10.3390\/info12020087","article-title":"Internet of things: a general overview between architectures, protocols and applications","volume":"12","author":"Lombardi","year":"2021","journal-title":"Information"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"102098","DOI":"10.1016\/j.sysarc.2021.102098","article-title":"Middleware for the Internet of Things: a survey on requirements, enabling technologies, and solutions","volume":"117","author":"Zhang","year":"2021","journal-title":"J Syst Archit"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"53671","DOI":"10.1109\/ACCESS.2023.3280414","article-title":"Discovering hazards in IoT architectures: a safety analysis approach for medical use cases","volume":"11","author":"Rashid","year":"2023","journal-title":"IEEE Access"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"11743","DOI":"10.1109\/JIOT.2021.3058953","article-title":"BEdgeHealth: a decentralized architecture for edge-based IoMT networks using blockchain","volume":"8","author":"Nguyen","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"100165","DOI":"10.1016\/j.dajour.2023.100165","article-title":"Digital Twin: benefits, use cases, challenges, and opportunities","volume":"6","author":"Attaran","year":"2023","journal-title":"Decision Anal J"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"1785","DOI":"10.1109\/JPROC.2020.2998530","article-title":"Digital twin in the IoT context: a survey on technical features, scenarios, and architectural models","volume":"108","author":"Minerva","year":"2020","journal-title":"Proc IEEE"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"16749","DOI":"10.1109\/JIOT.2021.3051158","article-title":"Digital twin for intelligent context-aware IoT healthcare systems","volume":"8","author":"Elayan","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cja.2023.05.002","article-title":"makeTwin: a reference architecture for digital twin software platform","volume":"37","author":"Fei","year":"2024","journal-title":"Chin J Aeronautics"},{"key":"ref64","series-title":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks; 2023 Jan 6\u20138; Chengdu, China","first-page":"85","article-title":"Digital twin as a proxy for industrial cyber-physical systems","author":"Aziz"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MIC.2021.3051798","article-title":"Construction of a digital twin framework using free and open-source software programs","volume":"26","author":"Shah","year":"2021","journal-title":"IEEE Internet Comput"},{"key":"ref66","unstructured":"Lazzari L, Farias K. Uncovering the hidden potential of event-driven architecture: a research agenda. arXiv:2308.05270. 2023."},{"key":"ref67","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.procir.2021.11.077","article-title":"Architecture of a human-digital twin as common interface for operator 4.0 applications","volume":"104","author":"L\u00f6cklin","year":"2021","journal-title":"Procedia CIRP"},{"key":"ref68","series-title":"The 8th International Work-Conference on Bioinformatics and Biomedical Engineering; 2020 Sep 30\u2013Oct 2; Granada, Spain","first-page":"418","article-title":"A proposal to evolving towards digital twins in healthcare","author":"Angulo"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"4733","DOI":"10.1109\/TII.2020.3019788","article-title":"Real-world anomaly detection by using digital twin systems and weakly supervised learning","volume":"17","author":"Castellani","year":"2020","journal-title":"IEEE Trans Ind Inform"},{"key":"ref70","series-title":"2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS); 2024 Aug 23\u201324; Hassan, India","first-page":"1","article-title":"Integrating digital twins with AI for real-time intrusion detection in smart infrastructure networks","author":"Sasikala"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"60823","DOI":"10.1109\/ACCESS.2022.3179982","article-title":"Open process automation-and digital twin-based performance monitoring of a process manufacturing system","volume":"10","author":"Qamsane","year":"2022","journal-title":"IEEE Access"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"101225","DOI":"10.1016\/j.aei.2020.101225","article-title":"Digital twin as a service (DTaaS) in Industry 4.0: an architecture reference model","volume":"47","author":"Aheleroff","year":"2021","journal-title":"Adv Eng Inform"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"108459","DOI":"10.1016\/j.cmpb.2024.108459","article-title":"Smart monitoring solution for dengue infection control: a digital twin-inspired approach","volume":"257","author":"Manocha","year":"2024","journal-title":"Comput Methods Programs Biomed"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"2562","DOI":"10.3390\/electronics10212562","article-title":"An anomaly-based intrusion detection system