Deep Learning-Based Fog-Cloud Approach Intrusion Detection System in IoMT Article Swipe
Yahya Rbah
,
Mohammed Mahfoudi
,
Mohammed Fattah
,
Younes Balboul
,
Said Mazer
,
Moulhime Elbekkali
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.52866/2788-7421.1336
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.52866/2788-7421.1336
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.52866/2788-7421.1336
- OA Status
- diamond
- OpenAlex ID
- https://openalex.org/W7115059917
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7115059917Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.52866/2788-7421.1336Digital Object Identifier
- Title
-
Deep Learning-Based Fog-Cloud Approach Intrusion Detection System in IoMTWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-12-09Full publication date if available
- Authors
-
Yahya Rbah, Mohammed Mahfoudi, Mohammed Fattah, Younes Balboul, Said Mazer, Moulhime ElbekkaliList of authors in order
- Landing page
-
https://doi.org/10.52866/2788-7421.1336Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.52866/2788-7421.1336Direct OA link when available
- Concepts
-
Computer science, Intrusion detection system, Artificial intelligence, Noise (video), The Internet, Data mining, Key (lock), Identification (biology), Intrusion prevention system, Anomaly-based intrusion detection system, Artificial neural network, Real-time computingTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W7115059917 |
|---|---|
| doi | https://doi.org/10.52866/2788-7421.1336 |
| ids.doi | https://doi.org/10.52866/2788-7421.1336 |
| ids.openalex | https://openalex.org/W7115059917 |
| fwci | 0.0 |
| type | article |
| title | Deep Learning-Based Fog-Cloud Approach Intrusion Detection System in IoMT |
| biblio.issue | 4 |
| biblio.volume | 6 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.22738146781921387 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T13918 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.10796597599983215 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Advanced Data and IoT Technologies |
| topics[2].id | https://openalex.org/T13038 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.0849764496088028 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Internet of Things and AI |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.5610668659210205 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C35525427 |
| concepts[1].level | 2 |
| concepts[1].score | 0.48858752846717834 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[1].display_name | Intrusion detection system |
| concepts[2].id | https://openalex.org/C154945302 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3464444577693939 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[2].display_name | Artificial intelligence |
| concepts[3].id | https://openalex.org/C99498987 |
| concepts[3].level | 3 |
| concepts[3].score | 0.2909325063228607 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2210247 |
| concepts[3].display_name | Noise (video) |
| concepts[4].id | https://openalex.org/C110875604 |
| concepts[4].level | 2 |
| concepts[4].score | 0.2771168351173401 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[4].display_name | The Internet |
| concepts[5].id | https://openalex.org/C124101348 |
| concepts[5].level | 1 |
| concepts[5].score | 0.26887860894203186 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[5].display_name | Data mining |
| concepts[6].id | https://openalex.org/C26517878 |
| concepts[6].level | 2 |
| concepts[6].score | 0.2624657452106476 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[6].display_name | Key (lock) |
| concepts[7].id | https://openalex.org/C116834253 |
| concepts[7].level | 2 |
| concepts[7].score | 0.2571263313293457 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q2039217 |
| concepts[7].display_name | Identification (biology) |
| concepts[8].id | https://openalex.org/C27061796 |
| concepts[8].level | 3 |
| concepts[8].score | 0.2558942437171936 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[8].display_name | Intrusion prevention system |
| concepts[9].id | https://openalex.org/C137524506 |
| concepts[9].level | 3 |
| concepts[9].score | 0.25534987449645996 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q2247688 |
| concepts[9].display_name | Anomaly-based intrusion detection system |
| concepts[10].id | https://openalex.org/C50644808 |
| concepts[10].level | 2 |
| concepts[10].score | 0.2544981837272644 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q192776 |
| concepts[10].display_name | Artificial neural network |
| concepts[11].id | https://openalex.org/C79403827 |
| concepts[11].level | 1 |
| concepts[11].score | 0.25212806463241577 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[11].display_name | Real-time computing |
| keywords[0].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[0].score | 0.48858752846717834 |
| keywords[0].display_name | Intrusion detection system |
| keywords[1].id | https://openalex.org/keywords/noise |
| keywords[1].score | 0.2909325063228607 |
| keywords[1].display_name | Noise (video) |
| keywords[2].id | https://openalex.org/keywords/the-internet |
| keywords[2].score | 0.2771168351173401 |
| keywords[2].display_name | The Internet |
| keywords[3].id | https://openalex.org/keywords/key |
| keywords[3].score | 0.2624657452106476 |
| keywords[3].display_name | Key (lock) |
| keywords[4].id | https://openalex.org/keywords/identification |
| keywords[4].score | 0.2571263313293457 |
| keywords[4].display_name | Identification (biology) |
| language | en |
| locations[0].id | doi:10.52866/2788-7421.1336 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210240835 |
| locations[0].source.issn | 2788-7421, 2958-0544 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2788-7421 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Iraqi Journal for Computer Science and Mathematics |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Iraqi Journal for Computer Science and Mathematics |
| locations[0].landing_page_url | https://doi.org/10.52866/2788-7421.1336 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Yahya Rbah |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Yahya Rbah |
| authorships[0].is_corresponding | True |
| authorships[1].author.id | |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Mohammed Mahfoudi |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Mohammed Mahfoudi |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Mohammed Fattah |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Mohammed Fattah |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Younes Balboul |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Younes Balboul |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Said Mazer |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Said Mazer |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Moulhime Elbekkali |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Moulhime Elbekkali |
| authorships[5].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.52866/2788-7421.1336 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-12-14T00:00:00 |
| display_name | Deep Learning-Based Fog-Cloud Approach Intrusion Detection System in IoMT |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-12-14T23:14:51.672866 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.22738146781921387 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.52866/2788-7421.1336 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210240835 |
| best_oa_location.source.issn | 2788-7421, 2958-0544 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2788-7421 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Iraqi Journal for Computer Science and Mathematics |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Iraqi Journal for Computer Science and Mathematics |
| best_oa_location.landing_page_url | https://doi.org/10.52866/2788-7421.1336 |
| primary_location.id | doi:10.52866/2788-7421.1336 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210240835 |
| primary_location.source.issn | 2788-7421, 2958-0544 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2788-7421 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Iraqi Journal for Computer Science and Mathematics |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Iraqi Journal for Computer Science and Mathematics |
| primary_location.landing_page_url | https://doi.org/10.52866/2788-7421.1336 |
| publication_date | 2025-12-09 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index | |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.8353389 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |