A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.1155/2023/8981988
The Internet of Things (IoT) is a distributed system which is made up of the connections of smart objects (things) that can continuously sense the events in their sensing domain and transmit the data via the Internet. IoT is considered as the next revolution of the Internet since it has provided vast improvements in day‐to‐day activities of humans including the provision of efficient healthcare services and development of smart cities and intelligent transport systems. The IoT environment, by the application of suitable security mechanisms through efficient security management techniques, intrusion detection systems provide a wall of defence against the attacks on the Internet and on the devices connected with Internet by effective monitoring of the Internet traffic. Therefore, the intrusion detection system (IDS) is a resolution proposed by the researchers to monitor and secure the IoT communication. In this work, a meticulous analysis of the security of IoT networks based on quality‐of‐service metrics is performed for deploying intrusion detection systems by carrying out experiments on secured communication and measuring the network’s performance based on comparing them with the existing security metrics. Finally, we propose a new and effective IDS using a deep learning‐based classification approach, namely, fuzzy CNN, for improving the security of communication. The major and foremost advantages of this system include an upsurge in detection accuracy, the accurate detection of denial of service (DoS) attacks more efficiently, and the reduction of false positive rates.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1155/2023/8981988
- https://downloads.hindawi.com/journals/cin/2023/8981988.pdf
- OA Status
- hybrid
- Cited By
- 110
- References
- 134
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4318261440
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4318261440Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1155/2023/8981988Digital Object Identifier
- Title
-
A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of ThingsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-01-01Full publication date if available
- Authors
-
S. V. N. Santhosh Kumar, M. Selvi, A. KannanList of authors in order
- Landing page
-
https://doi.org/10.1155/2023/8981988Publisher landing page
- PDF URL
-
https://downloads.hindawi.com/journals/cin/2023/8981988.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://downloads.hindawi.com/journals/cin/2023/8981988.pdfDirect OA link when available
- Concepts
-
Computer science, Intrusion detection system, Denial-of-service attack, Computer security, The Internet, Internet of Things, Computer network, World Wide WebTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
110Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 45, 2024: 41, 2023: 24Per-year citation counts (last 5 years)
- References (count)
-
134Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4318261440 |
|---|---|
| doi | https://doi.org/10.1155/2023/8981988 |
| ids.doi | https://doi.org/10.1155/2023/8981988 |
| ids.openalex | https://openalex.org/W4318261440 |
| fwci | 48.35075211 |
| type | article |
| title | A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things |
| biblio.issue | 1 |
| biblio.volume | 2023 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9994000196456909 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T10917 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9987000226974487 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2207 |
| topics[2].subfield.display_name | Control and Systems Engineering |
| topics[2].display_name | Smart Grid Security and Resilience |
| funders[0].id | https://openalex.org/F4320319346 |
| funders[0].ror | |
| funders[0].display_name | Vellore Institute of Technology, Chennai |
| is_xpac | False |
| apc_list.value | 2100 |
| apc_list.currency | USD |
| apc_list.value_usd | 2100 |
| apc_paid.value | 2100 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2100 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8456372022628784 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C35525427 |
| concepts[1].level | 2 |
| concepts[1].score | 0.81059730052948 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[1].display_name | Intrusion detection system |
| concepts[2].id | https://openalex.org/C38822068 |
| concepts[2].level | 3 |
| concepts[2].score | 0.719424843788147 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[2].display_name | Denial-of-service attack |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.6097418069839478 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C110875604 |
