{"id":"https://openalex.org/W3197213531","doi":"https://doi.org/10.1155/2021/7154587","title":"Intrusion Detection in Industrial Internet of Things Network\u2010Based on Deep Learning Model with Rule\u2010Based Feature Selection","display_name":"Intrusion Detection in Industrial Internet of Things Network\u2010Based on Deep Learning Model with Rule\u2010Based Feature Selection","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3197213531","doi":"https://doi.org/10.1155/2021/7154587","mag":"3197213531"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/7154587","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/7154587.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/wcmc/2021/7154587.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085915629","display_name":"Joseph Bamidele Awotunde","orcid":"https://orcid.org/0000-0002-1020-4432"},"institutions":[{"id":"https://openalex.org/I134542131","display_name":"University of Ilorin","ror":"https://ror.org/032kdwk38","country_code":"NG","type":"education","lineage":["https://openalex.org/I134542131"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Joseph Bamidele Awotunde","raw_affiliation_strings":["Department of Computer Science, University of Ilorin, Ilorin, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Ilorin, Ilorin, Nigeria","institution_ids":["https://openalex.org/I134542131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036945704","display_name":"Chinmay Chakraborty","orcid":"https://orcid.org/0000-0002-4385-0975"},"institutions":[{"id":"https://openalex.org/I115715567","display_name":"Birla Institute of Technology, Mesra","ror":"https://ror.org/028vtqb15","country_code":"IN","type":"education","lineage":["https://openalex.org/I115715567"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Chinmay Chakraborty","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Birla Institute of Technology, Mesra, Jharkhand, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Birla Institute of Technology, Mesra, Jharkhand, India","institution_ids":["https://openalex.org/I115715567"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063803070","display_name":"Abidemi Emmanuel Adeniyi","orcid":"https://orcid.org/0000-0002-2728-0116"},"institutions":[{"id":"https://openalex.org/I304664074","display_name":"Landmark University","ror":"https://ror.org/04gw4zv66","country_code":"NG","type":"education","lineage":["https://openalex.org/I304664074"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Abidemi Emmanuel Adeniyi","raw_affiliation_strings":["Department of Computer Science, Landmark University, Omu-Aran, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Landmark University, Omu-Aran, Nigeria","institution_ids":["https://openalex.org/I304664074"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085915629"],"corresponding_institution_ids":["https://openalex.org/I134542131"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300,"provenance":"doaj"},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300,"provenance":"doaj"},"fwci":17.74,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":132,"citation_normalized_percentile":{"value":0.999938,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9967,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.6045836},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5411344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.89486206},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7487345},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.72311395},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.6045836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.55335987},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5411344},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.53567845},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5301555},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.46845958},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45135793},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4192539},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4021768},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26053882},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19725215},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/7154587","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/7154587.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/b2a15e93cd9044a381fb9b93f62f92dc","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/7154587","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/7154587.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":93,"referenced_works":["https://openalex.org/W1511751452","https://openalex.org/W1596379222","https://openalex.org/W1631951852","https://openalex.org/W1979072344","https://openalex.org/W1982950856","https://openalex.org/W1983827610","https://openalex.org/W2000326002","https://openalex.org/W2002900768","https://openalex.org/W2016070752","https://openalex.org/W2017380649","https://openalex.org/W2028501442","https://openalex.org/W2036785686","https://openalex.org/W2044777538","https://openalex.org/W2072566913","https://openalex.org/W2099940443","https://openalex.org/W2103024672","https://openalex.org/W2122217421","https://openalex.org/W2143842190","https://openalex.org/W2167710876","https://openalex.org/W2256499965","https://openalex.org/W2266336423","https://openalex.org/W2266684752","https://openalex.org/W2267339884","https://openalex.org/W2276979642","https://openalex.org/W2290128307","https://openalex.org/W2296509296","https://openalex.org/W2302958273","https://openalex.org/W2329795475","https://openalex.org/W2334853001","https://openalex.org/W2346714907