{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:34:03Z","timestamp":1772739243424,"version":"3.50.1"},"reference-count":77,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Korea Agency for Technology and Standards","award":["K_G012002236201"],"award-info":[{"award-number":["K_G012002236201"]}]},{"name":"Korea Agency for Technology and Standards","award":["K_G012002234001"],"award-info":[{"award-number":["K_G012002234001"]}]},{"name":"Korea Agency for Technology and Standards","award":["GCU- 202300770001"],"award-info":[{"award-number":["GCU- 202300770001"]}]},{"name":"Gachon University research fund","award":["K_G012002236201"],"award-info":[{"award-number":["K_G012002236201"]}]},{"name":"Gachon University research fund","award":["K_G012002234001"],"award-info":[{"award-number":["K_G012002234001"]}]},{"name":"Gachon University research fund","award":["GCU- 202300770001"],"award-info":[{"award-number":["GCU- 202300770001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures has become a paramount concern across diverse fields. Among the numerous cyber threats, denial of service (DoS) and distributed denial of service (DDoS) attacks pose significant risks, as they can render websites and servers inaccessible to their intended users. Conventional intrusion detection methods encounter substantial challenges in effectively identifying and mitigating these attacks due to their widespread nature, intricate patterns, and computational complexities. However, by harnessing the power of deep learning-based techniques, our proposed dense channel-spatial attention model exhibits exceptional accuracy in detecting and classifying DoS and DDoS attacks. The successful implementation of our proposed framework addresses the challenges posed by imbalanced data and exhibits its potential for real-world applications. By leveraging the dense channel-spatial attention mechanism, our model can precisely identify and classify DoS and DDoS attacks, bolstering the cybersecurity defenses of websites and servers. The high accuracy rates achieved across different datasets reinforce the robustness of our approach, underscoring its efficacy in enhancing intrusion detection capabilities. As a result, our framework holds promise in bolstering cybersecurity measures in real-world scenarios, contributing to the ongoing efforts to safeguard against cyber threats in an increasingly interconnected digital landscape. Comparative analysis with current intrusion detection methods reveals the superior performance of our model. We achieved accuracy rates of 99.38%, 99.26%, and 99.43% for Bot-IoT, CICIDS2017, and UNSW_NB15 datasets, respectively. These remarkable results demonstrate the capability of our approach to accurately detect and classify various types of DoS and DDoS assaults. By leveraging the inherent strengths of deep learning, such as pattern recognition and feature extraction, our model effectively overcomes the limitations of traditional methods, enhancing the accuracy and efficiency of intrusion detection systems.<\/jats:p>","DOI":"10.3390\/fi15090297","type":"journal-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T08:45:31Z","timestamp":1693557931000},"page":"297","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6612-8176","authenticated-orcid":false,"given":"Furkat","family":"Safarov","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Sujeong-gu, Seongnam-si 461-701, Gyeonggi-do, Republic of Korea"}]},{"given":"Mainak","family":"Basak","sequence":"additional","affiliation":[{"name":"Department of AI Software, Gachon University, Sujeong-gu, Seongnam-si 461-701, Gyeonggi-do, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1988-5376","authenticated-orcid":false,"given":"Rashid","family":"Nasimov","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, Tashkent State University of Economics, Tashkent 100066, Uzbekistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5923-8695","authenticated-orcid":false,"given":"Akmalbek","family":"Abdusalomov","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Sujeong-gu, Seongnam-si 461-701, Gyeonggi-do, Republic of Korea"},{"name":"Department of Artificial Intelligence, Tashkent State University of Economics, Tashkent 100066, Uzbekistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0184-7599","authenticated-orcid":false,"given":"Young Im","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Sujeong-gu, Seongnam-si 461-701, Gyeonggi-do, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"102725","DOI":"10.1016\/j.cose.2022.102725","article-title":"A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment","volume":"118","author":"Orman","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_2","first-page":"5511","article-title":"Automatic speaker recognition using mel-frequency cepstral coefficients through machine