| concepts[4].level | 2 |
| concepts[4].score | 0.601861834526062 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[4].display_name | The Internet |
| concepts[5].id | https://openalex.org/C81860439 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4471842050552368 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[5].display_name | Internet of Things |
| concepts[6].id | https://openalex.org/C31258907 |
| concepts[6].level | 1 |
| concepts[6].score | 0.34778475761413574 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[6].display_name | Computer network |
| concepts[7].id | https://openalex.org/C136764020 |
| concepts[7].level | 1 |
| concepts[7].score | 0.16365653276443481 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[7].display_name | World Wide Web |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8456372022628784 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[1].score | 0.81059730052948 |
| keywords[1].display_name | Intrusion detection system |
| keywords[2].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[2].score | 0.719424843788147 |
| keywords[2].display_name | Denial-of-service attack |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.6097418069839478 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/the-internet |
| keywords[4].score | 0.601861834526062 |
| keywords[4].display_name | The Internet |
| keywords[5].id | https://openalex.org/keywords/internet-of-things |
| keywords[5].score | 0.4471842050552368 |
| keywords[5].display_name | Internet of Things |
| keywords[6].id | https://openalex.org/keywords/computer-network |
| keywords[6].score | 0.34778475761413574 |
| keywords[6].display_name | Computer network |
| keywords[7].id | https://openalex.org/keywords/world-wide-web |
| keywords[7].score | 0.16365653276443481 |
| keywords[7].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.1155/2023/8981988 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S72372694 |
| locations[0].source.issn | 1687-5265, 1687-5273 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1687-5265 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Computational Intelligence and Neuroscience |
| locations[0].source.host_organization | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_name | Hindawi Publishing Corporation |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_lineage_names | Hindawi Publishing Corporation |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://downloads.hindawi.com/journals/cin/2023/8981988.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Computational Intelligence and Neuroscience |
| locations[0].landing_page_url | https://doi.org/10.1155/2023/8981988 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5090303016 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | S. V. N. Santhosh Kumar |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I876193797 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Information Technology and Engineering, Vellore Institute of Technology, Vellore |
| authorships[0].institutions[0].id | https://openalex.org/I876193797 |
| authorships[0].institutions[0].ror | https://ror.org/00qzypv28 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I876193797 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Vellore Institute of Technology University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | S. V. N. Santhosh Kumar |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | School of Information Technology and Engineering, Vellore Institute of Technology, Vellore |
| authorships[1].author.id | https://openalex.org/A5008316069 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | M. Selvi |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I876193797 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Vellore Institute of Technology, Vellore |
| authorships[1].institutions[0].id | https://openalex.org/I876193797 |
| authorships[1].institutions[0].ror | https://ror.org/00qzypv28 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I876193797 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Vellore Institute of Technology University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | M. Selvi |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Computer Science and Engineering, Vellore Institute of Technology, Vellore |
| authorships[2].author.id | https://openalex.org/A5017525339 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-3564-395X |
| authorships[2].author.display_name | A. Kannan |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I876193797 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Vellore Institute of Technology, Vellore |
| authorships[2].institutions[0].id | https://openalex.org/I876193797 |