","https://openalex.org/W2437244913","https://openalex.org/W2467389505","https://openalex.org/W2477439714","https://openalex.org/W2481159763","https://openalex.org/W2510535264","https://openalex.org/W2517975492","https://openalex.org/W2527999453","https://openalex.org/W2534494200","https://openalex.org/W2539869562","https://openalex.org/W2541841318","https://openalex.org/W2547926162","https://openalex.org/W2554148185","https://openalex.org/W2560162835","https://openalex.org/W2566782476","https://openalex.org/W2577349817","https://openalex.org/W2582025857","https://openalex.org/W2583997959","https://openalex.org/W2585582797","https://openalex.org/W2615173403","https://openalex.org/W2619413199","https://openalex.org/W2734718015","https://openalex.org/W2740755977","https://openalex.org/W2762776925","https://openalex.org/W2767520162","https://openalex.org/W2769698849","https://openalex.org/W2787928652","https://openalex.org/W2793038244","https://openalex.org/W2795033129","https://openalex.org/W2796394805","https://openalex.org/W2804368608","https://openalex.org/W2805511146","https://openalex.org/W2887195793","https://openalex.org/W2904539465","https://openalex.org/W2908109501","https://openalex.org/W2912292549","https://openalex.org/W2936512185","https://openalex.org/W2955045650","https://openalex.org/W2957283238","https://openalex.org/W2969527636","https://openalex.org/W2970299364","https://openalex.org/W2972189363","https://openalex.org/W2980939522","https://openalex.org/W2989709315","https://openalex.org/W3001364574","https://openalex.org/W3005115714","https://openalex.org/W3006558576","https://openalex.org/W3017024260","https://openalex.org/W3031475976","https://openalex.org/W3045162101","https://openalex.org/W3104092367","https://openalex.org/W3114024232","https://openalex.org/W3118699103","https://openalex.org/W3130288149","https://openalex.org/W3132706216","https://openalex.org/W3160751182","https://openalex.org/W3178795497","https://openalex.org/W3183376261","https://openalex.org/W3183625236","https://openalex.org/W3185441414","https://openalex.org/W3199544889","https://openalex.org/W4240570579","https://openalex.org/W4245460974","https://openalex.org/W987648574"],"related_works":["https://openalex.org/W4400212587","https://openalex.org/W4390610562","https://openalex.org/W4311097251","https://openalex.org/W4245926026","https://openalex.org/W4200598720","https://openalex.org/W3212933010","https://openalex.org/W3076529025","https://openalex.org/W2921026492","https://openalex.org/W2625093826","https://openalex.org/W2586548817"],"abstract_inverted_index":{"The":[0,20,41,150,167,180],"Industrial":[1],"Internet":[2],"of":[3,29,47,74,96,105,189,219],"Things":[4],"(IIoT)":[5],"is":[6,235],"a":[7,110,128,156],"recent":[8],"research":[9],"area":[10],"that":[11,49,98,231],"links":[12],"digital":[13],"equipment":[14],"and":[15,34,64,89,121,143,161,178,193,198,205,208],"services":[16],"to":[17,25,53,87,141,216],"physical":[18],"systems.":[19],"IIoT":[21,42,91,135],"has":[22,37,43],"been":[23,85],"used":[24,101],"generate":[26],"large":[27],"quantities":[28],"data":[30],"from":[31,147],"multiple":[32],"sensors,":[33],"the":[35,72,94,103,125,202,212,217,220,232],"device":[36],"encountered":[38],"several":[39,78],"issues.":[40],"faced":[44],"various":[45,227],"forms":[46],"cyberattacks":[48],"jeopardize":[50],"its":[51],"capacity":[52],"supply":[54],"organizations":[55],"with":[56,136],"seamless":[57],"operations.":[58],"Such":[59],"risks":[60],"result":[61],"in":[62,102,118,187],"financial":[63],"reputational":[65],"damages":[66],"for":[67,134,201,211,237],"businesses,":[68],"as":[69,71],"well":[70],"theft":[73],"sensitive":[75],"information.":[76],"Hence,":[77],"Network":[79],"Intrusion":[80],"Detection":[81],"Systems":[82],"(NIDSs)":[83],"have":[84],"developed":[86],"fight":[88],"protect":[90],"systems,":[92],"but":[93],"collections":[95],"information":[97,145],"can":[99],"be":[100],"development":[104],"an":[106],"intelligent":[107],"NIDS":[108],"are":[109,115],"difficult":[111],"task;":[112],"thus,":[113],"there":[114],"serious":[116],"challenges":[117],"detecting":[119],"existing":[120],"new":[122],"attacks.":[123],"Therefore,":[124],"study":[126],"provides":[127],"deep":[129,162],"learning\u2010based":[130],"intrusion":[131,239],"detection":[132,191],"paradigm":[133],"hybrid":[137,157],"rule\u2010based":[138,158],"feature":[139,159],"selection":[140,160],"train":[142],"verify":[144],"captured":[146],"TCP/IP":[148],"packets.":[149],"training":[151],"process":[152],"was":[153,170],"implemented":[154],"using":[155,226],"feedforward":[163],"neural":[164],"network":[165,175,240],"model.":[166],"proposed":[168],"scheme":[169],"tested":[171],"utilizing":[172],"two":[173],"well\u2010known":[174],"datasets,":[176],"NSL\u2010KDD":[177,203],"UNSW\u2010NB15.":[179],"suggested":[181,233],"method":[182,234],"beats":[183],"other":[184],"relevant":[185],"methods":[186],"terms":[188],"accuracy,":[190],"rate,":[192],"FPR":[194],"by":[195],"99.0%,":[196,197],"1.0%,":[199],"respectively,":[200,210],"dataset,":[204,214],"98.9%,":[206],"99.9%,":[207],"1.1%,":[209],"UNSW\u2010NB15":[213],"according":[215],"results":[218],"performance":[221],"comparison.":[222],"Finally,":[223],"simulation":[224],"experiments":[225],"evaluation":[228],"metrics":[229],"revealed":[230],"appropriate":[236],"IIOT":[238],"attack":[241],"classification.":[242]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3197213531","counts_by_year":[{"year":2024,"cited_by_count":34},{"year":2023,"cited_by_count":48},{"year":2022,"cited_by_count":38},{"year":2021,"cited_by_count":3}],"updated_date":"2024-12-10T13:03:41.463568","created_date":"2021-09-13"}