learning","volume":"71","author":"Ayvaz","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"64375","DOI":"10.1109\/ACCESS.2022.3182333","article-title":"RTIDS: A robust transformer-based approach for intrusion detection system","volume":"10","author":"Wu","year":"2022","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Okey, O.D., Maidin, S.S., Adasme, P., Rosa, R.L., Saadi, M., Melgarejo, D.C., and Zegarra Rodriguez, D. (2022). BoostedEnML: Efficient technique for detecting cyberattacks in IoT systems using boosted ensemble machine learning. Sensors, 22.","DOI":"10.3390\/s22197409"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2250071","DOI":"10.1142\/S021964922250071X","article-title":"A hybrid detection system for DDoS attacks based on deep sparse autoencoder and light gradient boost machine","volume":"22","author":"Batchu","year":"2022","journal-title":"J. Inf. Knowl. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Henry, A., Gautam, S., Khanna, S., Rabie, K., Shongwe, T., Bhattacharya, P., Sharma, B., and Chowdhury, S. (2023). Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System. Sensors, 23.","DOI":"10.3390\/s23020890"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"9180","DOI":"10.1007\/s11227-022-05025-x","article-title":"Network intrusion detection via tri-broad learning system based on spatial-temporal granularity","volume":"79","author":"Li","year":"2023","journal-title":"J. Supercomput."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Teixeira, D., Malta, S., and Pinto, P. (2022). A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning. Future Internet, 14.","DOI":"10.3390\/fi14030072"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"12917","DOI":"10.1111\/exsy.12917","article-title":"A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms","volume":"39","author":"Mendonca","year":"2022","journal-title":"Expert Syst."},{"key":"ref_10","first-page":"2250","article-title":"A Review on various widely used shadow detection methods to identify a shadow from images","volume":"6","author":"Abdusalomov","year":"2016","journal-title":"Int. J. Sci. Res. Publ."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1742","DOI":"10.11591\/eei.v11i3.3688","article-title":"Fast and accurate classifying model for denial-of-service attacks by using machine learning","volume":"11","author":"Kareem","year":"2022","journal-title":"Bull. Electr. Eng. Inform."},{"key":"ref_12","first-page":"265","article-title":"Majority Vote-Based Ensemble Approach for Distributed Denial of Service Attack Detection in Cloud Computing","volume":"10","author":"Alqarni","year":"2022","journal-title":"J. Cyber Secur. Mobil."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2150054","DOI":"10.1142\/S0219691321500545","article-title":"An improvement for the automatic classification method for ultrasound images used on CNN","volume":"20","author":"Kuldoshbay","year":"2022","journal-title":"Int. J. Wavelets Multiresolut. Inf. Process."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Fatani, A., Dahou, A., Al-Qaness, M.A., Lu, S., and Elaziz, M.A. (2022). Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system. Sensors, 22.","DOI":"10.3390\/s22010140"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Avazov, K., Hyun, A.E., Sami, S., Khaitov, A.A., Abdusalomov, A.B., and Cho, Y.I. (2023). Forest Fire Detection and Notification Method Based on AI and IoT Approaches. Future Internet, 15.","DOI":"10.3390\/fi15020061"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"117597","DOI":"10.1016\/j.eswa.2022.117597","article-title":"Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization","volume":"204","author":"Alzubi","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_17","first-page":"1","article-title":"R1dit: Privacy-preserving malware traffic classification with attention-based neural networks","volume":"1","author":"Barut","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Mamieva, D., Abdusalomov, A.B., Mukhiddinov, M., and Whangbo, T.K. (2023). Improved Face Detection Method via Learning Small Faces on Hard Images Based on a Deep Learning Approach. Sensors, 23.","DOI":"10.3390\/s23010502"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Safarov, F., Temurbek, K., Jamoljon, D., Temur, O., Chedjou, J.C., Abdusalomov, A.B., and Cho, Y.-I. (2022). Improved Agricultural Field Segmentation in Satellite Imagery Using TL-ResUNet Architecture. Sensors, 22.","DOI":"10.3390\/s22249784"},{"key":"ref_20","first-page":"1","article-title":"DDoS Attacks Detection in the Application Layer Using Three Level Machine Learning Classification Architecture","volume":"14","author":"Kanber","year":"2022","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"ref_21","first-page":"1375","article-title":"M-LSTM: Multi-class Long Short-Term Memory based approach for Detection of DDoS Attacks","volume":"71","author":"Gaur","year":"2022","journal-title":"Math. Stat. Eng. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"49794","DOI":"10.1109\/ACCESS.2022.3173319","article-title":"Detection and Characterization of DDoS Attacks Using Time-Based Features","volume":"10","author":"Halladay","year":"2022","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Mhawi, D.N., Aldallal, A., and Hassan, S. (2022). Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems. Symmetry, 14.","DOI":"10.3390\/sym14071461"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Rao, Y.N., and Babu, K.S. (2023). An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset. Sensors, 23.","DOI":"10.3390\/s23010550"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"146810","DOI":"10.1109\/ACCESS.2021.3123791","article-title":"Ae-mlp: A hybrid deep learning approach for ddos detection and classification","volume":"9","author":"Wei","year":"2021","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"5757164","DOI":"10.1155\/2022\/5757164","article-title":"Enhanced Security against Volumetric DDoS Attacks Using Adversarial Machine Learning","volume":"2022","author":"Shroff","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Abdusalomov, A.B., Nasimov, R., Nasimova, N., Muminov, B., and Whangbo, T.K. (2023). Evaluating Synthetic Medical Images Using Artificial Intelligence with the GAN Algorithm. Sensors, 23.","DOI":"10.3390\/s23073440"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s12530-020-09364-z","article-title":"Developing new deep-learning model to enhance network intrusion classification","volume":"13","author":"Azzaoui","year":"2022","journal-title":"Evol. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Shieh, C.S., Nguyen, T.T., Chen, C.Y., and Horng, M.F. (2022). Detection of Unknown DDoS Attack Using Reconstruct Error and One-Class SVM Featuring Stochastic Gradient Descent. Mathematics, 11.","DOI":"10.3390\/math11010108"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Alduailij, M., Khan, Q.W., Tahir, M., Sardaraz, M., Alduailij, M., and Malik, F. (2022). Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method. Symmetry, 14.","DOI":"10.3390\/sym14061095"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Almaraz-Rivera, J.G., Perez-Diaz, J.A., and Cantoral-Ceballos, J.A. (2022). Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models. Sensors, 22.","DOI":"10.3390\/s22093367"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., and Weinberger, K.Q. (2017, January 21\u201326). Densely connected convolutional networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Hemalatha, J., Roseline, S.A., Geetha, S., Kadry, S., and Dama\u0161evi\u010dius, R. (2021). An Efficient DenseNet-Based Deep Learning Model for Malware Detection. Entropy, 23.","DOI":"10.3390\/e23030344"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Saranya, P., Devi, S.K., and Bharanidharan, B. (2022, January 10\u201311). Detection of Diabetic Retinopathy in Retinal Fundus Images using DenseNet based Deep Learning Model. Proceedings of the 2022 International Mobile and Embedded Technology Conference (MECON), Noida, India.","DOI":"10.1109\/MECON53876.2022.9752065"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Nodirov, J., Abdusalomov, A.B., and Whangbo, T.K. (2022). Attention 3D U-Net with Multiple Skip Connections for Segmentation of Brain Tumor Images. Sensors, 22.","DOI":"10.3390\/s22176501"},{"key":"ref_36","first-page":"1","article-title":"DenseNet-201-based deep neural network with composite learning factor and precomputation for multiple sclerosis classification","volume":"16","author":"Wan","year":"2020","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"012139","DOI":"10.1088\/1742-6596\/1575\/1\/012139","article-title":"X-DenseNet: Deep Learning for Garbage Classification Based on Visual Images","volume":"1575","author":"Sha","year":"2020","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_38","unstructured":"Biondi, F., Buonocore, G., and Matthews, R. (2023, May 23). Generative Adversarial Networks from a Cyber Intelligence Perspective. Available online: https:\/\/api.semanticscholar.org\/CorpusID:237501625."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1186\/s40537-019-0197-0","article-title":"A survey on Image Data Augmentation for Deep Learning","volume":"6","author":"Shorten","year":"2019","journal-title":"J. Big Data"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Abdusalomov, A.B., Mukhiddinov, M., and Whangbo, T.K. (2023). Brain Tumor Detection Based on Deep Learning Approaches and Magnetic Resonance Imaging. Cancers, 15.","DOI":"10.3390\/cancers15164172"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Avazov, K., Jamil, M.K., Muminov, B., Abdusalomov, A.B., and Cho, Y.-I. (2023). Fire Detection and Notification Method in Ship Areas Using Deep Learning and Computer Vision Approaches. Sensors, 23.","DOI":"10.3390\/s23167078"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Khan, F., Tarimer, I., Alwageed, H.S., Karada\u011f, B.C., Fayaz, M., Abdusalomov, A.B., and Cho, Y.