| authorships[2].institutions[0].ror | https://ror.org/00qzypv28 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I876193797 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Vellore Institute of Technology University |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | A. Kannan |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Computer Science and Engineering, Vellore Institute of Technology, Vellore |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://downloads.hindawi.com/journals/cin/2023/8981988.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W4386482731, https://openalex.org/W4385302085, https://openalex.org/W2360429410, https://openalex.org/W2765763546, https://openalex.org/W4256682929, https://openalex.org/W335511927, https://openalex.org/W4239662759, https://openalex.org/W2471811227, https://openalex.org/W2217591390, https://openalex.org/W4390188535 |
| cited_by_count | 110 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 45 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 41 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 24 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1155/2023/8981988 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S72372694 |
| best_oa_location.source.issn | 1687-5265, 1687-5273 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1687-5265 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Computational Intelligence and Neuroscience |
| best_oa_location.source.host_organization | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_name | Hindawi Publishing Corporation |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://downloads.hindawi.com/journals/cin/2023/8981988.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Computational Intelligence and Neuroscience |
| best_oa_location.landing_page_url | https://doi.org/10.1155/2023/8981988 |
| primary_location.id | doi:10.1155/2023/8981988 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S72372694 |
| primary_location.source.issn | 1687-5265, 1687-5273 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1687-5265 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Computational Intelligence and Neuroscience |
| primary_location.source.host_organization | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_name | Hindawi Publishing Corporation |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://downloads.hindawi.com/journals/cin/2023/8981988.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Computational Intelligence and Neuroscience |
| primary_location.landing_page_url | https://doi.org/10.1155/2023/8981988 |
| publication_date | 2023-01-01 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2134295053, https://openalex.org/W2049295941, https://openalex.org/W2892466769, https://openalex.org/W2999472659, https://openalex.org/W2986455874, https://openalex.org/W2964936987, https://openalex.org/W2897514040, https://openalex.org/W2735927200, https://openalex.org/W2153343068, https://openalex.org/W1971673042, https://openalex.org/W2902494805, https://openalex.org/W2972267592, https://openalex.org/W3004595536, https://openalex.org/W2911505293, https://openalex.org/W2010521478, https://openalex.org/W3003685271, https://openalex.org/W2955014922, https://openalex.org/W2787322429, https://openalex.org/W2370696599, https://openalex.org/W1989359075, https://openalex.org/W2009250942, https://openalex.org/W2995701838, https://openalex.org/W2912292549, https://openalex.org/W3168071334, https://openalex.org/W1974045454, https://openalex.org/W2978385372, https://openalex.org/W2165491783, https://openalex.org/W2166239271, https://openalex.org/W2737151581, https://openalex.org/W4250504954, https://openalex.org/W2280017167, https://openalex.org/W1569819710, https://openalex.org/W3019432121, https://openalex.org/W2023261822, https://openalex.org/W2541307573, https://openalex.org/W2901384345, https://openalex.org/W3104224871, https://openalex.org/W2294018787, https://openalex.org/W2038651258, https://openalex.org/W2794786524, https://openalex.org/W2408042555, https://openalex.org/W2099940443, https://openalex.org/W2031163547, https://openalex.org/W3213644780, https://openalex.org/W2787928652, https://openalex.org/W2601474892, https://openalex.org/W2789828921, https://openalex.org/W6684632368, https://openalex.org/W2008224380, https://openalex.org/W2002900768, https://openalex.org/W2955045650, https://openalex.org/W4226265737, https://openalex.org/W4309969722, https://openalex.org/W1976679620, https://openalex.org/W2547548340, https://openalex.org/W4285492508, https://openalex.org/W4306827119, https://openalex.org/W3211144245, https://openalex.org/W2009556857, https://openalex.org/W4214820266, https://openalex.org/W4281903041, https://openalex.org/