for internet of medical things networks","volume":"10","author":"Zachos","year":"2021","journal-title":"Electronics"},{"key":"ref75","series-title":"2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI); 2024 Jul 1\u20133; Knoxville, TN, USA","first-page":"433","article-title":"DT-IoMT: a digital twin reference model for secure internet of medical things","author":"Kabir"},{"key":"ref76","series-title":"2023 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE); 2023 Nov 8\u201311; Kerala, India","first-page":"1","article-title":"Security risk assessment of metaverse based healthcare systems based on common vulnerabilities and exposures (CVE)","author":"Prakash"},{"key":"ref77","series-title":"2023 IEEE International Conference on Communications Workshops (ICC Workshops); 2023 May 28\u2013Jun 1; Rome, Italy","first-page":"1253","article-title":"Poisoning attacks in federated edge learning for digital twin 6G-enabled IoTs: an anticipatory study","author":"Ferrag"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"021701","DOI":"10.1115\/1.4056077","article-title":"A scalable digital twin framework based on a novel adaptive ensemble surrogate model","volume":"145","author":"Lai","year":"2023","journal-title":"J Mech Des"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"110139","DOI":"10.1016\/j.compscitech.2023.110139","article-title":"Deep-learning-enhanced digital twinning of complex composite structures and real-time mechanical interaction","volume":"241","author":"Xu","year":"2023","journal-title":"Compos Sci Technol"},{"key":"ref80","doi-asserted-by":"crossref","unstructured":"Huang Z, Zhang N, Shen J, Diamantopoulos G, Hua Z, Tziritas N, et al. Distributed simulation for digital twins of large-scale real-world DiffServ-based networks. arXiv:2405.20815. 2024.","DOI":"10.1007\/978-3-031-69583-4_18"},{"key":"ref81","series-title":"2024 20th International Conference on Network and Service Management (CNSM); 2024 Oct 28\u201331; Prague, Czech Republic","first-page":"1","article-title":"Addressing the scalability of network digital twins: a network sampling approach","author":"Kellil"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"4796","DOI":"10.4102\/sajbm.v56i1.4796","article-title":"IoT medical device risks: data security, privacy, confidentiality and compliance with HIPAA and COBIT 2019","volume":"56","author":"Ne","year":"2025","journal-title":"South African J Bus Manag"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"1636","DOI":"10.1109\/COMST.2018.2874978","article-title":"Anatomy of threats to the internet of things","volume":"21","author":"Makhdoom","year":"2018","journal-title":"IEEE Commun Surv Tutorials"},{"key":"ref84","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.8196","author":"Franklin","year":"2020","journal-title":"Security analysis of first responder mobile and wearable devices"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"4828","DOI":"10.3390\/s20174828","article-title":"Security in IoMT communications: a survey","volume":"20","author":"Koutras","year":"2020","journal-title":"Sensors"},{"key":"ref86","first-page":"73","article-title":"A systematic review on security vulnerabilities to preveny types of attacks in iomt","volume":"2","author":"Bouriche","year":"2022","journal-title":"Int J Computat, Inf Manuf (IJCIM)"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"101351","DOI":"10.1016\/j.iot.2024.101351","article-title":"CICIoMT2024: a benchmark dataset for multi-protocol security assessment in IoMT","volume":"28","author":"Dadkhah","year":"2024","journal-title":"Internet Things"},{"key":"ref88","doi-asserted-by":"crossref","unstructured":"Areia J, Bispo IA, Santos L, Costa RL. IoMT-TrafficData: a dataset for benchmarking intrusion detection in IoMT. Zenodo. 2023 [Dataset]. doi:10.5281\/zenodo.8116338.","DOI":"10.1109\/ACCESS.2024.3437214"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"102621","DOI":"10.1016\/j.adhoc.2021.102621","article-title":"ECU-IoHT: a dataset for analyzing cyberattacks in Internet of Health Things","volume":"122","author":"Ahmed","year":"2021","journal-title":"Ad Hoc Netw"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","article-title":"Intrusion detection system for healthcare systems using medical and network data: a comparison study","volume":"8","author":"Hady","year":"2020","journal-title":"IEEE Access"},{"key":"ref91","unstructured":"Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R. WUSTL-IIOT-2021 dataset for IIoT cybersecurity research. 2021 [Internet]. [cited 2024 Nov 28]. Available from: http:\/\/www.cse.wustl.edu\/\u223cjain\/iiot2\/index.html."},{"key":"ref92","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications: centralized and federated learning. IEEE Dataport. 