-I. (2022). Effect of Feature Selection on the Accuracy of Music Popularity Classification Using Machine Learning Algorithms. Electronics, 11.","DOI":"10.3390\/electronics11213518"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Jiang, C., Zhao, J., Ding, Y., and Li, G. (2023). Vis\u2013NIR Spectroscopy Combined with GAN Data Augmentation for Predicting Soil Nutrients in Degraded Alpine Meadows on the Qinghai\u2013Tibet Plateau. Sensors, 23.","DOI":"10.3390\/s23073686"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"22573","DOI":"10.1007\/s11042-021-11618-0","article-title":"A modified densenet approach with nearmiss for anomaly detection in industrial control systems","volume":"81","author":"Ayas","year":"2022","journal-title":"Multimedia Tools Appl."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Wafa, R., Khan, M.Q., Malik, F., Abdusalomov, A.B., Cho, Y.I., and Odarchenko, R. (2022). The Impact of Agile Methodology on Project Success, with a Moderating Role of Person\u2019s Job Fit in the IT Industry of Pakistan. Appl. Sci., 12.","DOI":"10.3390\/app122110698"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Abdusalomov, A.B., Islam, B.M.S., Nasimov, R., Mukhiddinov, M., and Whangbo, T.K. (2023). An Improved Forest Fire Detection Method Based on the Detectron2 Model and a Deep Learning Approach. Sensors, 23.","DOI":"10.3390\/s23031512"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Liu, R. (2023, January 24\u201326). Multivariate Network Intrusion Detection Methods Based on Machine Learning. Proceedings of the 2023 IEEE 2nd International Conference on Electrical Engineering, Big Data and Algorithms (EEBDA), Changchun, China.","DOI":"10.1109\/EEBDA56825.2023.10090554"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Ahsan, M., Rifat, N., Chowdhury, M., and Gomes, R. (2022, January 19\u201321). Intrusion Detection for IoT Network Security with Deep Neural Network. Proceedings of the 2022 IEEE International Conference on Electro Information Technology (eIT), Mankato, MN, USA.","DOI":"10.1109\/eIT53891.2022.9814006"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Abdusalomov, A., and Whangbo, T.K. (2019). Detection and Removal of Moving Object Shadows Using Geometry and Color Information for Indoor Video Streams. Appl. Sci., 9.","DOI":"10.3390\/app9235165"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., and Marchetti, M. (June, January 29). On the effectiveness of machine and deep learning for cyber security. Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.","DOI":"10.23919\/CYCON.2018.8405026"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Safarov, F., Kutlimuratov, A., Abdusalomov, A.B., Nasimov, R., and Cho, Y.-I. (2023). Deep Learning Recommendations of E-Education Based on Clustering and Sequence. Electronics, 12.","DOI":"10.3390\/electronics12040809"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Berman, D., Buczak, A., Chavis, J., and Corbett, C. (2019). A survey of deep learning methods for cyber security. Information, 10.","DOI":"10.3390\/info10040122"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A. (2018, January 22\u201324). Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the 4th International Conference on Information System and Security Privacy, Madeira, Portugal.","DOI":"10.5220\/0006639801080116"},{"key":"ref_55","first-page":"1","article-title":"The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 dataset and the comparison with the KDD99 dataset","volume":"25","author":"Moustafa","year":"2016","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Safarov, F., Akhmedov, F., Abdusalomov, A.B., Nasimov, R., and Cho, Y.I. (2023). Real-Time Deep Learning-Based Drowsiness Detection: Leveraging Computer-Vision and Eye-Blink Analyses for Enhanced Road Safety. Sensors, 23.","DOI":"10.3390\/s23146459"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Pascale, F., Adinolfi, E.A., Coppola, S., and Santonicola, E. (2021). Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles. Electronics, 10.","DOI":"10.3390\/electronics10151765"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Norkobil Saydirasulovich, S., Abdusalomov, A., Jamil, M.K., Nasimov, R., Kozhamzharova, D., and Cho, Y.