W3214148834, https://openalex.org/W4308422437, https://openalex.org/W4220697949, https://openalex.org/W2590373591, https://openalex.org/W2600058599, https://openalex.org/W2793723077, https://openalex.org/W2122053769, https://openalex.org/W2153187021, https://openalex.org/W2089364633, https://openalex.org/W1972893535, https://openalex.org/W319604946, https://openalex.org/W2034265047, https://openalex.org/W23702203, https://openalex.org/W2944561732, https://openalex.org/W2523827785, https://openalex.org/W3020135647, https://openalex.org/W2768152971, https://openalex.org/W2606537796, https://openalex.org/W2110106247, https://openalex.org/W2342992012, https://openalex.org/W2150847526, https://openalex.org/W2613741294, https://openalex.org/W2793056648, https://openalex.org/W2945884086, https://openalex.org/W2141254179, https://openalex.org/W2162275200, https://openalex.org/W2534241252, https://openalex.org/W2084858364, https://openalex.org/W1991060442, https://openalex.org/W2059078529, https://openalex.org/W2139421948, https://openalex.org/W1910150533, https://openalex.org/W1489146973, https://openalex.org/W2911666054, https://openalex.org/W2534270843, https://openalex.org/W2468401905, https://openalex.org/W2498409191, https://openalex.org/W2291639412, https://openalex.org/W2083765161, https://openalex.org/W2517975492, https://openalex.org/W2098322148, https://openalex.org/W2086540457, https://openalex.org/W2107867209, https://openalex.org/W2503670963, https://openalex.org/W2948111015, https://openalex.org/W2049421380, https://openalex.org/W2023307683, https://openalex.org/W2198840333, https://openalex.org/W2320597598, https://openalex.org/W2520311392, https://openalex.org/W2611338987, https://openalex.org/W1989143043, https://openalex.org/W2805382685, https://openalex.org/W2025743285, https://openalex.org/W1976262362, https://openalex.org/W2023512790, https://openalex.org/W2498302240, https://openalex.org/W2597885677, https://openalex.org/W2736183220, https://openalex.org/W2611569060, https://openalex.org/W2049559208, https://openalex.org/W1976661382, https://openalex.org/W2120261899, https://openalex.org/W2921453769, https://openalex.org/W2925211503, https://openalex.org/W2156612354, https://openalex.org/W2999733746, https://openalex.org/W2804368608, https://openalex.org/W2125215881, https://openalex.org/W2889165715, https://openalex.org/W2783741806, https://openalex.org/W4253180268, https://openalex.org/W2166353797 |
| referenced_works_count | 134 |
| abstract_inverted_index.a | 6, 93, 124, 140, 184, 190 |
| abstract_inverted_index.In | 137 |
| abstract_inverted_index.an | 213 |
| abstract_inverted_index.as | 40 |
| abstract_inverted_index.by | 77, 110, 127, 160 |
| abstract_inverted_index.in | 26, 53, 215 |
| abstract_inverted_index.is | 5, 10, 38, 123, 153 |
| abstract_inverted_index.it | 48 |
| abstract_inverted_index.of | 2, 13, 16, 44, 56, 61, 67, 80, 95, 113, 143, 146, 202, 209, 221, 223, 232 |
| abstract_inverted_index.on | 100, 104, 150, 164, 173 |
| abstract_inverted_index.to | 130 |
| abstract_inverted_index.up | 12 |
| abstract_inverted_index.we | 182 |
| abstract_inverted_index.IDS | 188 |
| abstract_inverted_index.IoT | 37, 75, 135, 147 |
| abstract_inverted_index.The | 0, 74, 204 |
| abstract_inverted_index.and | 30, 65, 70, 103, 132, 167, 186, 206, 229 |
| abstract_inverted_index.can | 21 |
| abstract_inverted_index.for | 155, 198 |
| abstract_inverted_index.has | 49 |
| abstract_inverted_index.new | 185 |
| abstract_inverted_index.out | 162 |
| abstract_inverted_index.the | 14, 24, 32, 35, 41, 45, 59, 78, 98, 101, 105, 114, 118, 128, 134, 144, 169, 177, 200, 218, 230 |
| abstract_inverted_index.via | 34 |
| abstract_inverted_index.CNN, | 197 |
| abstract_inverted_index.data | 33 |
| abstract_inverted_index.deep | 191 |
| abstract_inverted_index.made | 11 |
| abstract_inverted_index.more | 227 |
| abstract_inverted_index.next | 42 |
| abstract_inverted_index.that | 20 |
| abstract_inverted_index.them | 175 |
| abstract_inverted_index.this | 138, 210 |
| abstract_inverted_index.vast | 51 |
| abstract_inverted_index.wall | 94 |
| abstract_inverted_index.with | 108, 176 |
| abstract_inverted_index.(DoS) | 225 |
| abstract_inverted_index.(IDS) | 122 |
| abstract_inverted_index.(IoT) | 4 |
| abstract_inverted_index.based | 149, 172 |
| abstract_inverted_index.false | 233 |
| abstract_inverted_index.fuzzy | 196 |
| abstract_inverted_index.major | 205 |
| abstract_inverted_index.sense | 23 |
| abstract_inverted_index.since | 47 |
| abstract_inverted_index.smart | 17, 68 |
| abstract_inverted_index.their | 27 |
| abstract_inverted_index.using | 189 |
| abstract_inverted_index.which | 9 |
| abstract_inverted_index.work, | 139 |
| abstract_inverted_index.Things | 3 |
