Intrusion Detection in Wireless Sensor Networks using Machine Learning Article Swipe
Hajar Fares
,
Amol D. Vibhute
,
Yassine Mouniane
,
Habiba Bouijij
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1016/j.procs.2025.01.052
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1016/j.procs.2025.01.052
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.procs.2025.01.052
- OA Status
- diamond
- Cited By
- 3
- References
- 17
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4407301920
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4407301920Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.procs.2025.01.052Digital Object Identifier
- Title
-
Intrusion Detection in Wireless Sensor Networks using Machine LearningWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-01Full publication date if available
- Authors
-
Hajar Fares, Amol D. Vibhute, Yassine Mouniane, Habiba BouijijList of authors in order
- Landing page
-
https://doi.org/10.1016/j.procs.2025.01.052Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.procs.2025.01.052Direct OA link when available
- Concepts
-
Computer science, Intrusion detection system, Wireless sensor network, Wireless, Intrusion, Computer network, Artificial intelligence, Real-time computing, Telecommunications, Geology, GeochemistryTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 3Per-year citation counts (last 5 years)
- References (count)
-
17Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4407301920 |
|---|---|
| doi | https://doi.org/10.1016/j.procs.2025.01.052 |
| ids.doi | https://doi.org/10.1016/j.procs.2025.01.052 |
| ids.openalex | https://openalex.org/W4407301920 |
| fwci | 15.49507221 |
| type | article |
| title | Intrusion Detection in Wireless Sensor Networks using Machine Learning |
| biblio.issue | |
| biblio.volume | 252 |
| biblio.last_page | 921 |
| biblio.first_page | 912 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9993000030517578 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11498 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9970999956130981 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Security in Wireless Sensor Networks |
| topics[2].id | https://openalex.org/T10080 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9914000034332275 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Energy Efficient Wireless Sensor Networks |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.9257533550262451 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C35525427 |
| concepts[1].level | 2 |
| concepts[1].score | 0.70074063539505 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[1].display_name | Intrusion detection system |
| concepts[2].id | https://openalex.org/C24590314 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6305940747261047 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q336038 |
| concepts[2].display_name | Wireless sensor network |
| concepts[3].id | https://openalex.org/C555944384 |
| concepts[3].level | 2 |
| concepts[3].score | 0.47405359148979187 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[3].display_name | Wireless |
| concepts[4].id | https://openalex.org/C158251709 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4458085000514984 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q354025 |
| concepts[4].display_name | Intrusion |
| concepts[5].id | https://openalex.org/C31258907 |
| concepts[5].level | 1 |
| concepts[5].score | 0.38308942317962646 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[5].display_name | Computer network |
| concepts[6].id | https://openalex.org/C154945302 |
| concepts[6].level | 1 |
| concepts[6].score | 0.34686899185180664 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[6].display_name | Artificial intelligence |
| concepts[7].id | https://openalex.org/C79403827 |
| concepts[7].level | 1 |
| concepts[7].score | 0.33513152599334717 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[7].display_name | Real-time computing |
| concepts[8].id | https://openalex.org/C76155785 |
| concepts[8].level | 1 |
| concepts[8].score | 0.2503657937049866 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[8].display_name | Telecommunications |
| concepts[9].id | https://openalex.org/C127313418 |
| concepts[9].level | 0 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1069 |
| concepts[9].display_name | Geology |
| concepts[10].id | https://openalex.org/C17409809 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q161764 |
| concepts[10].display_name | Geochemistry |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.9257533550262451 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[1].score | 0.70074063539505 |
| keywords[1].display_name | Intrusion detection system |
| keywords[2].id | https://openalex.org/keywords/wireless-sensor-network |
| keywords[2].score | 0.6305940747261047 |
| keywords[2].display_name | Wireless sensor network |
| keywords[3].id | https://openalex.org/keywords/wireless |
| keywords[3].score | 0.47405359148979187 |
| keywords[3].display_name | Wireless |
| keywords[4].id | https://openalex.org/keywords/intrusion |
| keywords[4].score | 0.4458085000514984 |
| keywords[4].display_name | Intrusion |
| keywords[5].id | https://openalex.org/keywords/computer-network |
| keywords[5].score | 0.38308942317962646 |
| keywords[5].display_name | Computer network |
| keywords[6].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[6].score | 0.34686899185180664 |
| keywords[6].display_name | Artificial intelligence |
| keywords[7].id | https://openalex.org/keywords/real-time-computing |
| keywords[7].score | 0.33513152599334717 |
| keywords[7].display_name | Real-time computing |
| keywords[8].id | https://openalex.org/keywords/telecommunications |
| keywords[8].score | 0.2503657937049866 |
| keywords[8].display_name | Telecommunications |
| language | en |
| locations[0].id | doi:10.1016/j.procs.2025.01.052 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120348307 |
| locations[0].source.issn | 1877-0509 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1877-0509 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Procedia Computer Science |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Procedia Computer Science |
| locations[0].landing_page_url | https://doi.org/10.1016/j.procs.2025.01.052 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5114544225 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Hajar Fares |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Hajar Fares |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5009181701 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3605-7450 |
| authorships[1].author.display_name | Amol D. Vibhute |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Amol D. Vibhute |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5093776743 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6037-5301 |
| authorships[2].author.display_name | Yassine Mouniane |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Yassine Mouniane |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5069655261 |
| authorships[3].author.orcid | https://orcid.org/0009-0001-9248-0800 |
| authorships[3].author.display_name | Habiba Bouijij |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Habiba Bouijij |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.procs.2025.01.052 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Intrusion Detection in Wireless Sensor Networks using Machine Learning |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9993000030517578 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2357468538, https://openalex.org/W1577110157, https://openalex.org/W2355007334, https://openalex.org/W2906422846, https://openalex.org/W2390009783, https://openalex.org/W4254602698, https://openalex.org/W2394461323, https://openalex.org/W2349441905, https://openalex.org/W2361044160, https://openalex.org/W2133389611 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 3 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.procs.2025.01.052 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120348307 |
| best_oa_location.source.issn | 1877-0509 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1877-0509 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Procedia Computer Science |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Procedia Computer Science |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.procs.2025.01.052 |
| primary_location.id | doi:10.1016/j.procs.2025.01.052 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120348307 |
| primary_location.source.issn | 1877-0509 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1877-0509 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Procedia Computer Science |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Procedia Computer Science |
| primary_location.landing_page_url | https://doi.org/10.1016/j.procs.2025.01.052 |
| publication_date | 2025-01-01 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3156936850, https://openalex.org/W2025604985, https://openalex.org/W4383113368, https://openalex.org/W185358023, https://openalex.org/W2885363694, https://openalex.org/W4308194848, https://openalex.org/W4225256108, https://openalex.org/W3156239863, https://openalex.org/W3093884144, https://openalex.org/W6727813929, https://openalex.org/W3181277865, https://openalex.org/W3013013793, https://openalex.org/W4394565348, https://openalex.org/W3133543405, https://openalex.org/W4392974795, https://openalex.org/W3182114900, https://openalex.org/W2525336835 |
| referenced_works_count | 17 |
| abstract_inverted_index | |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 96 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.96299548 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |