Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1155/2022/4477507
An IoT system is a smart network that connects all items to the Internet and exchanges data using Internet Engineering Task Force established protocols. As a consequence, everything is instantly accessible from any place and at any time. The Internet of Things (IoT) network is built on the backbone of tiny sensors embedded in common objects. There is no need for human intervention in the interactions of IoT devices. The Internet of Things (IoT) security risk cannot be ignored. Untrusted networks, such as the Internet, are utilized to provide remote access to IoT devices. As a result, IoT systems are susceptible to a broad range of harmful activities, including cyberattacks. If security problems are not addressed, critical information may be hacked at any time. This article describes a feature selection and machine learning-based paradigm for improving security in the Internet of Things. Because network data are inherently abundant, it must be reduced in size before processing. Dimension reduction is the process of constructing a subset of an original data collection that removes superfluous content from the essential data set. Dimension reduction is a data mining approach. To minimize the number of dimensions in a dataset, linear discriminant analysis (LDA) is used. Following that, the data set with fewer dimensions is put into machine learning predictors as a training set. The effectiveness of machine learning approaches has been assessed using a range of criteria.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1155/2022/4477507
- https://downloads.hindawi.com/journals/scn/2022/4477507.pdf
- OA Status
- hybrid
- Cited By
- 31
- References
- 25
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4280625219
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4280625219Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1155/2022/4477507Digital Object Identifier
- Title
-
Towards Development of Machine Learning Framework for Enhancing Security in Internet of ThingsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-05-17Full publication date if available
- Authors
-
Mutyalaiah Paricherla, Babu Sallagundla, Khongdet Phasinam, Harikumar Pallathadka, Abu Sarwar Zamani, Vipul Narayan, Surendra Kumar Shukla, Hussien Sobahi MohammedList of authors in order
- Landing page
-
https://doi.org/10.1155/2022/4477507Publisher landing page
- PDF URL
-
https://downloads.hindawi.com/journals/scn/2022/4477507.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://downloads.hindawi.com/journals/scn/2022/4477507.pdfDirect OA link when available
- Concepts
-
Computer science, The Internet, Linear discriminant analysis, Internet of Things, Dimension (graph theory), Artificial intelligence, Machine learning, Set (abstract data type), Computer security, Dimensionality reduction, Web of Things, World Wide Web, Pure mathematics, Programming language, MathematicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
31Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 12, 2024: 7, 2023: 11, 2022: 1Per-year citation counts (last 5 years)
- References (count)
-
25Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4280625219 |
|---|---|
| doi | https://doi.org/10.1155/2022/4477507 |
| ids.doi | https://doi.org/10.1155/2022/4477507 |
| ids.openalex | https://openalex.org/W4280625219 |
| fwci | 6.64149409 |
| type | article |
| title | Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things |
| biblio.issue | |
| biblio.volume | 2022 |
| biblio.last_page | 5 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10273 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9991999864578247 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | IoT and Edge/Fog Computing |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9983000159263611 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.994700014591217 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list.value | 2100 |
| apc_list.currency | USD |
| apc_list.value_usd | 2100 |
| apc_paid.value | 2100 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2100 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8791248798370361 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C110875604 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5937833786010742 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[1].display_name | The Internet |
| concepts[2].id | https://openalex.org/C69738355 |
| concepts[2].level | 2 |
