{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:33:11Z","timestamp":1771612391146,"version":"3.50.1"},"reference-count":70,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066753","type":"journal-article","created":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:11:18Z","timestamp":1751515878000},"page":"769-800","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["Future-Proofing CIA Triad with Authentication for Healthcare: Integrating Hybrid Architecture of ML &amp; DL with IDPS for Robust IoMT Security"],"prefix":"10.32604","volume":"85","author":[{"given":"Saad Awadh","family":"Alanazi","sequence":"first","affiliation":[]},{"given":"Fahad","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"102060","DOI":"10.1016\/j.inffus.2023.102060","article-title":"Insights into Internet of medical things (IoMT): data fusion, security issues and potential solutions","volume":"102","author":"Ahmed","year":"2024","journal-title":"Inf Fusion"},{"key":"ref2","first-page":"82","article-title":"Blockchain: securing Internet of medical things (IoMT)","volume":"10","author":"Dilawar","year":"2019","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"100167","DOI":"10.1016\/j.bcra.2023.100167","article-title":"Utilizing blockchains in opportunistic networks for integrity and confidentiality","volume":"5","author":"Rashidibajgan","year":"2024","journal-title":"Blockchain Res Appl"},{"key":"ref4","first-page":"298","article-title":"Security issues in software defined networking (SDN): risks, challenges and potential solutions","volume":"10","author":"Iqbal","year":"2019","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref5","first-page":"288","article-title":"Securing cognitive radio vehicular ad hoc network with fog node based distributed blockchain cloud architecture","volume":"10","author":"Nadeem","year":"2019","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"e0299334","DOI":"10.1371\/journal.pone.0299334","article-title":"Optimising barrier placement for intrusion detection and prevention in WSNs","volume":"19","author":"Reddy","year":"2024","journal-title":"PLoS One"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"4627","DOI":"10.3390\/s22124627","article-title":"InteliRank: a four-pronged agent for the intelligent ranking of cloud services based on end-users\u2019 feedback","volume":"22","author":"Ud Din","year":"2022","journal-title":"Sensors"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1016\/j.icte.2023.10.001","article-title":"SmartHealth: an intelligent framework to secure IoMT service applications using machine learning","volume":"10","author":"Rani","year":"2024","journal-title":"ICT Express"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"363","DOI":"10.32604\/csse.2023.040721","article-title":"Security monitoring and management for the network services in the orchestration of SDN-NFV environment using machine learning techniques","volume":"48","author":"Alshammari","year":"2024","journal-title":"Comput Syst Sci Eng"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"34800","DOI":"10.1109\/ACCESS.2024.3372187","article-title":"A situation based predictive approach for cybersecurity intrusion detection and prevention using machine learning and deep learning algorithms in wireless sensor networks of Industry 4.0","volume":"12","author":"Al-Quayed","year":"2024","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"282","DOI":"10.3390\/jpm14030282","article-title":"Patient-generated health data (PGHD): understanding, requirements, challenges, and existing techniques for data security and privacy","volume":"14","author":"Khatiwada","year":"2024","journal-title":"J Pers Med"},{"key":"ref12","series-title":"Proceedings of the 2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET); 2022 Mar 3\u20134","first-page":"1","article-title":"A stratified IoT deep learning based intrusion detection system","author":"Idrissi","year":"2022"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1468","DOI":"10.1016\/j.jksuci.2022.02.017","article-title":"Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution","volume":"34","author":"Shabbir","year":"2022","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in Internet of Things: the road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput Netw"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","article-title":"On the features and challenges of security and privacy in distributed Internet of Things","volume":"57","author":"Roman","year":"2013","journal-title":"Comput Netw"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/978-3-030-91237-6_26","author":"Kim","year":"2022","journal-title":"Nursing informatics"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","article-title":"Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications","volume":"18","author":"Al-Janabi","year":"2017","journal-title":"Egypt Inform J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TII.2014.2307795","article-title":"A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box","volume":"10","author":"Yang","year":"2014","journal-title":"IEEE Trans Ind Inform"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","article-title":"A comprehensive study of security of Internet-of-things","volume":"5","author":"Mosenia","year":"2017","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1080\/02564602.2021.1927863","article-title":"Internet of medical things (IoMT): overview, emerging technologies, and case studies","volume":"39","author":"Razdan","year":"2022","journal-title":"IETE Tech Rev"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"110227","DOI":"10.1016\/j.asoc.2023.110227","article-title":"Survey of Machine Learning based intrusion detection methods for Internet of Medical Things","volume":"140","author":"Si-Ahmed","year":"2023","journal-title":"Appl Soft Comput"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","article-title":"An overview of anomaly detection techniques: existing solutions and latest technological trends","volume":"51","author":"Patcha","year":"2007","journal-title":"Comput Netw"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1177\/1548512920951275","article-title":"Machine learning in cybersecurity: a comprehensive survey","volume":"19","author":"Dasgupta","year":"2022","journal-title":"J Def Model Simul"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A deep learning approach for intrusion detection using recurrent neural networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"key":"ref25","series-title":"Proceedings of the 2016 International Conference on Platform Technology and Service (PlatCon); 2016 Feb 15\u201317; Jeju, Republic of Korea","first-page":"1","article-title":"Long short term memory recurrent neural network classifier for intrusion detection","author":"Kim","year":"2016"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.3390\/en13102509","article-title":"Performance comparison and current challenges of using machine learning techniques in cybersecurity","volume":"13","author":"Shaukat","year":"2020","journal-title":"Energies"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s10207-020-00508-5","article-title":"A novel scalable intrusion detection system based on deep learning","volume":"20","author":"Mighan","year":"2021","journal-title":"Int J Inf Secur"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"239","DOI":"10.17762\/ijritcc.v11i6.7558","article-title":"Robust and reliable security approach for IoMT: detection of DoS and delay attacks through a high-accuracy machine learning model","volume":"11","author":"Ali Jawad Al-Abadi","year":"2023","journal-title":"Int J Recent Innov Trends Comput Commun"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.comcom.2020.12.003","article-title":"An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks","volume":"166","author":"Kumar","year":"2021","journal-title":"Comput Commun"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1007\/978-3-031-28451-9_35","author":"Lu","year":"2023","journal-title":"Advanced information networking and applications"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"23080","DOI":"10.1109\/JIOT.2024.3387294","article-title":"Meta-IDS: meta-learning-based smart intrusion detection system for Internet of medical things (IoMT) network","volume":"11","author":"Zukaib","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/IOTM.001.2300021","article-title":"Deep learning-based network intrusion detection system for Internet of medical things","volume":"6","author":"Ravi","year":"2023","journal-title":"IEEE Internet Things Mag"},{"key":"ref33","first-page":"1","article-title":"Intrusion detection system for Internet of medical things using GRU with attention mechanism based hybrid deep learning technique","author":"Saran","year":"2025","journal-title":"Jordanian J Comput Inf Technol"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","article-title":"An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture","volume":"160","author":"Swarna Priya","year":"2020","journal-title":"Comput Commun"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.comcom.2024.02.023","article-title":"GEMLIDS-MIOT: a green effective machine learning intrusion detection system based on federated learning for medical IoT network security hardening","volume":"218","author":"Ioannou","year":"2024","journal-title":"Comput Commun"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"6138434","DOI":"10.1155\/2022\/6138434","article-title":"Edge caching in fog-based sensor networks through deep learning-associated quantum computing framework","volume":"2022","author":"Hasan","year":"2022","journal-title":"Comput Intell Neurosci"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"5352108","DOI":"10.1155\/2020\/5352108","article-title":"Security of cloud computing using adaptive neural fuzzy inference system","volume":"2020","author":"Shahzadi","year":"2020","journal-title":"Secur Commun Netw"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","article-title":"Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEE Access"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/s10922-021-09591-y","article-title":"An intelligent tree-based intrusion detection model for cyber security","volume":"29","author":"Al-Omari","year":"2021","journal-title":"J Netw Syst Manag"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"2371","DOI":"10.1007\/s13369-019-03970-z","article-title":"Analysis of support vector machine-based intrusion detection techniques","volume":"45","author":"Bhati","year":"2020","journal-title":"Arab J Sci Eng"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"36","DOI":"10.47893\/IJSSAN.2023.1229","article-title":"Machine learning algorithms for detection of cyber threats using logistic regression","volume":"2023","author":"Gonaygunta","year":"2023","journal-title":"Int J Smart Sens Adhoc Netw"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"3825","DOI":"10.1109\/ACCESS.2023.3349248","article-title":"Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning","volume":"12","author":"Saleh","year":"2024","journal-title":"IEEE Access"},{"key":"ref43","series-title":"Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT); 2022 Jun 6\u20139","first-page":"283","article-title":"Evaluation of Na\u00efve Bayesian algorithms for cyber-attacks detection in wireless sensor networks","author":"Ismail","year":"2022"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"e4088","DOI":"10.1002\/ett.4088","article-title":"Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles","volume":"33","author":"Rehman Javed","year":"2022","journal-title":"Trans Emerging Tel Tech"},{"key":"ref45","series-title":"Proceedings of the 2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI); 2020 Oct 28\u201331","first-page":"190","article-title":"Detecting cybersecurity attacks using different network features with LightGBM and XGBoost learners","author":"Leevy","year":"2020"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"12591","DOI":"10.3390\/app122412591","article-title":"An optimized gradient boost decision tree using enhanced African buffalo optimization method for cyber security intrusion detection","volume":"12","author":"Mishra","year":"2022","journal-title":"Appl Sci"},{"key":"ref47","series-title":"Proceedings of the 2022 International Conference on IoT and Blockchain Technology (ICIBT); 2022 May 6\u20138","first-page":"1","article-title":"A simple and robust approach of random forest for intrusion detection system in