| abstract_inverted_index.cities | 69 |
| abstract_inverted_index.denial | 222 |
| abstract_inverted_index.domain | 29 |
| abstract_inverted_index.events | 25 |
| abstract_inverted_index.humans | 57 |
| abstract_inverted_index.rates. | 235 |
| abstract_inverted_index.secure | 133 |
| abstract_inverted_index.system | 8, 121, 211 |
| abstract_inverted_index.against | 97 |
| abstract_inverted_index.attacks | 99, 226 |
| abstract_inverted_index.defence | 96 |
| abstract_inverted_index.devices | 106 |
| abstract_inverted_index.include | 212 |
| abstract_inverted_index.metrics | 152 |
| abstract_inverted_index.monitor | 131 |
| abstract_inverted_index.namely, | 195 |
| abstract_inverted_index.objects | 18 |
| abstract_inverted_index.propose | 183 |
| abstract_inverted_index.provide | 92 |
| abstract_inverted_index.secured | 165 |
| abstract_inverted_index.sensing | 28 |
| abstract_inverted_index.service | 224 |
| abstract_inverted_index.systems | 91, 159 |
| abstract_inverted_index.through | 84 |
| abstract_inverted_index.upsurge | 214 |
| abstract_inverted_index.(things) | 19 |
| abstract_inverted_index.Finally, | 181 |
| abstract_inverted_index.Internet | 1, 46, 102, 109, 115 |
| abstract_inverted_index.accurate | 219 |
| abstract_inverted_index.analysis | 142 |
| abstract_inverted_index.carrying | 161 |
| abstract_inverted_index.existing | 178 |
| abstract_inverted_index.foremost | 207 |
| abstract_inverted_index.metrics. | 180 |
| abstract_inverted_index.networks | 148 |
| abstract_inverted_index.positive | 234 |
| abstract_inverted_index.proposed | 126 |
| abstract_inverted_index.provided | 50 |
| abstract_inverted_index.security | 82, 86, 145, 179, 201 |
| abstract_inverted_index.services | 64 |
| abstract_inverted_index.suitable | 81 |
| abstract_inverted_index.systems. | 73 |
| abstract_inverted_index.traffic. | 116 |
| abstract_inverted_index.transmit | 31 |
| abstract_inverted_index.Internet. | 36 |
| abstract_inverted_index.accuracy, | 217 |
| abstract_inverted_index.approach, | 194 |
| abstract_inverted_index.comparing | 174 |
| abstract_inverted_index.connected | 107 |
| abstract_inverted_index.deploying | 156 |
| abstract_inverted_index.detection | 90, 120, 158, 216, 220 |
| abstract_inverted_index.effective | 111, 187 |
| abstract_inverted_index.efficient | 62, 85 |
| abstract_inverted_index.improving | 199 |
| abstract_inverted_index.including | 58 |
| abstract_inverted_index.intrusion | 89, 119, 157 |
| abstract_inverted_index.measuring | 168 |
| abstract_inverted_index.performed | 154 |
| abstract_inverted_index.provision | 60 |
| abstract_inverted_index.reduction | 231 |
| abstract_inverted_index.transport | 72 |
| abstract_inverted_index.Therefore, | 117 |
| abstract_inverted_index.activities | 55 |
| abstract_inverted_index.advantages | 208 |
| abstract_inverted_index.considered | 39 |
| abstract_inverted_index.healthcare | 63 |
| abstract_inverted_index.management | 87 |
| abstract_inverted_index.mechanisms | 83 |
| abstract_inverted_index.meticulous | 141 |
| abstract_inverted_index.monitoring | 112 |
| abstract_inverted_index.resolution | 125 |
| abstract_inverted_index.revolution | 43 |
| abstract_inverted_index.application | 79 |
| abstract_inverted_index.connections | 15 |
| abstract_inverted_index.development | 66 |
| abstract_inverted_index.distributed | 7 |
| abstract_inverted_index.experiments | 163 |
| abstract_inverted_index.intelligent | 71 |
| abstract_inverted_index.network’s | 170 |
| abstract_inverted_index.performance | 171 |
| abstract_inverted_index.researchers | 129 |
| abstract_inverted_index.techniques, | 88 |
| abstract_inverted_index.continuously | 22 |
| abstract_inverted_index.efficiently, | 228 |
| abstract_inverted_index.environment, | 76 |
| abstract_inverted_index.improvements | 52 |
| abstract_inverted_index.communication | 166 |
| abstract_inverted_index.classification | 193 |
| abstract_inverted_index.communication. | 136, 203 |
| abstract_inverted_index.day‐to‐day | 54 |
| abstract_inverted_index.learning‐based | 192 |
| abstract_inverted_index.quality‐of‐service | 151 |
| cited_by_percentile_year.max | 100 |
| cited_by_percentile_year.min | 99 |
| corresponding_author_ids | https://openalex.org/A5090303016 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| corresponding_institution_ids | https://openalex.org/I876193797 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/11 |
| sustainable_development_goals[0].score | 0.41999998688697815 |
| sustainable_development_goals[0].display_name | Sustainable cities and communities |
| citation_normalized_percentile.value | 0.99821168 |
| citation_normalized_percentile.is_in_top_1_percent | True |
| citation_normalized_percentile.is_in_top_10_percent | True |