| concepts[2].score | 0.530371904373169 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1228929 |
| concepts[2].display_name | Linear discriminant analysis |
| concepts[3].id | https://openalex.org/C81860439 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5228734016418457 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[3].display_name | Internet of Things |
| concepts[4].id | https://openalex.org/C33676613 |
| concepts[4].level | 2 |
| concepts[4].score | 0.502568244934082 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q13415176 |
| concepts[4].display_name | Dimension (graph theory) |
| concepts[5].id | https://openalex.org/C154945302 |
| concepts[5].level | 1 |
| concepts[5].score | 0.4963529706001282 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[5].display_name | Artificial intelligence |
| concepts[6].id | https://openalex.org/C119857082 |
| concepts[6].level | 1 |
| concepts[6].score | 0.475528746843338 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[6].display_name | Machine learning |
| concepts[7].id | https://openalex.org/C177264268 |
| concepts[7].level | 2 |
| concepts[7].score | 0.46859803795814514 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1514741 |
| concepts[7].display_name | Set (abstract data type) |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.4535383880138397 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C70518039 |
| concepts[9].level | 2 |
| concepts[9].score | 0.45039504766464233 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q16000077 |
| concepts[9].display_name | Dimensionality reduction |
| concepts[10].id | https://openalex.org/C95349148 |
| concepts[10].level | 3 |
| concepts[10].score | 0.4194291830062866 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q2814098 |
| concepts[10].display_name | Web of Things |
| concepts[11].id | https://openalex.org/C136764020 |
| concepts[11].level | 1 |
| concepts[11].score | 0.25862520933151245 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[11].display_name | World Wide Web |
| concepts[12].id | https://openalex.org/C202444582 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q837863 |
| concepts[12].display_name | Pure mathematics |
| concepts[13].id | https://openalex.org/C199360897 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[13].display_name | Programming language |
| concepts[14].id | https://openalex.org/C33923547 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[14].display_name | Mathematics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8791248798370361 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/the-internet |
| keywords[1].score | 0.5937833786010742 |
| keywords[1].display_name | The Internet |
| keywords[2].id | https://openalex.org/keywords/linear-discriminant-analysis |
| keywords[2].score | 0.530371904373169 |
| keywords[2].display_name | Linear discriminant analysis |
| keywords[3].id | https://openalex.org/keywords/internet-of-things |
| keywords[3].score | 0.5228734016418457 |
| keywords[3].display_name | Internet of Things |
| keywords[4].id | https://openalex.org/keywords/dimension |
| keywords[4].score | 0.502568244934082 |
| keywords[4].display_name | Dimension (graph theory) |
| keywords[5].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[5].score | 0.4963529706001282 |
| keywords[5].display_name | Artificial intelligence |
| keywords[6].id | https://openalex.org/keywords/machine-learning |
| keywords[6].score | 0.475528746843338 |
| keywords[6].display_name | Machine learning |
| keywords[7].id | https://openalex.org/keywords/set |
| keywords[7].score | 0.46859803795814514 |
| keywords[7].display_name | Set (abstract data type) |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.4535383880138397 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/dimensionality-reduction |
| keywords[9].score | 0.45039504766464233 |
| keywords[9].display_name | Dimensionality reduction |
| keywords[10].id | https://openalex.org/keywords/web-of-things |
| keywords[10].score | 0.4194291830062866 |
| keywords[10].display_name | Web of Things |
| keywords[11].id | https://openalex.org/keywords/world-wide-web |
| keywords[11].score | 0.25862520933151245 |
| keywords[11].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.1155/2022/4477507 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120683614 |
| locations[0].source.issn | 1939-0114, 1939-0122 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1939-0114 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Security and Communication Networks |
