{"id":"https://openalex.org/W3213173707","doi":"https://doi.org/10.1109/access.2021.3128837","title":"Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms","display_name":"Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3213173707","doi":"https://doi.org/10.1109/access.2021.3128837","mag":"3213173707"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3128837","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2021.3128837","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057218982","display_name":"Yakub Kayode Saheed","orcid":"https://orcid.org/0000-0002-0804-0707"},"institutions":[{"id":"https://openalex.org/I4210142152","display_name":"ORCID","ror":"https://ror.org/04fa4r544","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210142152"]},{"id":"https://openalex.org/I65734018","display_name":"American University of Nigeria","ror":"https://ror.org/02kv8bx48","country_code":"NG","type":"education","lineage":["https://openalex.org/I65734018"]}],"countries":["NG","US"],"is_corresponding":false,"raw_author_name":"Yakub Kayode Saheed","raw_affiliation_strings":["ORCiD","School of IT and Computing, American University of Nigeria, Yola, Nigeria"],"affiliations":[{"raw_affiliation_string":"ORCiD","institution_ids":["https://openalex.org/I4210142152"]},{"raw_affiliation_string":"School of IT and Computing, American University of Nigeria, Yola, Nigeria","institution_ids":["https://openalex.org/I65734018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022507170","display_name":"Micheal Olaolu Arowolo","orcid":"https://orcid.org/0000-0002-9418-5346"},"institutions":[{"id":"https://openalex.org/I304664074","display_name":"Landmark University","ror":"https://ror.org/04gw4zv66","country_code":"NG","type":"education","lineage":["https://openalex.org/I304664074"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Micheal Olaolu Arowolo","raw_affiliation_strings":["Department of Computer Science, Landmark University, Omu-Aran, Nigeria and Landmark University SDG9 (Industry, Innovation, and Infrastructure Research Group)."],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Landmark University, Omu-Aran, Nigeria and Landmark University SDG9 (Industry, Innovation, and Infrastructure Research Group).","institution_ids":["https://openalex.org/I304664074"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":16.115,"has_fulltext":false,"cited_by_count":123,"citation_normalized_percentile":{"value":0.786866,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"161546","last_page":"161554"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9915,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9904,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.49051017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8472764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6343558},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5183781},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.49051017},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47589076},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.45104313},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44153544},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.431518},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.42606854},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.41668746},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17905417}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3128837","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/97b7d9b090f54b47b3540e4e45c26ffc","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3128837","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.45,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":52,"referenced_works":["https://openalex.org/W1533822453","https://openalex.org/W1870509456","https://openalex.org/W1982678111","https://openalex.org/W1982763957","https://openalex.org/W2042262752","https://openalex.org/W2166754684","https://openalex.org/W2335999708","https://openalex.org/W2512144135","https://openalex.org/W2578505644","https://openalex.org/W2748771977","https://openalex.org/W2751639377","https://openalex.org/W2768332178","https://openalex.org/W2778385030","https://openalex.org/W2783284780","https://openalex.org/W2791591313","https://openalex.org/W2883599649","https://openalex.org/W2889109290","https://openalex.org/W2893842564","https://openalex.org/W2894483766","https://openalex.org/W2898799488","https://openalex.org/W2900104313","https://openalex.org/W2901492899","https://openalex.org/W2902209387","https://openalex.org/W2903294440","https://openalex.org/W2913330314","https://openalex.org/W2914510789","https://openalex.org/W2918854598","https://openalex.org/W2921134108","https://openalex.org/W2921364842","https://openalex.org/W2926781065","https://openalex.org/W2944406047","https://openalex.org/W2944830571","https://openalex.org/W2945097383","https://openalex.org/W2946427082","https://openalex.org/W2947802941","https://openalex.org/W2952078967","https://openalex.org/W2957326599","https://openalex.org/W2962802821","https://openalex.org/W2964064517","https://openalex.org/W2965595867","https://openalex.org/W2969281952","https://openalex.org/W2996143878","https://openalex.org/W2997698360","https://openalex.org/W2998153253","https://openalex.org/W3007184303","https://openalex.org/W3015392399","https://openalex.org/W3020687048","https://openalex.org/W3033675321","https://openalex.org/W3087990969","https://openalex.org/W3101025102","https://openalex.org/W3116678769","https://openalex.org/W3155672911"],"related_works":["https://openalex.org/W4285325964","https://openalex.org/W4230824443","https://openalex.org/W2929621094","https://openalex.org/W2559738661","https://openalex.org/W2378449000","https://openalex.org/W2294483539","https://openalex.org/W2097156747","https://openalex.org/W2038807247","https://openalex.org/W1996006176","https://openalex.org/W1599449514"],"abstract_inverted_index":{"Information":[0],"and":[1,85,133,191,201,211,220,226,258],"communication":[2,22],"technology":[3,42],"(ICT)":[4],"advancements":[5],"have":[6],"altered":[7],"the":[8,30,57,75,103,110,136,169,215,245,270],"entire":[9],"computing":[10],"paradigm.":[11],"As":[12,158],"a":[13,54,80,94,159,185,239,251],"result":[14],"of":[15,21,27,32,49,56,83,128,138,178,228,254,280],"these":[16],"improvements,":[17],"numerous":[18,119],"new":[19],"channels":[20],"are":[23,118,231],"being":[24],"created,":[25],"one":[26],"which":[28,60],"is":[29,53,91,181,261],"Internet":[31,48],"Things":[33,51],"(IoT).":[34],"The":[35,47,175],"IoT":[36,145],"has":[37],"recently":[38],"emerged":[39],"as":[40,93,123],"cutting-edge":[41],"for":[43,87,218,248],"creating":[44],"smart":[45],"environments.":[46],"Medical":[50],"(IoMT)":[52],"subset":[55],"IoT,":[58],"in":[59,97,214,256],"medical":[61],"equipment":[62],"exchange":[63,69],"information":[64],"with":[65,144,277],"each":[66],"other":[67,259],"to":[68,78,109,155,164,167,182,207],"sensitive":[70],"information.":[71],"These":[72],"developments":[73],"enable":[74],"healthcare":[76],"business":[77],"maintain":[79],"higher":[81],"level":[82],"touch":[84],"care":[86],"its":[88],"patients.":[89],"Security":[90,105],"seen":[92],"significant":[95],"challenge":[96],"whatsoever":[98],"technology's":[99],"reliance":[100],"based":[101],"on":[102],"IoT.":[104],"difficulties":[106],"occur":[107],"owing":[108],"various":[111],"potential":[112],"attacks":[113],"posed":[114],"by":[115],"attackers.":[116],"There":[117],"security":[120],"concerns,":[121],"such":[122,139],"remote":[124],"hijacking,":[125],"impersonation,":[126],"denial":[127],"service":[129],"attacks,":[130,140],"password":[131],"guessing,":[132],"man-in-the-middle.":[134],"In":[135],"event":[137],"critical":[141,166],"data":[142,230,247],"associated":[143],"connectivity":[146],"may":[147],"be":[148,165,205],"revealed,":[149],"altered,":[150],"or":[151],"even":[152],"rendered":[153],"inaccessible":[154],"authorized":[156],"users.":[157],"result,":[160],"it":[161],"turns":[162],"out":[163],"safeguard":[168],"IoT/IoMT":[170],"ecosystem":[171],"against":[172],"malware":[173],"assaults.":[174],"main":[176],"goal":[177],"this":[179],"study":[180],"demonstrate":[183],"how":[184],"deep":[186],"recurrent":[187],"neural":[188],"network":[189,229],"(DRNN)":[190],"supervised":[192],"machine":[193],"learning":[194],"models":[195],"(random":[196],"forest,":[197],"decision":[198],"tree,":[199],"KNN,":[200],"ridge":[202],"classifier)":[203],"can":[204],"utilized":[206],"develop":[208],"an":[209,278],"efficient":[210],"effective":[212],"IDS":[213],"IoMT":[216],"environment":[217],"classifying":[219],"forecasting":[221],"unexpected":[222],"cyber":[223],"threats.":[224],"Preprocessing":[225],"normalization":[227],"performed.":[232,262],"Following":[233],"that,":[234],"we":[235],"optimized":[236],"features":[237],"using":[238],"bio-inspired":[240],"particle":[241],"swarm":[242],"algorithm.":[243],"On":[244],"standard":[246],"intrusion":[249],"detection,":[250],"thorough":[252],"evaluation":[253],"experiments":[255],"DRNN":[257],"SML":[260,272],"It":[263],"was":[264],"established":[265],"through":[266],"rigorous":[267],"testing":[268],"that":[269],"proposed":[271],"model":[273],"outperforms":[274],"existing":[275],"approaches":[276],"accuracy":[279],"99.76%.":[281]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3213173707","counts_by_year":[{"year":2024,"cited_by_count":55},{"year":2023,"cited_by_count":52},{"year":2022,"cited_by_count":16}],"updated_date":"2025-01-07T01:24:35.387627","created_date":"2021-11-22"}