-I. (2023). A YOLOv6-Based Improved Fire Detection Approach for Smart City Environments. Sensors, 23.","DOI":"10.3390\/s23063161"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Mamieva, D., Abdusalomov, A.B., Kutlimuratov, A., Muminov, B., and Whangbo, T.K. (2023). Multimodal Emotion Detection via Attention-Based Fusion of Extracted Facial and Speech Features. Sensors, 23.","DOI":"10.3390\/s23125475"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Abdusalomov, A.B., Safarov, F., Rakhimov, M., Turaev, B., and Whangbo, T.K. (2022). Improved Feature Parameter Extraction from Speech Signals Using Machine Learning Algorithm. Sensors, 22.","DOI":"10.3390\/s22218122"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Ashraf, E., Areed, N.F., Salem, H., Abdelhay, E.H., and Farouk, A. (2022). Fidchain: Federated intrusion detection system for blockchain-enabled iot healthcare applications. Healthcare, 10.","DOI":"10.3390\/healthcare10061110"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"6131463","DOI":"10.1155\/2022\/6131463","article-title":"Feature Selection Model Based on Gorilla Troops Optimizer for Intrusion Detection Systems","volume":"2022","author":"Ahmed","year":"2022","journal-title":"J. Sens."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., and Alazab, A. (2019). A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics, 8.","DOI":"10.3390\/electronics8111210"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"629","DOI":"10.3390\/jcp2030032","article-title":"MOCA: A Network Intrusion Monitoring and Classification System","volume":"2","author":"Fuhr","year":"2022","journal-title":"J. Cybersecur. Priv."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Han, H., Kim, H., and Kim, Y. (2022). An Efficient Hyperparameter Control Method for a Network Intrusion Detection System Based on Proximal Policy Optimization. Symmetry, 14.","DOI":"10.3390\/sym14010161"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Qazi, E.U.H., Almorjan, A., and Zia, T. (2022). A One-Dimensional Convolutional Neural Network (1D-CNN) Based Deep Learning System for Network Intrusion Detection. Appl. Sci., 12.","DOI":"10.3390\/app12167986"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"012018","DOI":"10.1088\/1742-6596\/1192\/1\/012018","article-title":"Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset","volume":"1192","author":"Yulianto","year":"2019","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"108156","DOI":"10.1016\/j.compeleceng.2022.108156","article-title":"Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system","volume":"102","author":"Ravi","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"19723","DOI":"10.1109\/ACCESS.2021.3054688","article-title":"Towards effective network intrusion detection: From concept to creation on Azure cloud","volume":"9","author":"Rajagopal","year":"2021","journal-title":"IEEE Access"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"153153","DOI":"10.1109\/ACCESS.2021.3127689","article-title":"Network Intrusion Detection Based on Extended RBF Neural Network with Offline Reinforcement Learning","volume":"9","author":"Arribas","year":"2021","journal-title":"IEEE Access"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Aziz, S., Faiz, M.T., Adeniyi, A.M., Loo, K.H., Hasan, K.N., Xu, L., and Irshad, M. (2022). Anomaly Detection in the Internet of Vehicular Networks Using Explainable Neural Networks (xNN). Mathematics, 10.","DOI":"10.3390\/math10081267"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"108495","DOI":"10.1109\/ACCESS.2021.3101650","article-title":"SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning","volume":"9","year":"2021","journal-title":"IEEE Access"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Abdusalomov, A., Baratov, N., Kutlimuratov, A., and Whangbo, T.K. (2021). An Improvement of the Fire Detection and Classification Method Using YOLOv3 for Surveillance Systems. Sensors, 21.","DOI":"10.3390\/s21196519"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Valikhujaev, Y., Abdusalomov, A., and Cho, Y.I. (2020). Automatic Fire and Smoke Detection Method for Surveillance Systems Based on Dilated CNNs. Atmosphere, 11.","DOI":"10.3390\/atmos11111241"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Abdusalomov, A.B., Mukhiddinov, M., Kutlimuratov, A., and Whangbo, T.K. (2022). Improved Real-Time Fire Warning System Based on Advanced Technologies for Visually Impaired People. Sensors, 22.","DOI":"10.3390\/s22197305"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Mukhiddinov, M., Abdusalomov, A.B., and Cho, J. (2022). Automatic Fire Detection and Notification System Based on Improved YOLOv4 for the Blind and Visually Impaired. Sensors, 22.","DOI":"10.3390\/s22093307"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Kutlimuratov, A., Abdusalomov, A., and Whangbo, T.K. (2020). Evolving Hierarchical and Tag Information via the Deeply Enhanced Weighted Non-Negative Matrix Factorization of Rating Predictions. Symmetry, 12.","DOI":"10.3390\/sym12111930"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/9\/297\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:44:46Z","timestamp":1760129086000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/9\/297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":77,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["fi15090297"],"URL":"https:\/\/doi.org\/10.3390\/fi15090297","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}