2022 [Dataset]. doi:10.21227\/mbc1-1h68.","DOI":"10.36227\/techrxiv.18857336.v1"},{"key":"ref93","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"ICISSp"},{"key":"ref94","series-title":"Canadian Conference on Artificial Intelligence; 2020 May 13\u201315; Ottawa, ON, Canada","first-page":"508","article-title":"A scheme for generating a dataset for anomalous activity detection in IoT networks","author":"Ullah"},{"key":"ref95","unstructured":"Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Breitenbacher D, Shabtai A. UCI Machine Learning Repository. 2018 [Dataset]. doi:10.24432\/C5RC8J."},{"key":"ref96","series-title":"Military Communications and Information Systems Conference (MilCIS); 2015 Nov 10\u201312; Canberra, ACT, Australia","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa"},{"key":"ref97","series-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications; 2009 Jul 8\u201310; Ottawa, ON, Canada","first-page":"1","article-title":"A detailed analysis of the KDD CUP 99 data set","author":"Tavallaee"},{"key":"ref98","series-title":"International Conference on Information Security; 2024 Oct 24\u201326; Arlington, VA, USA","first-page":"286","article-title":"FedMADE: robust federated learning for intrusion detection in iot networks using a dynamic aggregation method","author":"Sun"},{"key":"ref99","first-page":"98","author":"Pope","year":"2024","journal-title":"Security and privacy in smart environments"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"100068","DOI":"10.1016\/j.csa.2024.100068","article-title":"Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models","volume":"3","author":"Olanrewaju-George","year":"2025","journal-title":"Cyber Secur Appl"},{"key":"ref101","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1186\/s40537-024-00892-y","article-title":"Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning","volume":"11","author":"Li","year":"2024","journal-title":"J Big Data"},{"key":"ref102","series-title":"Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy","first-page":"91","article-title":"Process-aware intrusion detection in MQTT networks","author":"Empl","year":"2024 Jun 19\u201321;"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1504\/IJESMS.2024.136976","article-title":"Ensemble approach of GP, ACOT, PSO, and SNN for predicting software reliability","volume":"15","author":"Shanthi","year":"2024","journal-title":"Int J Eng Syst Modelling Simulation"},{"key":"ref104","series-title":"Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security; 2024 Apr 18\u201319; Meknes, Morocco","first-page":"1","article-title":"Federated deep learning models for intrusion detection in IoT","author":"Ennaji"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"69551","DOI":"10.1109\/ACCESS.2024.3395997","article-title":"Federated learning for privacy preserving intrusion detection in software defined networks","volume":"12","author":"Raza","year":"2024","journal-title":"IEEE Access"},{"key":"ref106","series-title":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD); 2022 Nov 2\u20133; Paris, France","first-page":"179","article-title":"Prototyping an anomaly-based intrusion detection system for internet of medical things networks","author":"Zachos"},{"key":"ref107","series-title":"2020 13th International Conference on Developments in eSystems Engineering (DeSE); 2020 Dec 14\u201317; Liverpool, UK","first-page":"418","article-title":"Intrusion detection in smart city hospitals using ensemble classifiers","author":"Saba"},{"key":"ref108","series-title":"2024 4th International Conference on Digital Futures and Transformative Technologies (ICoDT2); 2024 Oct 22\u201323; Islamabad, Pakistan","first-page":"1","article-title":"Explainable boosting ensemble methods for intrusion detection in internet of medical things (IoMT) applications","author":"Sohail"},{"key":"ref109","first-page":"17","article-title":"Design and analysis of intrusion detection system using machine learning in smart healthcare system","volume":"19","author":"Yamuna","year":"2024","journal-title":"J Mech Continua Math Sci"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/JBHI.2022.3186250","article-title":"Dew-cloud-based hierarchical federated learning for intrusion detection in IoMT","volume":"27","author":"Singh","year":"2022","journal-title":"IEEE J Biomed Health Inform"},{"key":"ref111","series-title":"2022 15th International Conference on Security of Information and Networks (SIN); 2022 Nov 11\u201313; Sousse, Tunisia","first-page":"1","article-title":"Intrusion detection system for IoMT through blockchain-based federated learning","author":"Zaabar"},{"key":"ref112","series-title":"2024 IEEE World AI IoT Congress (AIIoT); 2024 May 29\u201331; Seattle, WA, USA","first-page":"546","article-title":"Evaluation of protocol-centric IDS for the IoMT leveraging ML