{"id":"https://openalex.org/W3169324926","doi":"https://doi.org/10.1145/3448614","title":"Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures","display_name":"Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures","publication_year":2021,"publication_date":"2021-06-16","ids":{"openalex":"https://openalex.org/W3169324926","doi":"https://doi.org/10.1145/3448614","mag":"3169324926"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3448614","pdf_url":null,"source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081281059","display_name":"Celestine Iwendi","orcid":"https://orcid.org/0000-0003-4350-3911"},"institutions":[{"id":"https://openalex.org/I119273862","display_name":"Central South University of Forestry and Technology","ror":"https://ror.org/02czw2k81","country_code":"CN","type":"education","lineage":["https://openalex.org/I119273862"]},{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Celestine Iwendi","raw_affiliation_strings":["BCC of Central South University of Forestry and Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"BCC of Central South University of Forestry and Technology, Changsha, China","institution_ids":["https://openalex.org/I119273862","https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101804002","display_name":"Saif Ur Rehman","orcid":"https://orcid.org/0000-0002-1324-1693"},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Saif Ur Rehman","raw_affiliation_strings":["Air University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Air University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069580698","display_name":"Abdul Rehman Javed","orcid":"https://orcid.org/0000-0002-0570-1813"},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Abdul Rehman Javed","raw_affiliation_strings":["Air University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Air University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071609458","display_name":"Suleman Khan","orcid":"https://orcid.org/0000-0003-3102-4585"},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Suleman Khan","raw_affiliation_strings":["Air University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Air University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041541232","display_name":"Gautam Srivastava","orcid":"https://orcid.org/0000-0001-9851-4103"},"institutions":[{"id":"https://openalex.org/I184693016","display_name":"China Medical University","ror":"https://ror.org/00v408z34","country_code":"TW","type":"education","lineage":["https://openalex.org/I184693016"]},{"id":"https://openalex.org/I48890080","display_name":"Brandon University","ror":"https://ror.org/02qp25a50","country_code":"CA","type":"education","lineage":["https://openalex.org/I48890080"]}],"countries":["CA","TW"],"is_corresponding":false,"raw_author_name":"Gautam Srivastava","raw_affiliation_strings":["Brandon University, Canada and China Medical University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Brandon University, Canada and China Medical University, Taichung, Taiwan","institution_ids":["https://openalex.org/I184693016","https://openalex.org/I48890080"]}]}],"institution_assertions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.686,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.999939,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"21","issue":"3","first_page":"1","last_page":"22"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Security Challenges in Smart Grid Systems","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.73157835},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.57342},{"id":"https://openalex.org/keywords/iot-security","display_name":"IoT Security","score":0.554832},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.529538},{"id":"https://openalex.org/keywords/attack-detection","display_name":"Attack Detection","score":0.50913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8766031},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.73157835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7251288},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5378835},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4733251},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36400515},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20432237}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3448614","pdf_url":null,"source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":55,"referenced_works":["https://openalex.org/W2016094683","https://openalex.org/W2059476514","https://openalex.org/W2104993088","https://openalex.org/W2334754211","https://openalex.org/W2604252918","https://openalex.org/W2623384363","https://openalex.org/W2735337113","https://openalex.org/W2738293969","https://openalex.org/W2744909235