| locations[0].source.host_organization | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_name | Hindawi Publishing Corporation |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_lineage_names | Hindawi Publishing Corporation |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://downloads.hindawi.com/journals/scn/2022/4477507.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Security and Communication Networks |
| locations[0].landing_page_url | https://doi.org/10.1155/2022/4477507 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5017059503 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-2988-1385 |
| authorships[0].author.display_name | Mutyalaiah Paricherla |
| authorships[0].affiliations[0].raw_affiliation_string | N.B.K.R. Institute of Science & Technology, Vidyanagar, Andhra Pradesh, India |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Mutyalaiah Paricherla |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | N.B.K.R. Institute of Science & Technology, Vidyanagar, Andhra Pradesh, India |
| authorships[1].author.id | https://openalex.org/A5101755265 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Babu Sallagundla |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I116891498 |
| authorships[1].affiliations[0].raw_affiliation_string | CSE Department, V.R Siddhartha Engineering College, Vijayawada, India |
| authorships[1].institutions[0].id | https://openalex.org/I116891498 |
| authorships[1].institutions[0].ror | https://ror.org/058pt1w78 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I116891498 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Siddhartha Medical College |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Sallagundla Babu |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | CSE Department, V.R Siddhartha Engineering College, Vijayawada, India |
| authorships[2].author.id | https://openalex.org/A5053000897 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5795-9779 |
| authorships[2].author.display_name | Khongdet Phasinam |
| authorships[2].countries | TH |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I154381313 |
| authorships[2].affiliations[0].raw_affiliation_string | Faculty of Food and Agricultural Technology, Pibulsongkram Rajabhat University, Phitsanulok, Thailand |
| authorships[2].institutions[0].id | https://openalex.org/I154381313 |
| authorships[2].institutions[0].ror | https://ror.org/02x7w2961 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I154381313 |
| authorships[2].institutions[0].country_code | TH |
| authorships[2].institutions[0].display_name | Pibulsongkram Rajabhat University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Khongdet Phasinam |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Faculty of Food and Agricultural Technology, Pibulsongkram Rajabhat University, Phitsanulok, Thailand |
| authorships[3].author.id | https://openalex.org/A5059157179 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-0705-9035 |
| authorships[3].author.display_name | Harikumar Pallathadka |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I16471300 |
| authorships[3].affiliations[0].raw_affiliation_string | Manipur International University, Imphal, Manipur, India |
| authorships[3].institutions[0].id | https://openalex.org/I16471300 |
| authorships[3].institutions[0].ror | https://ror.org/03964fn67 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I16471300 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Manipur University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Harikumar Pallathadka |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Manipur International University, Imphal, Manipur, India |
| authorships[4].author.id | https://openalex.org/A5009290210 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-0135-2337 |
| authorships[4].author.display_name | Abu Sarwar Zamani |
| authorships[4].countries | SA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I142608572 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia |
| authorships[4].institutions[0].id | https://openalex.org/I142608572 |
| authorships[4].institutions[0].ror | https://ror.org/04jt46d36 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I142608572 |
| authorships[4].institutions[0].country_code | SA |
| authorships[4].institutions[0].display_name | Prince Sattam Bin Abdulaziz University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Abu Sarwar Zamani |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia |
| authorships[5].author.id | https://openalex.org/A5001796396 |
| authorships[5].author.orcid | https://orcid.org/0000-0003-4248-5782 |
| authorships[5].author.display_name | Vipul Narayan |
| authorships[5].countries | IN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I2799532815 |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Madan Mohan Malaviya University of Technology, Gorakhpur, India |
| authorships[5].institutions[0].id | https://openalex.org/I2799532815 |
| authorships[5].institutions[0].ror | https://ror.org/04h1w2j35 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I2799532815 |
| authorships[5].institutions[0].country_code | IN |
| authorships[5].institutions[0].display_name | Madan Mohan Malaviya University of Technology |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Vipul Narayan |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Computer Science and Engineering, Madan Mohan Malaviya University of Technology, Gorakhpur, India |
| authorships[6].author.id | https://openalex.org/A5035355337 |
| authorships[6].author.orcid | https://orcid.org/0000-0003-4120-5953 |
| authorships[6].author.display_name | Surendra Kumar Shukla |
| authorships[6].countries | IN |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I60054993 |
| authorships[6].affiliations[0].raw_affiliation_string | Department of Computer Science & Engineering, Graphic Era Deemed to Be University, Dehradun, Uttarakhand, India |
| authorships[6].institutions[0].id | https://openalex.org/I60054993 |
| authorships[6].institutions[0].ror | https://ror.org/03wqgqd89 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I60054993 |
| authorships[6].institutions[0].country_code | IN |
| authorships[6].institutions[0].display_name | Graphic Era University |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Surendra Kumar Shukla |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Department of Computer Science & Engineering, Graphic Era Deemed to Be University, Dehradun, Uttarakhand, India |
| authorships[7].author.id | https://openalex.org/A5004641005 |
| authorships[7].author.orcid | https://orcid.org/0000-0002-5715-2262 |
| authorships[7].author.display_name | Hussien Sobahi Mohammed |
| authorships[7].countries | SD |
| authorships[7].affiliations[0].institution_ids | https://openalex.org/I78157869 |
| authorships[7].affiliations[0].raw_affiliation_string | University of Gezira, Wad Medani, Sudan |
| authorships[7].institutions[0].id | https://openalex.org/I78157869 |
| authorships[7].institutions[0].ror | https://ror.org/001mf9v16 |
| authorships[7].institutions[0].type | education |
| authorships[7].institutions[0].lineage | https://openalex.org/I78157869 |
| authorships[7].institutions[0].country_code | SD |
| authorships[7].institutions[0].display_name | University of Gezira |
| authorships[7].author_position | last |
| authorships[7].raw_author_name | Hussien Sobahi Mohammed |
| authorships[7].is_corresponding | True |
| authorships[7].raw_affiliation_strings | University of Gezira, Wad Medani, Sudan |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://downloads.hindawi.com/journals/scn/2022/4477507.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things |
| has_fulltext | True |
| is_retracted | True |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10273 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9991999864578247 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | IoT and Edge/Fog Computing |
| related_works | https://openalex.org/W2114217318, https://openalex.org/W2794812819, https://openalex.org/W2587881214, https://openalex.org/W3104072235, https://openalex.org/W3036945320, https://openalex.org/W2370263288, https://openalex.org/W2169311637, https://openalex.org/W2395040056, https://openalex.org/W2052339338, https://openalex.org/W2616027277 |
| cited_by_count | 31 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 12 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 7 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 11 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1155/2022/4477507 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120683614 |
| best_oa_location.source.issn | 1939-0114, 1939-0122 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1939-0114 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Security and Communication Networks |