techniques","author":"Udayakumar"},{"key":"ref113","doi-asserted-by":"crossref","first-page":"181560","DOI":"10.1109\/ACCESS.2020.3026260","article-title":"An intrusion detection system for internet of medical things","volume":"8","author":"Thamilarasu","year":"2020","journal-title":"IEEE Access"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"25454","DOI":"10.1109\/JIOT.2023.3327024","article-title":"An intelligent and explainable SAAS-based Intrusion Detection System for resource-constrained IoMT","volume":"11","author":"Aljuhani","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref115","series-title":"2021 IEEE Globecom Workshops (GC Wkshps); 2021 Dec 7\u201311; Madrid, Spain","first-page":"1","article-title":"Federated transfer learning-based IDS for the internet of medical things (IoMT)","author":"Otoum"},{"key":"ref116","series-title":"2022 IEEE Cloud Summit; 2022 Oct 20\u201321; Fairfax, VA, USA","first-page":"57","article-title":"IDS-Chain: a collaborative intrusion detection framework empowered blockchain for internet of medical things","author":"Aljuhani"},{"key":"ref117","series-title":"14th IEEE Conference on Software Testing, Verification and Validation (ICST); 2021 Apr 12\u201316; Porto de Galinhas, Brazil","first-page":"205","article-title":"Digital twin-based anomaly detection in cyber-physical systems","author":"Xu"},{"key":"ref118","series-title":"2023 16th International Conference on Information Security and Cryptology (ISCT\u00fcrkiye); 2023 Oct 18\u201319; Ankara, Turkey","first-page":"1","article-title":"Security through digital twin-based intrusion detection: a SWaT dataset analysis","author":"Bozdal"},{"key":"ref119","series-title":"2014 12th IEEE International Conference on Industrial Informatics (INDIN); 2014 Jul 27\u201330; Porto Alegre, Brazil","first-page":"60","article-title":"Online passive learning of timed automata for cyber-physical production systems","author":"Maier"},{"key":"ref120","series-title":"2016 International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater). 2016 Apr 11; Vienna, Austria","first-page":"31","article-title":"SWaT: A water treatment testbed for research and training on ICS security","author":"Mathur"},{"key":"ref121","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MCOMSTD.0001.2100022","article-title":"Digital twin-enabled intelligent DDOS detection mechanism for autonomous core networks","volume":"6","author":"Yigit","year":"2022","journal-title":"IEEE Commun Standards Magaz"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"3561","DOI":"10.1109\/JSAC.2023.3310091","article-title":"An intelligent digital twin method based on spatio-temporal feature fusion for IoT attack behavior identification","volume":"41","author":"Wang","year":"2023","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref123","series-title":"2023 14th International Conference on Information and Knowledge Technology (IKT); 2023 Dec 26\u201328; Isfahan, Iran","first-page":"24","article-title":"AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure","author":"Patel"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"19825","DOI":"10.1109\/JIOT.2023.3282648","article-title":"Federated continuous learning based on stacked broad learning system assisted by digital twin networks: an incremental learning approach for intrusion detection in UAV networks","volume":"10","author":"He","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/TSMC.2020.3043147","article-title":"Stacked broad learning system: from incremental flatted structure to deep model","volume":"51","author":"Liu","year":"2020","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"ref126","series-title":"2021 International Conference on Information Security and Cryptology (ISCTURKEY); 2021 Dec 2\u20133; Ankara, Turkey","first-page":"7","article-title":"Digital twin security threats and countermeasures: an introduction","author":"Karaarslan"},{"key":"ref127","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.ins.2020.03.041","article-title":"Privacy preservation for machine learning training and classification based on homomorphic encryption schemes","volume":"526","author":"Li","year":"2020","journal-title":"Inf Sci"},{"key":"ref128","series-title":"2023 MSEC International Manufacturing Science and Engineering Conference; 2023 Jun 12\u201316; New Brunswick, NJ, USA","first-page":"1","article-title":"An analysis of the new ISO 23247 series of standards on digital twin framework for manufacturing","author":"Shao"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_64903\/TSP_CMC_64903.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:19Z","timestamp":1776923119000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":128,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064903","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}