","https://openalex.org/W2763721618","https://openalex.org/W2769101645","https://openalex.org/W2774433025","https://openalex.org/W2790149281","https://openalex.org/W2795180899","https://openalex.org/W2795283266","https://openalex.org/W2798776451","https://openalex.org/W2801911367","https://openalex.org/W2853755454","https://openalex.org/W2885994992","https://openalex.org/W2886359646","https://openalex.org/W2888810024","https://openalex.org/W2893309827","https://openalex.org/W2898367412","https://openalex.org/W2907922133","https://openalex.org/W2911374620","https://openalex.org/W2923585135","https://openalex.org/W2941857839","https://openalex.org/W2944821975","https://openalex.org/W2944858588","https://openalex.org/W2948143530","https://openalex.org/W2950590641","https://openalex.org/W2953746822","https://openalex.org/W2954781302","https://openalex.org/W2962829655","https://openalex.org/W2970533587","https://openalex.org/W2977444969","https://openalex.org/W2990518741","https://openalex.org/W2993234371","https://openalex.org/W2999375771","https://openalex.org/W2999469653","https://openalex.org/W3000541349","https://openalex.org/W3003685271","https://openalex.org/W3004396001","https://openalex.org/W3015246755","https://openalex.org/W3016481661","https://openalex.org/W3022221457","https://openalex.org/W3041715340","https://openalex.org/W3083863345","https://openalex.org/W3092739266","https://openalex.org/W3096448935","https://openalex.org/W3097409240","https://openalex.org/W3098038249","https://openalex.org/W3104455619","https://openalex.org/W4231849990","https://openalex.org/W4239342999"],"related_works":["https://openalex.org/W3006507989","https://openalex.org/W2921504876","https://openalex.org/W2897593657","https://openalex.org/W2725637128","https://openalex.org/W2551868243","https://openalex.org/W2381740503","https://openalex.org/W2371430952","https://openalex.org/W2348153269","https://openalex.org/W2183730421","https://openalex.org/W1982580243"],"abstract_inverted_index":{"In":[0,73],"this":[1,29],"digital":[2,92,98],"age,":[3],"human":[4],"dependency":[5],"on":[6,52,145],"technology":[7,51],"in":[8,31,123,180,196],"various":[9],"fields":[10],"has":[11,55],"been":[12],"increasing":[13],"tremendously.":[14],"Torrential":[15],"amounts":[16],"of":[17,34,38,89,95,148,164,167,171],"different":[18],"electronic":[19],"products":[20],"are":[21,43,59,109],"being":[22],"manufactured":[23],"daily":[24,65],"for":[25,46,70,85,103,111,131,142],"everyday":[26],"use.":[27],"With":[28],"advancement":[30],"the":[32,53,76,87,124,146],"world":[33],"Internet":[35,147],"technology,":[36],"cybersecurity":[37],"software":[39],"and":[40,63,117,169],"hardware":[41],"systems":[42],"now":[44],"prerequisites":[45],"major":[47],"business\u2019":[48],"operations.":[49],"Every":[50],"market":[54],"multiple":[56],"vulnerabilities":[57],"that":[58],"exploited":[60],"by":[61],"hackers":[62],"cyber-criminals":[64],"to":[66,113,185],"manipulate":[67],"data":[68],"sometimes":[69],"malicious":[71],"purposes.":[72],"any":[74],"system,":[75],"Intrusion":[77],"Detection":[78],"System":[79],"(IDS)":[80],"is":[81,100],"a":[82,138,151],"fundamental":[83],"component":[84],"ensuring":[86],"security":[88],"devices":[90],"from":[91],"attacks.":[93],"Recognition":[94],"new":[96],"developing":[97],"threats":[99],"getting":[101],"harder":[102],"existing":[104],"IDS.":[105],"Furthermore,":[106],"advanced":[107],"frameworks":[108],"required":[110],"IDS":[112],"function":[114],"both":[115],"efficiently":[116],"effectively.":[118],"The":[119],"commonly":[120],"observed":[121],"cyber-attacks":[122,144,198],"business":[125],"domain":[126],"include":[127],"minor":[128],"attacks":[129],"used":[130,184],"stealing":[132],"private":[133],"data.":[134],"This":[135],"article":[136],"presents":[137],"deep":[139],"learning":[140],"methodology":[141],"detecting":[143,197],"Things":[149],"using":[150],"Long":[152],"Short":[153],"Term":[154],"Networks":[155],"classifier.":[156],"Our":[157],"extensive":[158],"experimental":[159],"testing":[160],"show":[161],"an":[162],"Accuracy":[163],"99.09%,":[165],"F1-score":[166],"99.46%,":[168],"Recall":[170],"99.51%,":[172],"respectively.":[173],"A":[174],"detailed":[175],"metric":[176],"representing":[177],"our":[178,188],"results":[179],"tabular":[181],"form":[182],"was":[183,190],"compare":[186],"how":[187],"model":[189],"better":[191],"than":[192],"other":[193],"state-of-the-art":[194],"models":[195],"with":[199],"proficiency.":[200]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3169324926","counts_by_year":[{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":19},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":5}],"updated_date":"2024-11-27T00:28:34.532640","created_date":"2021-06-22"}