cyber security","volume":"2022","author":"Choubisa"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-030-73909-6_18","author":"Subasi","year":"2021","journal-title":"CMBEBIH 2021"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"8830903","DOI":"10.1155\/2020\/8830903","article-title":"Convolution neural network-based higher accurate intrusion identification system for the network security and communication","volume":"2020","author":"Gu","year":"2020","journal-title":"Secur Commun Netw"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"2279","DOI":"10.32604\/iasc.2023.037673","article-title":"Intrusion detection in the Internet of Things using fusion of GRU-LSTM deep learning model","volume":"37","author":"Al-kahtani","year":"2023","journal-title":"Intell Autom Soft Comput"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"188","DOI":"10.51537\/chaos.1348302","article-title":"Anomaly detection in cyber security with graph-based LSTM in log analysis","volume":"5","author":"Alaca","year":"2023","journal-title":"Chaos Theory Appl"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"100317","DOI":"10.1016\/j.cosrev.2020.100317","article-title":"Deep learning algorithms for cybersecurity applications: a technological and status review","volume":"39","author":"Dixit","year":"2021","journal-title":"Comput Sci Rev"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"4184","DOI":"10.3390\/app12094184","article-title":"Network intrusion detection model based on CNN and GRU","volume":"12","author":"Cao","year":"2022","journal-title":"Appl Sci"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.3390\/sym12091458","article-title":"An efficient intrusion detection method based on LightGBM and autoencoder","volume":"12","author":"Tang","year":"2020","journal-title":"Symmetry"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"4507","DOI":"10.1109\/TITS.2020.3017882","article-title":"Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems","volume":"22","author":"Ashraf","year":"2021","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"66428","DOI":"10.1109\/ACCESS.2023.3290139","article-title":"Energy-efficient and security-aware task offloading for multi-tier edge-cloud computing systems","volume":"11","author":"Almuseelem","year":"2023","journal-title":"IEEE Access"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/JSAC.2022.3227088","article-title":"Joint communication and computation offloading for ultra-reliable and low-latency with multi-tier computing","volume":"41","author":"Van Huynh","year":"2023","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref58","series-title":"Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience (CSR); 2024 Sep2\u20134","first-page":"329","article-title":"Enhancing ATM security management in the post-quantum era with quantum key distribution","author":"Ahmad","year":"2024"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"14177","DOI":"10.1038\/s41598-025-94023-z","article-title":"An enhanced ensemble defense framework for boosting adversarial robustness of intrusion detection systems","volume":"15","author":"Awad","year":"2025","journal-title":"Sci Rep"},{"key":"ref60","series-title":"Proceedings of the 11th International Conference on Information Systems Security and Privacy; 2025 Feb 20\u201322","first-page":"72","article-title":"HybridMTD: enhancing robustness against adversarial attacks with ensemble neural networks and moving target defense","author":"Tahayori"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"13491","DOI":"10.3934\/mbe.2023602","article-title":"A hybrid deep learning-based intrusion detection system for IoT networks","volume":"20","author":"Khan","year":"2023","journal-title":"Math Biosci Eng"},{"key":"ref62","series-title":"Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS); 2020 Jan 7\u201311","first-page":"1","article-title":"Deep reinforcement learning based intrusion detection system for cloud infrastructure","volume":"2020","author":"Sethi"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/s10922-023-09748-x","article-title":"An intrusion detection system using extended Kalman filter and neural networks for IoT networks","volume":"31","author":"Kulkarni","year":"2023","journal-title":"J Netw Syst Manag"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"5644","DOI":"10.3390\/s23125644","article-title":"Conditional tabular generative adversarial based intrusion detection system for detecting ddos and dos attacks on the Internet of Things networks","volume":"23","author":"Alabsi","year":"2023","journal-title":"Sensors"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"e1553","DOI":"10.7717\/peerj-cs.1553","article-title":"An ensemble learning based IDS using Voting rule: vel-IDS","volume":"9","author":"Emanet","year":"2023","journal-title":"PeerJ Comput Sci"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/978-3-030-05918-7_20","author":"Potluri","year":"2018","journal-title":"Mining intelligence and knowledge exploration"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"1726","DOI":"10.1038\/s41598-025-85866-7","article-title":"Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering","volume":"15","author":"Ahmed","year":"2025","journal-title":"Sci Rep"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"8003","DOI":"10.3390\/s21238003","article-title":"The whale optimization algorithm approach for deep neural networks","volume":"21","author":"Brodzicki","year":"2021","journal-title":"Sensors"},{"key":"ref69","first-page":"109","author":"Folorunso","year":"2021","journal-title":"Hybrid artificial intelligence and IoT in healthcare"},{"key":"ref70","series-title":"Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON); 2019 Oct 10-12","first-page":"515","article-title":"FBAD: fog-based attack detection for IoT healthcare in smart cities","author":"Alrashdi","year":"2019"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_66753\/TSP_CMC_66753.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:08:23Z","timestamp":1763345303000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63550"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":70,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066753","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}