| best_oa_location.source.host_organization | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_name | Hindawi Publishing Corporation |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://downloads.hindawi.com/journals/scn/2022/4477507.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Security and Communication Networks |
| best_oa_location.landing_page_url | https://doi.org/10.1155/2022/4477507 |
| primary_location.id | doi:10.1155/2022/4477507 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120683614 |
| primary_location.source.issn | 1939-0114, 1939-0122 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1939-0114 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Security and Communication Networks |
| primary_location.source.host_organization | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_name | Hindawi Publishing Corporation |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://downloads.hindawi.com/journals/scn/2022/4477507.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Security and Communication Networks |
| primary_location.landing_page_url | https://doi.org/10.1155/2022/4477507 |
| publication_date | 2022-05-17 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W3110997195, https://openalex.org/W3198540245, https://openalex.org/W3211805103, https://openalex.org/W4211190296, https://openalex.org/W4210462761, https://openalex.org/W4220863748, https://openalex.org/W2357941180, https://openalex.org/W2483078530, https://openalex.org/W2104473821, https://openalex.org/W2294018787, https://openalex.org/W2104927807, https://openalex.org/W2508394542, https://openalex.org/W2777920897, https://openalex.org/W2884400452, https://openalex.org/W2783707758, https://openalex.org/W2768856945, https://openalex.org/W2892077825, https://openalex.org/W2775173651, https://openalex.org/W2761343999, https://openalex.org/W3190866063, https://openalex.org/W3181690476, https://openalex.org/W1579798122, https://openalex.org/W2997653278, https://openalex.org/W2287408518, https://openalex.org/W4240125825 |
| referenced_works_count | 25 |
| abstract_inverted_index.a | 4, 25, 95, 102, 127, 163, 182, 193, 216, 229 |
| abstract_inverted_index.An | 0 |
| abstract_inverted_index.As | 24, 94 |
| abstract_inverted_index.If | 110 |
| abstract_inverted_index.To | 186 |
| abstract_inverted_index.an | 166 |
| abstract_inverted_index.as | 82, 215 |
| abstract_inverted_index.at | 35, 121 |
| abstract_inverted_index.be | 77, 119, 150 |
| abstract_inverted_index.in | 53, 63, 137, 152, 192 |
| abstract_inverted_index.is | 3, 28, 44, 57, 158, 181, 199, 209 |
| abstract_inverted_index.it | 148 |
| abstract_inverted_index.no | 58 |
| abstract_inverted_index.of | 40, 49, 66, 71, 105, 140, 161, 165, 190, 221, 231 |
| abstract_inverted_index.on | 46 |
| abstract_inverted_index.to | 11, 87, 91, 101 |
| abstract_inverted_index.IoT | 1, 67, 92, 97 |
| abstract_inverted_index.The | 38, 69, 219 |
| abstract_inverted_index.all | 9 |
| abstract_inverted_index.and | 14, 34, 130 |
| abstract_inverted_index.any | 32, 36, 122 |
| abstract_inverted_index.are | 85, 99, 113, 145 |
| abstract_inverted_index.for | 60, 134 |
| abstract_inverted_index.has | 225 |
| abstract_inverted_index.may | 118 |
| abstract_inverted_index.not | 114 |
| abstract_inverted_index.put | 210 |
| abstract_inverted_index.set | 205 |
| abstract_inverted_index.the | 12, 47, 64, 83, 138, 159, 175, 188, 203 |
| abstract_inverted_index.Task | 20 |
| abstract_inverted_index.This | 124 |
| abstract_inverted_index.been | 226 |
| abstract_inverted_index.data | 16, 144, 168, 177, 183, 204 |
| abstract_inverted_index.from | 31, 174 |
| abstract_inverted_index.into | 211 |
| abstract_inverted_index.must | 149 |
| abstract_inverted_index.need | 59 |
| abstract_inverted_index.risk | 75 |
| abstract_inverted_index.set. | 178, 218 |
| abstract_inverted_index.size | 153 |
| abstract_inverted_index.such | 81 |
| abstract_inverted_index.that | 7, 170 |
| abstract_inverted_index.tiny | 50 |
| abstract_inverted_index.with | 206 |
| abstract_inverted_index.(IoT) | 42, 73 |
| abstract_inverted_index.(LDA) | 198 |
| abstract_inverted_index.Force | 21 |
| abstract_inverted_index.There | 56 |
| abstract_inverted_index.broad | 103 |
| abstract_inverted_index.built | 45 |
| abstract_inverted_index.fewer | 207 |
| abstract_inverted_index.human | 61 |
| abstract_inverted_index.items | 10 |
| abstract_inverted_index.place | 33 |
| abstract_inverted_index.range | 104, 230 |
| abstract_inverted_index.smart | 5 |
| abstract_inverted_index.that, | 202 |
| abstract_inverted_index.time. | 37, 123 |
| abstract_inverted_index.used. | 200 |
| abstract_inverted_index.using | 17, 228 |
| abstract_inverted_index.Things | 41, 72 |
| abstract_inverted_index.access | 90 |
| abstract_inverted_index.before | 154 |
| abstract_inverted_index.cannot | 76 |
| abstract_inverted_index.common | 54 |
| abstract_inverted_index.hacked | 120 |
| abstract_inverted_index.linear | 195 |
| abstract_inverted_index.mining | 184 |
| abstract_inverted_index.number | 189 |
| abstract_inverted_index.remote | 89 |
| abstract_inverted_index.subset | 164 |
| abstract_inverted_index.system | 2 |
| abstract_inverted_index.Because | 142 |
| abstract_inverted_index.Things. | 141 |
| abstract_inverted_index.article | 125 |
| abstract_inverted_index.content | 173 |
| abstract_inverted_index.feature | 128 |
| abstract_inverted_index.harmful | 106 |
| abstract_inverted_index.machine | 131, 212, 222 |
| abstract_inverted_index.network | 6, 43, 143 |
| abstract_inverted_index.process | 160 |
| abstract_inverted_index.provide | 88 |
| abstract_inverted_index.reduced | 151 |
| abstract_inverted_index.removes | 171 |
| abstract_inverted_index.result, | 96 |
| abstract_inverted_index.sensors | 51 |
| abstract_inverted_index.systems | 98 |
| abstract_inverted_index.Internet | 13, 18, 39, 70, 139 |
| abstract_inverted_index.analysis | 197 |
| abstract_inverted_index.assessed | 227 |
| abstract_inverted_index.backbone | 48 |
| abstract_inverted_index.connects | 8 |
| abstract_inverted_index.critical | 116 |
| abstract_inverted_index.dataset, | 194 |
| abstract_inverted_index.devices. | 68, 93 |
| abstract_inverted_index.embedded | 52 |
| abstract_inverted_index.ignored. | 78 |
| abstract_inverted_index.learning | 213, 223 |
| abstract_inverted_index.minimize | 187 |
| abstract_inverted_index.objects. | 55 |
| abstract_inverted_index.original | 167 |
| abstract_inverted_index.paradigm | 133 |
| abstract_inverted_index.problems | 112 |
| abstract_inverted_index.security | 74, 111, 136 |
| abstract_inverted_index.training | 217 |
| abstract_inverted_index.utilized | 86 |
| abstract_inverted_index.Dimension | 156, 179 |
| abstract_inverted_index.Following | 201 |
| abstract_inverted_index.Internet, | 84 |
| abstract_inverted_index.Untrusted | 79 |
| abstract_inverted_index.abundant, | 147 |
| abstract_inverted_index.approach. | 185 |
| abstract_inverted_index.criteria. | 232 |
| abstract_inverted_index.describes | 126 |
| abstract_inverted_index.essential | 176 |
| abstract_inverted_index.exchanges | 15 |
| abstract_inverted_index.improving | 135 |
| abstract_inverted_index.including | 108 |
| abstract_inverted_index.instantly | 29 |
| abstract_inverted_index.networks, | 80 |
| abstract_inverted_index.reduction | 157, 180 |
| abstract_inverted_index.selection | 129 |
| abstract_inverted_index.accessible | 30 |
| abstract_inverted_index.addressed, | 115 |
| abstract_inverted_index.approaches | 224 |
| abstract_inverted_index.collection | 169 |
| abstract_inverted_index.dimensions | 191, 208 |
| abstract_inverted_index.everything | 27 |
| abstract_inverted_index.inherently | 146 |
| abstract_inverted_index.predictors | 214 |
| abstract_inverted_index.protocols. | 23 |
| abstract_inverted_index.Engineering | 19 |
| abstract_inverted_index.activities, | 107 |
| abstract_inverted_index.established | 22 |
| abstract_inverted_index.information | 117 |
| abstract_inverted_index.processing. | 155 |
| abstract_inverted_index.superfluous | 172 |
| abstract_inverted_index.susceptible | 100 |
| abstract_inverted_index.consequence, | 26 |
| abstract_inverted_index.constructing | 162 |
| abstract_inverted_index.discriminant | 196 |
| abstract_inverted_index.interactions | 65 |
| abstract_inverted_index.intervention | 62 |
| abstract_inverted_index.cyberattacks. | 109 |
| abstract_inverted_index.effectiveness | 220 |
| abstract_inverted_index.learning-based | 132 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5004641005 |
| countries_distinct_count | 4 |
| institutions_distinct_count | 8 |
| corresponding_institution_ids | https://openalex.org/I78157869 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.5400000214576721 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| sustainable_development_goals[1].id | https://metadata.un.org/sdg/10 |
| sustainable_development_goals[1].score | 0.4399999976158142 |
| sustainable_development_goals[1].display_name | Reduced inequalities |
| citation_normalized_percentile.value | 0.95050232 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |