A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges

Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as develo...

Full description

Saved in:
Bibliographic Details
Published in:Archives of computational methods in engineering Vol. 28; no. 4; pp. 3211 - 3243
Main Authors: Thakkar, Ankit, Lohiya, Ritika
Format: Journal Article
Language:English
Published: Dordrecht Springer Netherlands 01.06.2021
Springer Nature B.V
Subjects:
ISSN:1134-3060, 1886-1784
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as developing smart home, smart cities, healthcare applications, wireless sensor networks, cloud environment, enterprise network, web applications, and smart grid technologies. These wide emerging applications in variety of domains raise many security issues such as protecting devices and network, attacks in IoT networks, and managing resource-constrained IoT networks. To address the scalability and resource-constrained security issues, many security solutions have been proposed for IoT such as web application firewalls and intrusion detection systems. In this paper, a comprehensive survey on Intrusion Detection System (IDS) for IoT is presented for years 2015–2019. We have discussed various IDS placement strategies and IDS analysis strategies in IoT architecture. The paper discusses various intrusions in IoT, along with Machine Learning (ML) and Deep Learning (DL) techniques for detecting attacks in IoT networks. The paper also discusses security issues and challenges in IoT.
AbstractList Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as developing smart home, smart cities, healthcare applications, wireless sensor networks, cloud environment, enterprise network, web applications, and smart grid technologies. These wide emerging applications in variety of domains raise many security issues such as protecting devices and network, attacks in IoT networks, and managing resource-constrained IoT networks. To address the scalability and resource-constrained security issues, many security solutions have been proposed for IoT such as web application firewalls and intrusion detection systems. In this paper, a comprehensive survey on Intrusion Detection System (IDS) for IoT is presented for years 2015–2019. We have discussed various IDS placement strategies and IDS analysis strategies in IoT architecture. The paper discusses various intrusions in IoT, along with Machine Learning (ML) and Deep Learning (DL) techniques for detecting attacks in IoT networks. The paper also discusses security issues and challenges in IoT.
Author Thakkar, Ankit
Lohiya, Ritika
Author_xml – sequence: 1
  givenname: Ankit
  surname: Thakkar
  fullname: Thakkar, Ankit
  organization: Department of Computer Science and Engineering, Institute of Technology, Nirma University
– sequence: 2
  givenname: Ritika
  orcidid: 0000-0003-1794-8300
  surname: Lohiya
  fullname: Lohiya, Ritika
  email: 18ftphde30@nirmauni.ac.in
  organization: Department of Computer Science and Engineering, Institute of Technology, Nirma University
BookMark eNp9kEtLLDEQRoMo-PwDrgJub2sl6U53u5PxNTCi-FiHdLpaI2PSN8ko4p834wiCC1cJRZ2vqs42WXfeISH7DA4ZQH0UGWsEK4BDAW3ZygLWyBZrGlmwuinX85-JshAgYZNsx_gMUJVty7fIxwm9xVeLb9Q7eqXNk3VIZ6iDs-6RatfTU8Txp3KDIY5okn3FSP1Ap6d3dPCBTv39cU4y6BJ9GHudMP6jd2gWwaZ3Oo1xsSws8yZPej5H94hxl2wMeh5x7_vdIQ_nZ_eTy2J2fTGdnMwKI1ibCtZJXbWCgaxLM_QoB9ED62vQvOuqvu54ZxC7UmrZAPJeGo1MGs4r7LHKh--Qg1XuGPz_vEdSz34RXB6peCW4BBAcchdfdZngYww4qDHYFx3eFQO1lKxWklWWrL4kqyXU_IKMTTpZ71LQdv43KlZozHOyjvCz1R_UJ7G_kuc
CitedBy_id crossref_primary_10_1002_itl2_558
crossref_primary_10_1109_JIOT_2024_3457894
crossref_primary_10_3390_jsan14040078
crossref_primary_10_1145_3695998
crossref_primary_10_1016_j_cose_2024_104034
crossref_primary_10_1007_s11831_023_09943_8
crossref_primary_10_1007_s12652_022_04350_6
crossref_primary_10_1108_IJPCC_12_2023_0358
crossref_primary_10_3390_electronics14153015
crossref_primary_10_1109_ACCESS_2024_3362670
crossref_primary_10_1007_s11277_022_09487_3
crossref_primary_10_32604_cmc_2024_055891
crossref_primary_10_1016_j_iot_2023_100773
crossref_primary_10_1109_ACCESS_2025_3602840
crossref_primary_10_1007_s11227_023_05616_2
crossref_primary_10_1155_2023_6048087
crossref_primary_10_1016_j_procs_2025_03_315
crossref_primary_10_3390_s24186035
crossref_primary_10_1016_j_jnca_2022_103419
crossref_primary_10_1016_j_cose_2025_104542
crossref_primary_10_1109_ACCESS_2025_3579990
crossref_primary_10_1007_s11227_024_06409_x
crossref_primary_10_1109_ACCESS_2024_3386631
crossref_primary_10_2139_ssrn_5046099
crossref_primary_10_1109_ACCESS_2025_3609003
crossref_primary_10_1109_TITS_2025_3558849
crossref_primary_10_1007_s10845_024_02536_7
crossref_primary_10_1007_s11277_023_10363_x
crossref_primary_10_3390_electronics10141633
crossref_primary_10_1016_j_inffus_2025_103102
crossref_primary_10_1016_j_iswa_2023_200189
crossref_primary_10_1080_21642583_2024_2321381
crossref_primary_10_1109_JIOT_2025_3542845
crossref_primary_10_3390_fi17080351
crossref_primary_10_3390_s22218417
crossref_primary_10_1016_j_aej_2024_12_061
crossref_primary_10_1016_j_dsp_2025_105153
crossref_primary_10_1109_ACCESS_2023_3250235
crossref_primary_10_1109_ACCESS_2024_3462297
crossref_primary_10_3390_sym17070997
crossref_primary_10_1007_s42979_023_01770_9
crossref_primary_10_1007_s11227_025_07821_7
crossref_primary_10_3390_s23218701
crossref_primary_10_1016_j_iot_2023_100792
crossref_primary_10_1016_j_measen_2022_100459
crossref_primary_10_1109_ACCESS_2025_3574672
crossref_primary_10_3390_electronics11040524
crossref_primary_10_7717_peerj_cs_2745
crossref_primary_10_3390_s22249957
crossref_primary_10_1109_ACCESS_2025_3605171
crossref_primary_10_1007_s11831_022_09741_8
crossref_primary_10_1109_ACCESS_2024_3355794
crossref_primary_10_62486_latia20249
crossref_primary_10_1016_j_icte_2025_01_005
crossref_primary_10_1007_s11042_024_20410_9
crossref_primary_10_1007_s11277_023_10773_x
crossref_primary_10_4018_IJCAC_386134
crossref_primary_10_1007_s10844_023_00819_8
crossref_primary_10_7717_peerj_cs_2290
crossref_primary_10_1016_j_eswa_2025_128899
crossref_primary_10_1109_ACCESS_2023_3332909
crossref_primary_10_1007_s42979_023_02105_4
crossref_primary_10_1007_s10462_021_10037_9
crossref_primary_10_1109_JIOT_2023_3328795
crossref_primary_10_1109_ACCESS_2023_3349287
crossref_primary_10_1002_nem_2294
crossref_primary_10_1016_j_iot_2024_101135
crossref_primary_10_1007_s10845_024_02535_8
crossref_primary_10_1016_j_neucom_2023_126533
crossref_primary_10_1007_s12652_022_04362_2
crossref_primary_10_1109_JIOT_2023_3244810
crossref_primary_10_1080_1206212X_2024_2400148
crossref_primary_10_3390_s23167256
crossref_primary_10_3390_s22093438
crossref_primary_10_3390_electronics12041044
crossref_primary_10_32604_cmc_2024_059805
crossref_primary_10_3390_electronics12122650
crossref_primary_10_1007_s11760_021_02116_9
crossref_primary_10_3390_electronics13234611
crossref_primary_10_1155_2022_5988567
crossref_primary_10_3390_electronics13163210
crossref_primary_10_32604_cmes_2022_020724
crossref_primary_10_1016_j_comcom_2022_09_012
crossref_primary_10_1016_j_jksuci_2023_101866
crossref_primary_10_1007_s11276_023_03517_z
crossref_primary_10_1109_JIOT_2023_3234530
crossref_primary_10_1007_s44163_022_00042_4
crossref_primary_10_1109_ACCESS_2023_3319814
crossref_primary_10_1016_j_jksuci_2021_04_003
crossref_primary_10_1038_s41598_025_01052_9
crossref_primary_10_1007_s10207_023_00684_0
crossref_primary_10_3390_electronics12234806
crossref_primary_10_1002_eng2_70338
crossref_primary_10_1186_s42400_023_00169_6
crossref_primary_10_1016_j_iot_2023_100851
crossref_primary_10_1038_s41598_025_99574_9
crossref_primary_10_2139_ssrn_5386763
crossref_primary_10_3233_IDT_230238
crossref_primary_10_1016_j_cose_2023_103650
crossref_primary_10_1016_j_iot_2023_100715
crossref_primary_10_1007_s11831_021_09668_6
crossref_primary_10_3390_s23010321
crossref_primary_10_1109_JIOT_2020_3048439
crossref_primary_10_1007_s10586_024_04509_0
crossref_primary_10_1007_s10207_024_00891_3
crossref_primary_10_3390_fi16030073
crossref_primary_10_1016_j_comcom_2025_108055
crossref_primary_10_3233_JCM_247183
crossref_primary_10_32604_iasc_2023_039255
crossref_primary_10_1007_s11227_024_05993_2
crossref_primary_10_1016_j_adhoc_2024_103698
crossref_primary_10_1177_18724981241291422
crossref_primary_10_3390_s22165986
crossref_primary_10_1007_s10586_025_05234_y
crossref_primary_10_1088_1742_6596_2414_1_012014
crossref_primary_10_1016_j_eswa_2023_122380
crossref_primary_10_3390_electronics14010104
crossref_primary_10_32604_cmc_2024_053721
crossref_primary_10_1007_s43926_025_00099_4
crossref_primary_10_24018_ejeng_2025_10_2_3249
crossref_primary_10_1109_TCE_2023_3329151
crossref_primary_10_1016_j_measen_2024_101263
crossref_primary_10_3390_fi16070255
crossref_primary_10_32604_cmc_2024_059271
crossref_primary_10_7717_peerj_cs_721
crossref_primary_10_1371_journal_pone_0281323
crossref_primary_10_1007_s10207_025_01016_0
crossref_primary_10_1007_s13042_022_01758_6
crossref_primary_10_1016_j_ins_2023_119783
crossref_primary_10_1016_j_iot_2023_100999
crossref_primary_10_3389_fdata_2023_1081466
crossref_primary_10_3390_a16020075
crossref_primary_10_1007_s10462_024_10776_5
crossref_primary_10_3390_fi16100368
crossref_primary_10_1109_TAFFC_2022_3206891
crossref_primary_10_3390_s24154766
crossref_primary_10_1109_ACCESS_2024_3437214
crossref_primary_10_1109_ACCESS_2024_3460468
crossref_primary_10_1002_cpe_7552
crossref_primary_10_1016_j_knosys_2023_110941
crossref_primary_10_1155_2021_1723535
crossref_primary_10_3390_bdcc6040137
crossref_primary_10_3390_electronics12153283
crossref_primary_10_1038_s41598_024_78976_1
crossref_primary_10_1016_j_adhoc_2021_102685
crossref_primary_10_1186_s42400_023_00199_0
crossref_primary_10_3390_s22197409
crossref_primary_10_1016_j_asoc_2024_111378
crossref_primary_10_1038_s41598_025_03498_3
crossref_primary_10_3390_electronics11030422
crossref_primary_10_1109_JIOT_2022_3224649
Cites_doi 10.1109/MGRS.2016.2540798
10.1109/PCCC.2017.8280489
10.1007/978-3-319-21542-6_4
10.1147/JRD.2017.2708299
10.1049/iet-ifs.2014.0099
10.1109/ACCESS.2018.2793966
10.1007/s11749-016-0481-7
10.1016/j.proeng.2012.01.849
10.1109/ARGENCON.2016.7585247
10.1145/2542049
10.1007/978-3-642-35289-8_32
10.5220/0006639801080116
10.1016/j.neucom.2012.11.050
10.1016/j.rser.2015.10.036
10.1145/2508859.2512494
10.1109/ICCUBEA.2015.61
10.1109/ACCESS.2017.2747560
10.1109/CSE-EUC.2017.118
10.1016/j.procs.2018.07.183
10.1002/sec.681
10.4018/978-1-5225-0105-3
10.1016/j.comcom.2014.09.008
10.1016/j.adhoc.2015.07.013
10.1109/ICEICT.2016.7879701
10.1109/COMST.2016.2627399
10.1109/ICBDACI.2017.8070818
10.1145/3029806.3029823
10.1109/ICNC.2011.6022060
10.1016/j.jnca.2014.11.011
10.1109/MNET.2018.1700202
10.1007/s10916-018-1045-z
10.1109/GLOCOM.2017.8254027
10.1016/j.asoc.2018.06.017
10.1016/j.asoc.2008.06.001
10.1109/COMST.2015.2444095
10.3233/IDA-173493
10.1016/j.future.2018.03.007
10.1109/MPRV.2018.03367731
10.1109/RAIT.2016.7507884
10.1109/ICEMIS.2016.7745295
10.1145/3054925
10.1007/s11276-016-1439-0
10.1609/aaai.v29i1.9513
10.1145/2381716.2381867
10.1109/ICCIC.2013.6724156
10.3390/s130506492
10.1016/j.procs.2016.02.095
10.1142/9789813143180_0009
10.1109/CISS.2019.8693059
10.1201/9781315139470
10.1155/2013/794326
10.1155/2019/7045862
10.1007/s13389-014-0089-3
10.1109/ACCESS.2019.2903723
10.1109/WD.2011.6098218
10.1016/j.procs.2020.03.330
10.1109/MS.2017.26
10.4249/scholarpedia.5947
10.1109/COMST.2017.2707140
10.1016/j.procs.2013.09.019
10.1007/978-1-4899-7488-4_293
10.3390/s141224188
10.1109/GLOBECOM38437.2019.9014102
10.1109/ACCESS.2018.2841987
10.1109/JPROC.2017.2761740
10.3390/info7020025
10.1504/IJSSC.2015.070953
10.1016/j.bjp.2013.12.020
10.1145/3266444.3266452
10.1109/CCWC.2019.8666588
10.1109/TNNLS.2015.2404803
10.1109/iThings/CPSCom.2011.84
10.1007/978-1-4899-7641-3_9
10.1145/3321408.3321588
10.1016/j.knosys.2016.08.020
10.1109/SECON.2016.7506774
10.1109/PCCC.2015.7410342
10.1109/ICMSAO.2015.7152200
10.1016/j.jal.2016.11.018
10.1109/ICFHR.2016.0052
10.1007/978-94-007-7262-5_137
10.1109/ICTS.2017.8265667
10.1016/j.asoc.2015.10.011
10.1109/MCI.2015.2471235
10.1007/978-3-319-49445-6_1
10.1016/j.jksus.2017.05.013
10.1016/j.jnca.2016.08.012
10.1109/COMST.2018.2844341
10.1007/s10462-017-9567-1
10.17487/rfc7252
10.1016/j.jocs.2017.03.006
10.1109/CVPR.2009.5206848
10.3390/s19040974
10.1007/s11277-011-0288-5
10.1007/978-3-319-47075-7_52
10.1016/j.eswa.2013.08.066
10.1126/science.aaa8415
10.1016/j.eswa.2018.03.056
10.1109/CNS.2014.6997469
10.3390/electronics6010005
10.4236/jcc.2017.51010
10.1016/j.chaos.2018.03.010
10.1016/j.adhoc.2012.02.016
10.1016/j.eswa.2014.08.002
10.1109/IBCAST.2014.6778179
10.1109/ICCV.2017.115
10.1145/382912.382923
10.1109/INM.2015.7140344
10.1109/ICC.2014.6883583
10.1109/MCOM.2016.7514162
10.1109/IACS.2018.8355434
10.3390/app7101072
10.1109/ISCC.2015.7405513
10.1016/j.future.2016.12.040
10.1016/j.swevo.2019.100631
10.1109/CMC.2009.172
10.1109/IDAACS.2017.8095118
10.1007/978-3-642-15825-4_10
10.1016/j.jcss.2013.06.016
10.1007/s11227-018-2413-7
10.1016/j.adhoc.2013.04.014
10.1145/2851486
10.1109/WiMOB.2013.6673419
10.1016/j.comnet.2014.11.008
10.1007/978-3-319-21476-4_2
10.1016/j.neunet.2014.09.003
10.1016/j.future.2017.08.043
10.1109/IJCNN.2017.7966342
10.1016/j.procs.2016.06.047
10.1109/ICEDSA.2016.7818534
10.1145/2971648.2971670
10.1109/COMST.2015.2494502
10.14569/IJACSA.2015.060316
10.1007/s12053-016-9476-1
10.1016/j.neucom.2014.08.081
10.1109/MCOM.2015.7263375
10.1109/SPW.2018.00013
10.1007/978-3-642-04492-2_66
10.1109/TCYB.2016.2536638
10.1109/CCNC.2016.7444797
10.1109/ACCESS.2019.2913895
10.1109/CNS.2014.6997468
10.1016/j.inffus.2017.10.006
10.1109/WiCOM.2012.6478720
ContentType Journal Article
Copyright CIMNE, Barcelona, Spain 2020
CIMNE, Barcelona, Spain 2020.
Copyright_xml – notice: CIMNE, Barcelona, Spain 2020
– notice: CIMNE, Barcelona, Spain 2020.
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s11831-020-09496-0
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
EISSN 1886-1784
EndPage 3243
ExternalDocumentID 10_1007_s11831_020_09496_0
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
-~X
.4S
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
203
23M
28-
29~
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
3V.
4.4
406
408
40D
40E
5GY
5VS
67Z
6NX
7WY
8FE
8FG
8FL
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABDZT
ABECU
ABFTV
ABHQN
ABJCF
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DNIVK
DPUIP
DWQXO
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GROUPED_ABI_INFORM_COMPLETE
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HRMNR
HVGLF
HZ~
I-F
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
K60
K6V
K6~
K7-
KDC
KOV
L6V
LLZTM
M0C
M0N
M4Y
M7S
MA-
MK~
N2Q
NB0
NDZJH
NF0
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P2P
P62
P9P
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
PTHSS
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7X
Z7Y
Z7Z
Z83
Z88
ZMTXR
_50
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
JZLTJ
PHGZM
PHGZT
PQGLB
JQ2
ID FETCH-LOGICAL-c319t-1b6a59310674cfde6f3d01d70a2bb5d7b2bceeb46a680e2d6cae16c225ede5113
IEDL.DBID RSV
ISICitedReferencesCount 198
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000580462300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1134-3060
IngestDate Wed Sep 17 23:56:17 EDT 2025
Sat Nov 29 06:21:46 EST 2025
Tue Nov 18 21:57:22 EST 2025
Fri Feb 21 02:49:24 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-1b6a59310674cfde6f3d01d70a2bb5d7b2bceeb46a680e2d6cae16c225ede5113
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-1794-8300
PQID 2532600320
PQPubID 1486352
PageCount 33
ParticipantIDs proquest_journals_2532600320
crossref_primary_10_1007_s11831_020_09496_0
crossref_citationtrail_10_1007_s11831_020_09496_0
springer_journals_10_1007_s11831_020_09496_0
PublicationCentury 2000
PublicationDate 2021-06-01
PublicationDateYYYYMMDD 2021-06-01
PublicationDate_xml – month: 06
  year: 2021
  text: 2021-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Dordrecht
PublicationPlace_xml – name: Dordrecht
PublicationSubtitle State of the Art Reviews
PublicationTitle Archives of computational methods in engineering
PublicationTitleAbbrev Arch Computat Methods Eng
PublicationYear 2021
Publisher Springer Netherlands
Springer Nature B.V
Publisher_xml – name: Springer Netherlands
– name: Springer Nature B.V
References Ham, Kim, Kim, Choi (CR83) 2014; 56
Taivalsaari, Mikkonen (CR186) 2017; 34
Ashraf, Habaebi (CR190) 2015; 49
Mitchell, Chen (CR49) 2014; 46
Lavrova, Pechenkin (CR193) 2015; 7
CR162
Ożadowicz, Grela (CR8) 2017; 10
McHugh (CR188) 2000; 3
Ratner (CR79) 2017
Lee, Bae, Kim (CR21) 2017; 7
CR157
CR158
CR156
Le, Loo, Chai, Aiash (CR41) 2016; 7
Tajbakhsh, Rahmati, Mirzaei (CR115) 2009; 9
Shafiei, Khonsari, Derakhshi, Mousavi (CR58) 2014; 80
Al-Jumeily, Hussain, Fergus (CR150) 2015; 5
CR173
CR174
Farnaaz, Jabbar (CR107) 2016; 89
CR170
Ozay, Esnaola, Vural, Kulkarni, Poor (CR85) 2015; 27
Alhajri, Zagrouba, Al-Haidari (CR161) 2019; 14
Sanchez, Muñoz, Galache, Sotres, Santana, Gutierrez, Ramdhany, Gluhak, Krco, Theodoridis (CR192) 2014; 61
CR166
CR165
Colak, Sagiroglu, Fulli, Yesilbudak, Covrig (CR19) 2016; 54
Liu, Pi (CR80) 2017; 11
Gomes, Barddal, Enembreck, Bifet (CR118) 2017; 50
Zhang, Yang, Chen, Li (CR169) 2018; 42
CR141
Bosman, Iacca, Tejada, Wörtche, Liotta (CR125) 2015; 35
CR137
CR138
CR135
CR136
Ahmad, Basheri, Iqbal, Rahim (CR108) 2018; 6
Kumar, Mangathayaru, Narsimha (CR99) 2017; 12
CR139
Huda, Yearwood, Hassan, Almogren (CR172) 2018; 71
Aziz, Sanaa, Hassanien (CR89) 2017; 24
Mohammadi, Al-Fuqaha, Sorour, Guizani (CR159) 2018; 20
Resende, Drummond (CR103) 2018; 51
Emmanuel, Rayudu (CR18) 2016; 74
Mehmood, Mukherjee, Ahmed, Song, Malik (CR92) 2018; 74
CR152
Li, Ota, Dong (CR132) 2018; 32
CR148
CR146
CR147
CR144
CR142
CR143
Ashraf, Ahmad, Ashraf (CR91) 2018; 2
Song, Ying (CR71) 2015; 27
Elejoste, Angulo, Perallos, Chertudi, Zuazola, Moreno, Azpilicueta, Astrain, Falcone, Villadangos (CR9) 2013; 13
Al-Fuqaha, Khreishah, Guizani, Rayes, Mohammadi (CR11) 2015; 53
Du, Xiong, Wu, Zhang, Zhang, Tao (CR160) 2016; 47
Jadhav, Channe (CR88) 2016; 5
CR116
CR111
Hussain, Kalita (CR113) 2015; 9
CR110
Genkin, Pachmanov, Pipman, Shamir, Tromer (CR61) 2016; 59
Gómez, Huete, Hoyos, Perez, Grigori (CR27) 2013; 21
Wallgren, Raza, Voigt (CR38) 2013; 9
Nweke, Teh, Al-Garadi, Alo (CR151) 2018; 105
CR117
Sze, Chen, Yang, Emer (CR134) 2017; 105
Fiore, Palmieri, Castiglione, De Santis (CR167) 2013; 122
Miorandi, Sicari, De Pellegrini, Chlamtac (CR1) 2012; 10
Sicari, Rizzardi, Grieco, Coen-Porisini (CR5) 2015; 76
CR130
CR126
CR123
CR120
Kandah, Singh, Zhang, Wang (CR56) 2013; 6
CR121
Muhammad, Anjum, Mazhar (CR57) 2015; 111
Feng, Cho, Pedrycz, Fujita, Herawan (CR112) 2016; 111
CR129
Thakkar, Lohiya (CR185) 2020; 167
CR17
CR15
CR14
CR13
Lerman, Bontempi, Markowitch (CR86) 2015; 5
CR10
Biau, Scornet (CR104) 2016; 25
Yerima, Sezer, Muttik (CR124) 2015; 9
Hussein, Khalid (CR12) 2016; 14
Al-Fuqaha, Guizani, Mohammadi, Aledhari, Ayyash (CR24) 2015; 17
Gunupudi, Nimmala, Gugulothu, Gali (CR100) 2017; 74
CR29
Selvi, Shashidara (CR102) 2016; 5
Cintuglu, Mohammed, Akkaya, Uluagac (CR20) 2016; 19
CR26
Schmidhuber (CR65) 2015; 61
CR25
Li, Zhang, Peng, Yang (CR95) 2018; 110
CR22
CR101
CR109
Bandyopadhyay, Sen (CR28) 2011; 58
CR39
CR37
CR36
CR35
CR34
CR33
CR32
Breiman (CR69) 2017
Serpen, Aghaei (CR96) 2018; 22
HaddadPajouh, Dehghantanha, Khayami, Choo (CR153) 2018; 85
Zhang, Li, Wang (CR171) 2019; 7
Oh, Kim, Ro (CR31) 2014; 14
Aburomman, Reaz (CR122) 2016; 38
Jordan, Mitchell (CR62) 2015; 349
CR48
CR47
CR46
CR45
CR44
CR43
Hinton (CR168) 2009; 4
Meddeb (CR23) 2016; 54
CR40
Arora, Varshney (CR127) 2016; 78
Chhaya, Sharma, Bhagwatikar, Kumar (CR16) 2017; 6
Muniyandi, Rajeswari, Rajaram (CR128) 2012; 30
Buczak, Guven (CR105) 2015; 18
CR55
CR53
CR52
CR51
CR50
Zhang, Zhang, Du (CR140) 2016; 4
Fadlullah, Tang, Mao, Kato, Akashi, Inoue, Mizutani (CR133) 2017; 19
Pongle, Chavan (CR42) 2015; 121
CR67
CR66
CR64
CR60
Shakeel, Baskar, Dhulipala, Mishra, Jaber (CR184) 2018; 42
Xiao, Biggio, Nelson, Xiao, Eckert, Roli (CR78) 2015; 160
Tolosana, Vera-Rodriguez, Fierrez, Ortega-Garcia (CR145) 2018; 6
Diro, Chilamkurti (CR155) 2018; 82
Leloglu (CR59) 2016; 5
Borgia (CR3) 2014; 54
Ren, Zhang, Suganthan (CR119) 2016; 11
Brun, Yin, Gelenbe (CR154) 2018; 134
CR77
CR76
CR75
CR74
Saleh, Talaat, Labib (CR97) 2019; 51
CR72
Xie, Huang, Bai, Hu (CR131) 2017; 10
Li, Ma, Jiao (CR163) 2015; 9
CR2
CR4
Gupta, Rawat, Jain, Arora, Dhami (CR70) 2017; 163
Elhag, Fernández, Bawakid, Alshomrani, Herrera (CR114) 2015; 42
CR6
Raza, Wallgren, Voigt (CR30) 2013; 11
CR7
CR87
Meidan, Bohadana, Mathov, Mirsky, Shabtai, Breitenbacher, Elovici (CR164) 2018; 17
Shams, Rizaner (CR81) 2018; 24
Kim, Lee, Kim (CR73) 2014; 41
Liu, Du, Zhang, Zhu, Wang, Guizani (CR84) 2019; 19
Sutton, Barto (CR68) 2018
Aljawarneh, Aldwairi, Yassein (CR90) 2018; 25
CR182
CR180
CR181
Uke, Mahajan, Thool (CR54) 2013; 70
CR98
CR179
CR177
Codella, Nguyen, Pankanti, Gutman, Helba, Halpern, Smith (CR183) 2017; 61
CR94
CR178
CR93
CR175
CR176
Hasan, Nasser, Ahmad, Molla (CR106) 2016; 7
Thaseen, Kumar (CR82) 2017; 29
Goodfellow, Bengio, Courville (CR63) 2016
CR194
CR191
CR189
Lopez-Martin, Carro, Sanchez-Esguevillas, Lloret (CR149) 2017; 5
CR187
L Breiman (9496_CR69) 2017
R Tolosana (9496_CR145) 2018; 6
G Serpen (9496_CR96) 2018; 22
9496_CR129
9496_CR53
9496_CR55
9496_CR2
9496_CR50
9496_CR4
9496_CR52
9496_CR51
V Sze (9496_CR134) 2017; 105
ASA Aziz (9496_CR89) 2017; 24
S Elhag (9496_CR114) 2015; 42
9496_CR136
9496_CR137
9496_CR135
9496_CR130
9496_CR47
9496_CR46
M Mohammadi (9496_CR159) 2018; 20
9496_CR116
9496_CR48
9496_CR117
9496_CR43
9496_CR45
L Sanchez (9496_CR192) 2014; 61
9496_CR44
9496_CR40
9496_CR6
9496_CR7
PM Shakeel (9496_CR184) 2018; 42
J Gómez (9496_CR27) 2013; 21
D Oh (9496_CR31) 2014; 14
P Elejoste (9496_CR9) 2013; 13
9496_CR126
9496_CR123
9496_CR121
9496_CR120
9496_CR109
ZM Fadlullah (9496_CR133) 2017; 19
9496_CR76
9496_CR75
9496_CR77
9496_CR72
9496_CR74
H Xiao (9496_CR78) 2015; 160
H HaddadPajouh (9496_CR153) 2018; 85
N Ashraf (9496_CR91) 2018; 2
M Ozay (9496_CR85) 2015; 27
9496_CR110
9496_CR111
E Selvi (9496_CR102) 2016; 5
Q Zhang (9496_CR169) 2018; 42
9496_CR64
MI Jordan (9496_CR62) 2015; 349
9496_CR67
9496_CR66
Y Liu (9496_CR80) 2017; 11
E Borgia (9496_CR3) 2014; 54
9496_CR60
D Lavrova (9496_CR193) 2015; 7
9496_CR101
9496_CR17
I Ahmad (9496_CR108) 2018; 6
A Le (9496_CR41) 2016; 7
9496_CR14
9496_CR13
9496_CR15
9496_CR10
RS Sutton (9496_CR68) 2018
AP Muniyandi (9496_CR128) 2012; 30
GE Hinton (9496_CR168) 2009; 4
YY Song (9496_CR71) 2015; 27
J Hussain (9496_CR113) 2015; 9
H Li (9496_CR132) 2018; 32
I Goodfellow (9496_CR63) 2016
GR Kumar (9496_CR99) 2017; 12
P Pongle (9496_CR42) 2015; 121
L Li (9496_CR95) 2018; 110
NC Codella (9496_CR183) 2017; 61
HM Gomes (9496_CR118) 2017; 50
9496_CR39
9496_CR36
9496_CR35
9496_CR37
9496_CR32
9496_CR34
9496_CR33
D Miorandi (9496_CR1) 2012; 10
Y Ren (9496_CR119) 2016; 11
R Mitchell (9496_CR49) 2014; 46
SD Jadhav (9496_CR88) 2016; 5
AL Buczak (9496_CR105) 2015; 18
S Uke (9496_CR54) 2013; 70
9496_CR29
9496_CR25
9496_CR26
J Schmidhuber (9496_CR65) 2015; 61
9496_CR22
J McHugh (9496_CR188) 2000; 3
AA Aburomman (9496_CR122) 2016; 38
A Ożadowicz (9496_CR8) 2017; 10
D Genkin (9496_CR61) 2016; 59
MAM Hasan (9496_CR106) 2016; 7
L Chhaya (9496_CR16) 2017; 6
S Sicari (9496_CR5) 2015; 76
G Kim (9496_CR73) 2014; 41
NH Hussein (9496_CR12) 2016; 14
MH Cintuglu (9496_CR20) 2016; 19
A Al-Fuqaha (9496_CR24) 2015; 17
B Gupta (9496_CR70) 2017; 163
RK Gunupudi (9496_CR100) 2017; 74
I Colak (9496_CR19) 2016; 54
X Liu (9496_CR84) 2019; 19
M Emmanuel (9496_CR18) 2016; 74
9496_CR194
S Raza (9496_CR30) 2013; 11
9496_CR191
HH Bosman (9496_CR125) 2015; 35
Y Meidan (9496_CR164) 2018; 17
A Taivalsaari (9496_CR186) 2017; 34
IS Thaseen (9496_CR82) 2017; 29
L Zhang (9496_CR140) 2016; 4
MF Muhammad (9496_CR57) 2015; 111
9496_CR181
9496_CR182
9496_CR180
Y Zhang (9496_CR171) 2019; 7
A Tajbakhsh (9496_CR115) 2009; 9
9496_CR189
9496_CR187
L Wallgren (9496_CR38) 2013; 9
QM Ashraf (9496_CR190) 2015; 49
9496_CR98
A Thakkar (9496_CR185) 2020; 167
F Kandah (9496_CR56) 2013; 6
9496_CR94
9496_CR93
A Mehmood (9496_CR92) 2018; 74
B Ratner (9496_CR79) 2017
9496_CR173
9496_CR170
D Bandyopadhyay (9496_CR28) 2011; 58
HS Ham (9496_CR83) 2014; 56
O Brun (9496_CR154) 2018; 134
9496_CR178
HF Nweke (9496_CR151) 2018; 105
9496_CR179
9496_CR176
9496_CR177
PAA Resende (9496_CR103) 2018; 51
9496_CR174
EA Shams (9496_CR81) 2018; 24
9496_CR175
9496_CR87
H Shafiei (9496_CR58) 2014; 80
A Meddeb (9496_CR23) 2016; 54
R Alhajri (9496_CR161) 2019; 14
A Al-Fuqaha (9496_CR11) 2015; 53
9496_CR162
P Arora (9496_CR127) 2016; 78
SY Yerima (9496_CR124) 2015; 9
D Al-Jumeily (9496_CR150) 2015; 5
9496_CR165
E Leloglu (9496_CR59) 2016; 5
M Xie (9496_CR131) 2017; 10
9496_CR166
B Du (9496_CR160) 2016; 47
N Farnaaz (9496_CR107) 2016; 89
S Aljawarneh (9496_CR90) 2018; 25
M Lopez-Martin (9496_CR149) 2017; 5
9496_CR158
AI Saleh (9496_CR97) 2019; 51
9496_CR156
9496_CR157
L Lerman (9496_CR86) 2015; 5
F Feng (9496_CR112) 2016; 111
9496_CR152
U Fiore (9496_CR167) 2013; 122
G Biau (9496_CR104) 2016; 25
S Lee (9496_CR21) 2017; 7
9496_CR138
9496_CR139
S Huda (9496_CR172) 2018; 71
Y Li (9496_CR163) 2015; 9
9496_CR147
9496_CR148
9496_CR146
9496_CR143
9496_CR144
9496_CR141
9496_CR142
AA Diro (9496_CR155) 2018; 82
References_xml – ident: CR45
– ident: CR22
– ident: CR173
– volume: 163
  start-page: 15
  issue: 8
  year: 2017
  ident: CR70
  article-title: Analysis of various decision tree algorithms for classification in data mining
  publication-title: Int J Comput Appl
– ident: CR74
– ident: CR39
– volume: 6
  start-page: 539
  issue: 4
  year: 2013
  ident: CR56
  article-title: Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks
  publication-title: Secur Commun Netw
– ident: CR51
– ident: CR138
– volume: 38
  start-page: 360
  year: 2016
  ident: CR122
  article-title: A novel SVM-kNN-PSO ensemble method for intrusion detection system
  publication-title: Appl Soft Comput
– ident: CR121
– volume: 46
  start-page: 55
  issue: 4
  year: 2014
  ident: CR49
  article-title: A survey of intrusion detection techniques for cyber-physical systems
  publication-title: ACM Comput Surv
– ident: CR144
– volume: 32
  start-page: 96
  issue: 1
  year: 2018
  ident: CR132
  article-title: Learning IoT in edge: Deep learning for the Internet of Things with edge computing
  publication-title: IEEE Netw
– volume: 34
  start-page: 72
  issue: 1
  year: 2017
  ident: CR186
  article-title: A roadmap to the programmable world: software challenges in the IoT era
  publication-title: IEEE Softw
– year: 2017
  ident: CR69
  publication-title: Classification and regression trees
– ident: CR178
– ident: CR191
– volume: 78
  start-page: 507
  year: 2016
  ident: CR127
  article-title: Analysis of k-means and k-medoids algorithm for big data
  publication-title: Procedia Comput Sci
– volume: 9
  start-page: 105
  issue: 3
  year: 2015
  ident: CR113
  article-title: Understanding network intrusion detection system using OLAP on NSL-KDD dataset
  publication-title: IUP J Comput Sci
– volume: 24
  start-page: 109
  year: 2017
  ident: CR89
  article-title: Comparison of classification techniques applied for network intrusion detection and classification
  publication-title: J Appl Logic
– volume: 18
  start-page: 1153
  issue: 2
  year: 2015
  ident: CR105
  article-title: A survey of data mining and machine learning methods for cyber security intrusion detection
  publication-title: IEEE Commun Surv Tutor
– volume: 14
  start-page: 2417
  issue: 10
  year: 2019
  ident: CR161
  article-title: Survey for anomaly detection of IoT botnets using machine learning auto-encoders
  publication-title: Int J Appl Eng Res
– volume: 121
  start-page: 6989
  issue: 9
  year: 2015
  ident: CR42
  article-title: Real time intrusion and wormhole attack detection in IOT
  publication-title: Int J Comput Appl
– ident: CR109
– ident: CR126
– volume: 41
  start-page: 1690
  issue: 4
  year: 2014
  ident: CR73
  article-title: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
  publication-title: Expert Syst Appl
– ident: CR156
– ident: CR179
– volume: 27
  start-page: 1773
  issue: 8
  year: 2015
  ident: CR85
  article-title: Machine learning methods for attack detection in the smart grid
  publication-title: IEEE Trans Neural Netw Learn Syst
– ident: CR10
– ident: CR33
– ident: CR137
– volume: 42
  start-page: 146
  year: 2018
  ident: CR169
  article-title: A survey on deep learning for big data
  publication-title: Inf Fusion
– ident: CR6
– volume: 9
  start-page: 313
  issue: 6
  year: 2015
  ident: CR124
  article-title: High accuracy android malware detection using ensemble learning
  publication-title: IET Inf Secur
– year: 2017
  ident: CR79
  publication-title: Statistical and machine-learning data mining: techniques for better predictive modeling and analysis of big data
– ident: CR44
– volume: 5
  start-page: 121
  issue: 01
  year: 2016
  ident: CR59
  article-title: A review of security concerns in Internet of Things
  publication-title: J Comput Commun
– volume: 51
  start-page: 48
  issue: 3
  year: 2018
  ident: CR103
  article-title: A survey of random forest based methods for intrusion detection systems
  publication-title: ACM Comput Surv
– volume: 19
  start-page: 446
  issue: 1
  year: 2016
  ident: CR20
  article-title: A survey on smart grid cyber-physical system testbeds
  publication-title: IEEE Commun Surv Tutor
– ident: CR52
– ident: CR139
– ident: CR162
– volume: 5
  start-page: 18042
  year: 2017
  ident: CR149
  article-title: Network traffic classifier with convolutional and recurrent neural networks for Internet of Things
  publication-title: IEEE Access
– volume: 3
  start-page: 262
  issue: 4
  year: 2000
  ident: CR188
  article-title: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
  publication-title: ACM Trans Inf Syst Secur
– volume: 42
  start-page: 193
  issue: 1
  year: 2015
  ident: CR114
  article-title: On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems
  publication-title: Expert Syst Appl
– ident: CR120
– volume: 134
  start-page: 458
  year: 2018
  ident: CR154
  article-title: Deep learning with dense random neural network for detecting attacks against iot-connected home environments
  publication-title: Procedia Comput Sci
– volume: 7
  start-page: 1072
  issue: 10
  year: 2017
  ident: CR21
  article-title: Future of IoT networks: a survey
  publication-title: Appl Sci
– ident: CR148
– ident: CR177
– ident: CR93
– ident: CR87
– volume: 85
  start-page: 88
  year: 2018
  ident: CR153
  article-title: A deep recurrent neural network based approach for Internet of Things malware threat hunting
  publication-title: Fut Gener Comput Syst
– volume: 11
  start-page: 8
  year: 2017
  ident: CR80
  publication-title: KSII Trans Internet Inf Syst
– ident: CR111
– volume: 9
  start-page: 205
  issue: 5
  year: 2015
  ident: CR163
  article-title: A hybrid malicious code detection method based on deep learning
  publication-title: Int J Secur Appl
– volume: 24
  start-page: 1821
  issue: 5
  year: 2018
  ident: CR81
  article-title: A novel support vector machine based intrusion detection system for mobile ad hoc networks
  publication-title: Wireless Netw
– year: 2016
  ident: CR63
  publication-title: Deep learning
– volume: 61
  start-page: 5
  issue: 4/5
  year: 2017
  ident: CR183
  article-title: Deep learning ensembles for melanoma recognition in dermoscopy images
  publication-title: IBM J Res Dev
– ident: CR75
– volume: 50
  start-page: 23
  issue: 2
  year: 2017
  ident: CR118
  article-title: A survey on ensemble learning for data stream classification
  publication-title: ACM Comput Surv
– ident: CR15
– volume: 58
  start-page: 49
  issue: 1
  year: 2011
  ident: CR28
  article-title: Internet of things: applications and challenges in technology and standardization
  publication-title: Wireless Pers Commun
– volume: 5
  start-page: 129
  issue: 3
  year: 2015
  ident: CR150
  article-title: Using adaptive neural networks to provide self-healing autonomic software
  publication-title: Int J Space-Based Situated Comput
– ident: CR116
– ident: CR32
– ident: CR189
– volume: 14
  start-page: 52
  issue: 1
  year: 2016
  ident: CR12
  article-title: A survey of cloud computing security challenges and solutions
  publication-title: Int J Comput Sci Inf Secur
– volume: 70
  start-page: 1099
  issue: 11
  year: 2013
  ident: CR54
  article-title: UML modeling of physical and data link layer security attacks in WSN
  publication-title: Int J Comput Appl
– ident: CR64
– volume: 6
  start-page: 33789
  year: 2018
  ident: CR108
  article-title: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection
  publication-title: IEEE Access
– ident: CR26
– volume: 14
  start-page: 24188
  issue: 12
  year: 2014
  ident: CR31
  article-title: A malicious pattern detection engine for embedded security systems in the Internet of Things
  publication-title: Sensors
– volume: 47
  start-page: 1017
  issue: 4
  year: 2016
  ident: CR160
  article-title: Stacked convolutional denoising auto-encoders for feature representation
  publication-title: IEEE Trans Cybern
– ident: CR143
– volume: 20
  start-page: 2923
  issue: 4
  year: 2018
  ident: CR159
  article-title: Deep learning for IoT big data and streaming analytics: a survey
  publication-title: IEEE Commun Surv Tutor
– ident: CR43
– volume: 74
  start-page: 133
  year: 2016
  ident: CR18
  article-title: Communication technologies for smart grid applications: a survey
  publication-title: J Netw Comput Appl
– ident: CR14
– ident: CR2
– ident: CR37
– ident: CR53
– volume: 10
  start-page: 83
  year: 2017
  ident: CR131
  article-title: The anonymization protection algorithm based on fuzzy clustering for the ego of data in the internet of things
  publication-title: J Electr Comput Eng
– ident: CR194
– volume: 5
  start-page: 150
  issue: 3
  year: 2016
  ident: CR102
  article-title: Enhanced packet dropping algorithm and neighbour node cluster strategy for intrusion detection in MANET
  publication-title: Int J Comput
– ident: CR98
– volume: 30
  start-page: 174
  year: 2012
  ident: CR128
  article-title: Network anomaly detection by cascading k-Means clustering and C4.5 decision tree algorithm
  publication-title: Procedia Eng.
– volume: 89
  start-page: 213
  year: 2016
  ident: CR107
  article-title: Random forest modeling for network intrusion detection system
  publication-title: Procedia Comput Sci
– volume: 27
  start-page: 130
  issue: 2
  year: 2015
  ident: CR71
  article-title: Decision tree methods: applications for classification and prediction
  publication-title: Shanghai Archiv Psychiatry
– ident: CR48
– ident: CR110
– ident: CR7
– ident: CR76
– volume: 105
  start-page: 233
  year: 2018
  ident: CR151
  article-title: Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: state of the art and research challenges
  publication-title: Expert Syst Appl
– volume: 10
  start-page: 1497
  issue: 7
  year: 2012
  ident: CR1
  article-title: Internet of things: vision, applications and research challenges
  publication-title: Ad Hoc Netw
– ident: CR166
– volume: 74
  start-page: 5156
  issue: 10
  year: 2018
  ident: CR92
  article-title: NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks
  publication-title: J Supercomput
– volume: 6
  start-page: 5128
  year: 2018
  ident: CR145
  article-title: Exploring recurrent neural networks for on-line handwritten signature biometrics
  publication-title: IEEE Access
– volume: 12
  start-page: 65
  issue: 1
  year: 2017
  ident: CR99
  article-title: A feature clustering based dimensionality reduction for intrusion detection
  publication-title: IADIS Int J Comput Sci Inf Syst
– volume: 54
  start-page: 40
  issue: 7
  year: 2016
  ident: CR23
  article-title: Internet of things standards: who stands out from the crowd?
  publication-title: IEEE Commun Mag
– volume: 82
  start-page: 761
  year: 2018
  ident: CR155
  article-title: Distributed attack detection scheme using deep learning approach for Internet of Things
  publication-title: Fut Gener Comput Syst
– ident: CR158
– ident: CR135
– ident: CR77
– ident: CR25
– ident: CR182
– ident: CR129
– ident: CR101
– volume: 17
  start-page: 12
  issue: 3
  year: 2018
  ident: CR164
  article-title: N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders
  publication-title: IEEE Pervasive Comput
– volume: 71
  start-page: 66
  year: 2018
  ident: CR172
  article-title: Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks
  publication-title: Appl Soft Comput
– volume: 5
  start-page: 123
  issue: 2
  year: 2015
  ident: CR86
  article-title: A machine learning approach against a masked AES
  publication-title: J Cryptogr Eng
– volume: 29
  start-page: 462
  issue: 4
  year: 2017
  ident: CR82
  article-title: Intrusion detection model using fusion of chi-square feature selection and multi class SVM
  publication-title: J King Saud Univ Comput Inf Sci
– ident: CR170
– ident: CR60
– ident: CR36
– volume: 59
  start-page: 70
  issue: 6
  year: 2016
  ident: CR61
  article-title: Physical key extraction attacks on PCs
  publication-title: Commun ACM
– volume: 49
  start-page: 112
  year: 2015
  ident: CR190
  article-title: Autonomic schemes for threat mitigation in Internet of Things
  publication-title: J Netw Comput Appl
– volume: 10
  start-page: 563
  issue: 3
  year: 2017
  ident: CR8
  article-title: Energy saving in the street lighting control system-a new approach based on the EN-15232 standard
  publication-title: Energ Effi
– ident: CR147
– volume: 54
  start-page: 396
  year: 2016
  ident: CR19
  article-title: A survey on the critical issues in smart grid technologies
  publication-title: Renew Sustain Energy Rev
– volume: 4
  start-page: 22
  issue: 2
  year: 2016
  ident: CR140
  article-title: Deep learning for remote sensing data: a technical tutorial on the state of the art
  publication-title: IEEE Geosci Remote Sens Mag
– volume: 80
  start-page: 644
  issue: 3
  year: 2014
  ident: CR58
  article-title: Detection and mitigation of sinkhole attacks in wireless sensor networks
  publication-title: J Comput Syst Sci
– volume: 42
  start-page: 186
  issue: 10
  year: 2018
  ident: CR184
  article-title: Maintaining security and privacy in health care system using learning based deep-Q-networks
  publication-title: J Med Syst
– ident: CR66
– ident: CR47
– ident: CR72
– volume: 5
  start-page: 1842
  issue: 1
  year: 2016
  ident: CR88
  article-title: Comparative study of K-NN, naive Bayes and decision tree classification techniques
  publication-title: Int J Sci Res
– ident: CR117
– volume: 7
  start-page: 25
  issue: 2
  year: 2016
  ident: CR41
  article-title: A specification-based IDS for detecting attacks on RPL-based network topology
  publication-title: Information
– volume: 11
  start-page: 41
  issue: 1
  year: 2016
  ident: CR119
  article-title: Ensemble classification and regression-recent developments, applications and future directions
  publication-title: IEEE Comput Intell Mag
– volume: 105
  start-page: 2295
  issue: 12
  year: 2017
  ident: CR134
  article-title: Efficient processing of deep neural networks: a tutorial and survey
  publication-title: Proc IEEE
– volume: 22
  start-page: 1101
  issue: 5
  year: 2018
  ident: CR96
  article-title: Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms
  publication-title: Intell Data Anal
– volume: 76
  start-page: 146
  year: 2015
  ident: CR5
  article-title: Security, privacy and trust in Internet of Things: the road ahead
  publication-title: Comput Netw
– ident: CR165
– ident: CR123
– volume: 7
  start-page: 31711
  year: 2019
  ident: CR171
  article-title: Intrusion detection for IoT based on improved genetic algorithm and deep belief network
  publication-title: IEEE Access
– volume: 19
  start-page: 2432
  issue: 4
  year: 2017
  ident: CR133
  article-title: State-of-the-art deep learning: evolving machine intelligence toward tomorrow’s intelligent network traffic control systems
  publication-title: IEEE Commun Surv Tutor
– ident: CR142
– ident: CR94
– volume: 160
  start-page: 53
  year: 2015
  ident: CR78
  article-title: Support vector machines under adversarial label contamination
  publication-title: Neurocomputing
– ident: CR176
– year: 2018
  ident: CR68
  publication-title: Reinforcement learning: an introduction
– volume: 25
  start-page: 152
  year: 2018
  ident: CR90
  article-title: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
  publication-title: J Comput Sci
– volume: 25
  start-page: 197
  issue: 2
  year: 2016
  ident: CR104
  article-title: A random forest guided tour
  publication-title: Test
– volume: 53
  start-page: 72
  issue: 9
  year: 2015
  ident: CR11
  article-title: Toward better horizontal integration among IoT services
  publication-title: IEEE Commun Mag
– volume: 167
  start-page: 636
  year: 2020
  end-page: 645
  ident: CR185
  article-title: A review of the advancement in intrusion detection datasets
  publication-title: Proced Computer Sci
– ident: CR13
– ident: CR187
– volume: 111
  start-page: 198
  issue: 7
  year: 2015
  ident: CR57
  article-title: A critical analysis on the security concerns of Internet of Things (IoT)
  publication-title: Int J Comput Appl
– volume: 9
  start-page: 462
  issue: 2
  year: 2009
  ident: CR115
  article-title: Intrusion detection using fuzzy association rules
  publication-title: Appl Soft Comput
– ident: CR55
– volume: 6
  start-page: 5
  issue: 1
  year: 2017
  ident: CR16
  article-title: Wireless sensor network based smart grid communications: cyber attacks, intrusion detection system and topology control
  publication-title: Electronics
– volume: 110
  start-page: 33
  year: 2018
  ident: CR95
  article-title: Nearest neighbors based density peaks approach to intrusion detection
  publication-title: Chaos Solitons Fractals
– volume: 9
  start-page: 794326
  issue: 8
  year: 2013
  ident: CR38
  article-title: Routing attacks and countermeasures in the RPL-based internet of things
  publication-title: Int J Distrib Sens Netw
– volume: 349
  start-page: 255
  issue: 6245
  year: 2015
  ident: CR62
  article-title: Machine learning: trends, perspectives, and prospects
  publication-title: Science
– volume: 61
  start-page: 217
  year: 2014
  ident: CR192
  article-title: SmartSantander: IoT experimentation over a smart city testbed
  publication-title: Comput Netw
– volume: 13
  start-page: 6492
  issue: 5
  year: 2013
  ident: CR9
  article-title: An easy to deploy street light control system based on wireless communication and LED technology
  publication-title: Sensors
– volume: 7
  start-page: 131
  issue: 3
  year: 2015
  ident: CR193
  article-title: Applying correlation and regression analysis to detect security incidents in the internet of things
  publication-title: Int J Commun Netw Inf Secur
– ident: CR4
– volume: 54
  start-page: 1
  year: 2014
  ident: CR3
  article-title: The Internet of Things vision: key features, applications and open issues
  publication-title: Comput Commun
– ident: CR35
– ident: CR29
– volume: 56
  start-page: 9999
  year: 2014
  ident: CR83
  article-title: Linear SVM-based android malware detection for reliable IoT services
  publication-title: J Appl Math
– volume: 21
  start-page: 132
  year: 2013
  ident: CR27
  article-title: Interaction system based on Internet of Things as support for education
  publication-title: Procedia Comput Sci
– volume: 74
  start-page: 417
  year: 2017
  ident: CR100
  article-title: CLAPP: a self constructing feature clustering approach for anomaly detection
  publication-title: Future Gener Comput Syst
– ident: CR174
– ident: CR46
– ident: CR67
– ident: CR50
– ident: CR157
– ident: CR136
– volume: 122
  start-page: 13
  year: 2013
  ident: CR167
  article-title: Network anomaly detection with the restricted Boltzmann machine
  publication-title: Neurocomputing
– ident: CR181
– volume: 4
  start-page: 5947
  issue: 5
  year: 2009
  ident: CR168
  article-title: Deep belief networks
  publication-title: Scholarpedia
– ident: CR175
– volume: 61
  start-page: 85
  year: 2015
  ident: CR65
  article-title: Deep learning in neural networks: an overview
  publication-title: Neural Netw
– volume: 19
  start-page: 974
  issue: 4
  year: 2019
  ident: CR84
  article-title: Adversarial samples on android malware detection systems for IoT systems
  publication-title: Sensors
– ident: CR152
– volume: 2
  start-page: 512
  issue: 1
  year: 2018
  ident: CR91
  article-title: A comparative study of data mining algorithms for high detection rate in intrusion detection system
  publication-title: Ann Emerg Technol Comput
– volume: 11
  start-page: 2661
  issue: 8
  year: 2013
  ident: CR30
  article-title: SVELTE: real-time intrusion detection in the Internet of Things
  publication-title: Ad Hoc Netw
– ident: CR40
– ident: CR180
– volume: 7
  start-page: 129
  issue: 03
  year: 2016
  ident: CR106
  article-title: Feature selection for intrusion detection using random forest
  publication-title: J Inf Secur
– ident: CR146
– volume: 111
  start-page: 268
  year: 2016
  ident: CR112
  article-title: Soft set based association rule mining
  publication-title: Knowl-Based Syst
– volume: 35
  start-page: 14
  year: 2015
  ident: CR125
  article-title: Ensembles of incremental learners to detect anomalies in ad hoc sensor networks
  publication-title: Ad Hoc Netw
– ident: CR130
– ident: CR17
– ident: CR34
– volume: 17
  start-page: 2347
  issue: 4
  year: 2015
  ident: CR24
  article-title: Internet of things: a survey on enabling technologies, protocols, and applications
  publication-title: IEEE Commun Surv Tutor
– volume: 51
  start-page: 403
  issue: 3
  year: 2019
  ident: CR97
  article-title: A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers
  publication-title: Artif Intell Rev
– ident: CR141
– volume: 4
  start-page: 22
  issue: 2
  year: 2016
  ident: 9496_CR140
  publication-title: IEEE Geosci Remote Sens Mag
  doi: 10.1109/MGRS.2016.2540798
– ident: 9496_CR74
  doi: 10.1109/PCCC.2017.8280489
– ident: 9496_CR116
  doi: 10.1007/978-3-319-21542-6_4
– volume: 61
  start-page: 5
  issue: 4/5
  year: 2017
  ident: 9496_CR183
  publication-title: IBM J Res Dev
  doi: 10.1147/JRD.2017.2708299
– volume: 9
  start-page: 313
  issue: 6
  year: 2015
  ident: 9496_CR124
  publication-title: IET Inf Secur
  doi: 10.1049/iet-ifs.2014.0099
– ident: 9496_CR136
– volume: 6
  start-page: 5128
  year: 2018
  ident: 9496_CR145
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2793966
– volume: 25
  start-page: 197
  issue: 2
  year: 2016
  ident: 9496_CR104
  publication-title: Test
  doi: 10.1007/s11749-016-0481-7
– volume: 30
  start-page: 174
  year: 2012
  ident: 9496_CR128
  publication-title: Procedia Eng.
  doi: 10.1016/j.proeng.2012.01.849
– ident: 9496_CR156
  doi: 10.1109/ARGENCON.2016.7585247
– volume: 46
  start-page: 55
  issue: 4
  year: 2014
  ident: 9496_CR49
  publication-title: ACM Comput Surv
  doi: 10.1145/2542049
– ident: 9496_CR166
  doi: 10.1007/978-3-642-35289-8_32
– ident: 9496_CR189
  doi: 10.5220/0006639801080116
– ident: 9496_CR67
– volume: 122
  start-page: 13
  year: 2013
  ident: 9496_CR167
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2012.11.050
– volume: 54
  start-page: 396
  year: 2016
  ident: 9496_CR19
  publication-title: Renew Sustain Energy Rev
  doi: 10.1016/j.rser.2015.10.036
– ident: 9496_CR37
  doi: 10.1145/2508859.2512494
– ident: 9496_CR121
  doi: 10.1109/ICCUBEA.2015.61
– ident: 9496_CR26
– volume: 5
  start-page: 18042
  year: 2017
  ident: 9496_CR149
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2747560
– ident: 9496_CR111
  doi: 10.1109/CSE-EUC.2017.118
– volume: 134
  start-page: 458
  year: 2018
  ident: 9496_CR154
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2018.07.183
– volume: 6
  start-page: 539
  issue: 4
  year: 2013
  ident: 9496_CR56
  publication-title: Secur Commun Netw
  doi: 10.1002/sec.681
– ident: 9496_CR44
  doi: 10.4018/978-1-5225-0105-3
– volume: 54
  start-page: 1
  year: 2014
  ident: 9496_CR3
  publication-title: Comput Commun
  doi: 10.1016/j.comcom.2014.09.008
– volume: 35
  start-page: 14
  year: 2015
  ident: 9496_CR125
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.07.013
– ident: 9496_CR147
– ident: 9496_CR32
  doi: 10.1109/ICEICT.2016.7879701
– volume: 19
  start-page: 446
  issue: 1
  year: 2016
  ident: 9496_CR20
  publication-title: IEEE Commun Surv Tutor
  doi: 10.1109/COMST.2016.2627399
– ident: 9496_CR123
  doi: 10.1109/ICBDACI.2017.8070818
– volume-title: Deep learning
  year: 2016
  ident: 9496_CR63
– ident: 9496_CR141
  doi: 10.1145/3029806.3029823
– ident: 9496_CR46
  doi: 10.1109/ICNC.2011.6022060
– volume: 49
  start-page: 112
  year: 2015
  ident: 9496_CR190
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2014.11.011
– volume: 32
  start-page: 96
  issue: 1
  year: 2018
  ident: 9496_CR132
  publication-title: IEEE Netw
  doi: 10.1109/MNET.2018.1700202
– volume: 42
  start-page: 186
  issue: 10
  year: 2018
  ident: 9496_CR184
  publication-title: J Med Syst
  doi: 10.1007/s10916-018-1045-z
– volume-title: Reinforcement learning: an introduction
  year: 2018
  ident: 9496_CR68
– ident: 9496_CR129
  doi: 10.1109/GLOCOM.2017.8254027
– volume-title: Statistical and machine-learning data mining: techniques for better predictive modeling and analysis of big data
  year: 2017
  ident: 9496_CR79
– volume: 71
  start-page: 66
  year: 2018
  ident: 9496_CR172
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2018.06.017
– volume: 9
  start-page: 462
  issue: 2
  year: 2009
  ident: 9496_CR115
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2008.06.001
– volume: 17
  start-page: 2347
  issue: 4
  year: 2015
  ident: 9496_CR24
  publication-title: IEEE Commun Surv Tutor
  doi: 10.1109/COMST.2015.2444095
– volume: 22
  start-page: 1101
  issue: 5
  year: 2018
  ident: 9496_CR96
  publication-title: Intell Data Anal
  doi: 10.3233/IDA-173493
– volume: 85
  start-page: 88
  year: 2018
  ident: 9496_CR153
  publication-title: Fut Gener Comput Syst
  doi: 10.1016/j.future.2018.03.007
– ident: 9496_CR45
– volume: 17
  start-page: 12
  issue: 3
  year: 2018
  ident: 9496_CR164
  publication-title: IEEE Pervasive Comput
  doi: 10.1109/MPRV.2018.03367731
– ident: 9496_CR15
  doi: 10.1109/RAIT.2016.7507884
– volume: 27
  start-page: 130
  issue: 2
  year: 2015
  ident: 9496_CR71
  publication-title: Shanghai Archiv Psychiatry
– ident: 9496_CR14
  doi: 10.1109/ICEMIS.2016.7745295
– ident: 9496_CR175
– volume: 50
  start-page: 23
  issue: 2
  year: 2017
  ident: 9496_CR118
  publication-title: ACM Comput Surv
  doi: 10.1145/3054925
– volume: 24
  start-page: 1821
  issue: 5
  year: 2018
  ident: 9496_CR81
  publication-title: Wireless Netw
  doi: 10.1007/s11276-016-1439-0
– ident: 9496_CR146
  doi: 10.1609/aaai.v29i1.9513
– volume: 2
  start-page: 512
  issue: 1
  year: 2018
  ident: 9496_CR91
  publication-title: Ann Emerg Technol Comput
– ident: 9496_CR60
  doi: 10.1145/2381716.2381867
– ident: 9496_CR50
  doi: 10.1109/ICCIC.2013.6724156
– ident: 9496_CR170
– volume: 13
  start-page: 6492
  issue: 5
  year: 2013
  ident: 9496_CR9
  publication-title: Sensors
  doi: 10.3390/s130506492
– volume: 9
  start-page: 105
  issue: 3
  year: 2015
  ident: 9496_CR113
  publication-title: IUP J Comput Sci
– volume: 78
  start-page: 507
  year: 2016
  ident: 9496_CR127
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2016.02.095
– ident: 9496_CR158
  doi: 10.1142/9789813143180_0009
– ident: 9496_CR165
  doi: 10.1109/CISS.2019.8693059
– volume-title: Classification and regression trees
  year: 2017
  ident: 9496_CR69
  doi: 10.1201/9781315139470
– volume: 163
  start-page: 15
  issue: 8
  year: 2017
  ident: 9496_CR70
  publication-title: Int J Comput Appl
– volume: 9
  start-page: 794326
  issue: 8
  year: 2013
  ident: 9496_CR38
  publication-title: Int J Distrib Sens Netw
  doi: 10.1155/2013/794326
– ident: 9496_CR181
– ident: 9496_CR126
– ident: 9496_CR143
– ident: 9496_CR179
  doi: 10.1155/2019/7045862
– volume: 5
  start-page: 123
  issue: 2
  year: 2015
  ident: 9496_CR86
  publication-title: J Cryptogr Eng
  doi: 10.1007/s13389-014-0089-3
– volume: 7
  start-page: 31711
  year: 2019
  ident: 9496_CR171
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2903723
– ident: 9496_CR40
  doi: 10.1109/WD.2011.6098218
– volume: 167
  start-page: 636
  year: 2020
  ident: 9496_CR185
  publication-title: Proced Computer Sci
  doi: 10.1016/j.procs.2020.03.330
– volume: 34
  start-page: 72
  issue: 1
  year: 2017
  ident: 9496_CR186
  publication-title: IEEE Softw
  doi: 10.1109/MS.2017.26
– ident: 9496_CR148
– volume: 4
  start-page: 5947
  issue: 5
  year: 2009
  ident: 9496_CR168
  publication-title: Scholarpedia
  doi: 10.4249/scholarpedia.5947
– volume: 19
  start-page: 2432
  issue: 4
  year: 2017
  ident: 9496_CR133
  publication-title: IEEE Commun Surv Tutor
  doi: 10.1109/COMST.2017.2707140
– volume: 21
  start-page: 132
  year: 2013
  ident: 9496_CR27
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2013.09.019
– ident: 9496_CR117
  doi: 10.1007/978-1-4899-7488-4_293
– ident: 9496_CR120
– volume: 14
  start-page: 24188
  issue: 12
  year: 2014
  ident: 9496_CR31
  publication-title: Sensors
  doi: 10.3390/s141224188
– ident: 9496_CR2
– ident: 9496_CR177
  doi: 10.1109/GLOBECOM38437.2019.9014102
– volume: 6
  start-page: 33789
  year: 2018
  ident: 9496_CR108
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2841987
– volume: 105
  start-page: 2295
  issue: 12
  year: 2017
  ident: 9496_CR134
  publication-title: Proc IEEE
  doi: 10.1109/JPROC.2017.2761740
– volume: 7
  start-page: 25
  issue: 2
  year: 2016
  ident: 9496_CR41
  publication-title: Information
  doi: 10.3390/info7020025
– volume: 5
  start-page: 129
  issue: 3
  year: 2015
  ident: 9496_CR150
  publication-title: Int J Space-Based Situated Comput
  doi: 10.1504/IJSSC.2015.070953
– volume: 61
  start-page: 217
  year: 2014
  ident: 9496_CR192
  publication-title: Comput Netw
  doi: 10.1016/j.bjp.2013.12.020
– ident: 9496_CR75
  doi: 10.1145/3266444.3266452
– ident: 9496_CR174
  doi: 10.1109/CCWC.2019.8666588
– ident: 9496_CR187
– ident: 9496_CR64
– volume: 27
  start-page: 1773
  issue: 8
  year: 2015
  ident: 9496_CR85
  publication-title: IEEE Trans Neural Netw Learn Syst
  doi: 10.1109/TNNLS.2015.2404803
– ident: 9496_CR52
  doi: 10.1109/iThings/CPSCom.2011.84
– ident: 9496_CR77
  doi: 10.1007/978-1-4899-7641-3_9
– ident: 9496_CR101
  doi: 10.1145/3321408.3321588
– volume: 7
  start-page: 131
  issue: 3
  year: 2015
  ident: 9496_CR193
  publication-title: Int J Commun Netw Inf Secur
– volume: 111
  start-page: 198
  issue: 7
  year: 2015
  ident: 9496_CR57
  publication-title: Int J Comput Appl
– volume: 111
  start-page: 268
  year: 2016
  ident: 9496_CR112
  publication-title: Knowl-Based Syst
  doi: 10.1016/j.knosys.2016.08.020
– ident: 9496_CR72
  doi: 10.1109/SECON.2016.7506774
– ident: 9496_CR51
  doi: 10.1109/PCCC.2015.7410342
– ident: 9496_CR17
  doi: 10.1109/ICMSAO.2015.7152200
– volume: 24
  start-page: 109
  year: 2017
  ident: 9496_CR89
  publication-title: J Appl Logic
  doi: 10.1016/j.jal.2016.11.018
– ident: 9496_CR93
– volume: 51
  start-page: 48
  issue: 3
  year: 2018
  ident: 9496_CR103
  publication-title: ACM Comput Surv
– ident: 9496_CR144
  doi: 10.1109/ICFHR.2016.0052
– ident: 9496_CR33
  doi: 10.1007/978-94-007-7262-5_137
– ident: 9496_CR180
– volume: 121
  start-page: 6989
  issue: 9
  year: 2015
  ident: 9496_CR42
  publication-title: Int J Comput Appl
– ident: 9496_CR98
  doi: 10.1109/ICTS.2017.8265667
– volume: 38
  start-page: 360
  year: 2016
  ident: 9496_CR122
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2015.10.011
– volume: 11
  start-page: 41
  issue: 1
  year: 2016
  ident: 9496_CR119
  publication-title: IEEE Comput Intell Mag
  doi: 10.1109/MCI.2015.2471235
– volume: 14
  start-page: 2417
  issue: 10
  year: 2019
  ident: 9496_CR161
  publication-title: Int J Appl Eng Res
– ident: 9496_CR191
– ident: 9496_CR142
  doi: 10.1007/978-3-319-49445-6_1
– volume: 29
  start-page: 462
  issue: 4
  year: 2017
  ident: 9496_CR82
  publication-title: J King Saud Univ Comput Inf Sci
  doi: 10.1016/j.jksus.2017.05.013
– volume: 74
  start-page: 133
  year: 2016
  ident: 9496_CR18
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2016.08.012
– volume: 20
  start-page: 2923
  issue: 4
  year: 2018
  ident: 9496_CR159
  publication-title: IEEE Commun Surv Tutor
  doi: 10.1109/COMST.2018.2844341
– ident: 9496_CR47
– volume: 51
  start-page: 403
  issue: 3
  year: 2019
  ident: 9496_CR97
  publication-title: Artif Intell Rev
  doi: 10.1007/s10462-017-9567-1
– ident: 9496_CR25
  doi: 10.17487/rfc7252
– volume: 25
  start-page: 152
  year: 2018
  ident: 9496_CR90
  publication-title: J Comput Sci
  doi: 10.1016/j.jocs.2017.03.006
– ident: 9496_CR139
  doi: 10.1109/CVPR.2009.5206848
– volume: 5
  start-page: 1842
  issue: 1
  year: 2016
  ident: 9496_CR88
  publication-title: Int J Sci Res
– volume: 19
  start-page: 974
  issue: 4
  year: 2019
  ident: 9496_CR84
  publication-title: Sensors
  doi: 10.3390/s19040974
– volume: 11
  start-page: 8
  year: 2017
  ident: 9496_CR80
  publication-title: KSII Trans Internet Inf Syst
– volume: 58
  start-page: 49
  issue: 1
  year: 2011
  ident: 9496_CR28
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-011-0288-5
– ident: 9496_CR76
– ident: 9496_CR138
– ident: 9496_CR137
  doi: 10.1007/978-3-319-47075-7_52
– volume: 41
  start-page: 1690
  issue: 4
  year: 2014
  ident: 9496_CR73
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2013.08.066
– volume: 349
  start-page: 255
  issue: 6245
  year: 2015
  ident: 9496_CR62
  publication-title: Science
  doi: 10.1126/science.aaa8415
– volume: 105
  start-page: 233
  year: 2018
  ident: 9496_CR151
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2018.03.056
– volume: 9
  start-page: 205
  issue: 5
  year: 2015
  ident: 9496_CR163
  publication-title: Int J Secur Appl
– ident: 9496_CR4
  doi: 10.1109/CNS.2014.6997469
– volume: 6
  start-page: 5
  issue: 1
  year: 2017
  ident: 9496_CR16
  publication-title: Electronics
  doi: 10.3390/electronics6010005
– volume: 5
  start-page: 121
  issue: 01
  year: 2016
  ident: 9496_CR59
  publication-title: J Comput Commun
  doi: 10.4236/jcc.2017.51010
– volume: 110
  start-page: 33
  year: 2018
  ident: 9496_CR95
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2018.03.010
– volume: 10
  start-page: 1497
  issue: 7
  year: 2012
  ident: 9496_CR1
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2012.02.016
– volume: 42
  start-page: 193
  issue: 1
  year: 2015
  ident: 9496_CR114
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2014.08.002
– volume: 7
  start-page: 129
  issue: 03
  year: 2016
  ident: 9496_CR106
  publication-title: J Inf Secur
– ident: 9496_CR29
  doi: 10.1109/IBCAST.2014.6778179
– ident: 9496_CR110
– volume: 10
  start-page: 83
  year: 2017
  ident: 9496_CR131
  publication-title: J Electr Comput Eng
– ident: 9496_CR182
  doi: 10.1109/ICCV.2017.115
– volume: 3
  start-page: 262
  issue: 4
  year: 2000
  ident: 9496_CR188
  publication-title: ACM Trans Inf Syst Secur
  doi: 10.1145/382912.382923
– volume: 70
  start-page: 1099
  issue: 11
  year: 2013
  ident: 9496_CR54
  publication-title: Int J Comput Appl
– ident: 9496_CR34
  doi: 10.1109/INM.2015.7140344
– ident: 9496_CR39
  doi: 10.1109/ICC.2014.6883583
– volume: 54
  start-page: 40
  issue: 7
  year: 2016
  ident: 9496_CR23
  publication-title: IEEE Commun Mag
  doi: 10.1109/MCOM.2016.7514162
– volume: 12
  start-page: 65
  issue: 1
  year: 2017
  ident: 9496_CR99
  publication-title: IADIS Int J Comput Sci Inf Syst
– ident: 9496_CR152
– ident: 9496_CR194
  doi: 10.1109/IACS.2018.8355434
– volume: 7
  start-page: 1072
  issue: 10
  year: 2017
  ident: 9496_CR21
  publication-title: Appl Sci
  doi: 10.3390/app7101072
– ident: 9496_CR7
  doi: 10.1109/ISCC.2015.7405513
– volume: 74
  start-page: 417
  year: 2017
  ident: 9496_CR100
  publication-title: Future Gener Comput Syst
  doi: 10.1016/j.future.2016.12.040
– ident: 9496_CR6
  doi: 10.1016/j.swevo.2019.100631
– ident: 9496_CR48
– ident: 9496_CR130
  doi: 10.1109/CMC.2009.172
– ident: 9496_CR176
  doi: 10.1109/IDAACS.2017.8095118
– ident: 9496_CR135
  doi: 10.1007/978-3-642-15825-4_10
– volume: 80
  start-page: 644
  issue: 3
  year: 2014
  ident: 9496_CR58
  publication-title: J Comput Syst Sci
  doi: 10.1016/j.jcss.2013.06.016
– volume: 74
  start-page: 5156
  issue: 10
  year: 2018
  ident: 9496_CR92
  publication-title: J Supercomput
  doi: 10.1007/s11227-018-2413-7
– ident: 9496_CR157
– volume: 14
  start-page: 52
  issue: 1
  year: 2016
  ident: 9496_CR12
  publication-title: Int J Comput Sci Inf Secur
– volume: 11
  start-page: 2661
  issue: 8
  year: 2013
  ident: 9496_CR30
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2013.04.014
– volume: 59
  start-page: 70
  issue: 6
  year: 2016
  ident: 9496_CR61
  publication-title: Commun ACM
  doi: 10.1145/2851486
– ident: 9496_CR36
  doi: 10.1109/WiMOB.2013.6673419
– volume: 76
  start-page: 146
  year: 2015
  ident: 9496_CR5
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2014.11.008
– ident: 9496_CR87
  doi: 10.1007/978-3-319-21476-4_2
– volume: 61
  start-page: 85
  year: 2015
  ident: 9496_CR65
  publication-title: Neural Netw
  doi: 10.1016/j.neunet.2014.09.003
– volume: 82
  start-page: 761
  year: 2018
  ident: 9496_CR155
  publication-title: Fut Gener Comput Syst
  doi: 10.1016/j.future.2017.08.043
– ident: 9496_CR162
  doi: 10.1109/IJCNN.2017.7966342
– volume: 89
  start-page: 213
  year: 2016
  ident: 9496_CR107
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2016.06.047
– volume: 56
  start-page: 9999
  year: 2014
  ident: 9496_CR83
  publication-title: J Appl Math
– ident: 9496_CR22
  doi: 10.1109/ICEDSA.2016.7818534
– ident: 9496_CR10
  doi: 10.1145/2971648.2971670
– volume: 18
  start-page: 1153
  issue: 2
  year: 2015
  ident: 9496_CR105
  publication-title: IEEE Commun Surv Tutor
  doi: 10.1109/COMST.2015.2494502
– ident: 9496_CR173
– ident: 9496_CR13
  doi: 10.14569/IJACSA.2015.060316
– volume: 10
  start-page: 563
  issue: 3
  year: 2017
  ident: 9496_CR8
  publication-title: Energ Effi
  doi: 10.1007/s12053-016-9476-1
– volume: 160
  start-page: 53
  year: 2015
  ident: 9496_CR78
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2014.08.081
– volume: 53
  start-page: 72
  issue: 9
  year: 2015
  ident: 9496_CR11
  publication-title: IEEE Commun Mag
  doi: 10.1109/MCOM.2015.7263375
– ident: 9496_CR109
  doi: 10.1109/SPW.2018.00013
– ident: 9496_CR35
  doi: 10.1007/978-3-642-04492-2_66
– ident: 9496_CR94
– volume: 47
  start-page: 1017
  issue: 4
  year: 2016
  ident: 9496_CR160
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2016.2536638
– ident: 9496_CR43
  doi: 10.1109/CCNC.2016.7444797
– ident: 9496_CR178
  doi: 10.1109/ACCESS.2019.2913895
– ident: 9496_CR53
  doi: 10.1109/CNS.2014.6997468
– volume: 5
  start-page: 150
  issue: 3
  year: 2016
  ident: 9496_CR102
  publication-title: Int J Comput
– volume: 42
  start-page: 146
  year: 2018
  ident: 9496_CR169
  publication-title: Inf Fusion
  doi: 10.1016/j.inffus.2017.10.006
– ident: 9496_CR55
  doi: 10.1109/WiCOM.2012.6478720
– ident: 9496_CR66
SSID ssj0054992
Score 2.653126
Snippet Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3211
SubjectTerms Applications programs
Deep learning
Domains
Electronic devices
Engineering
Firewalls
Intelligent networks
Internet of Things
Intrusion detection systems
Machine learning
Mathematical and Computational Engineering
Original Paper
Security management
Smart buildings
Smart grid
Smart grid technology
Wireless networks
Wireless sensor networks
Title A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges
URI https://link.springer.com/article/10.1007/s11831-020-09496-0
https://www.proquest.com/docview/2532600320
Volume 28
WOSCitedRecordID wos000580462300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLink Contemporary
  customDbUrl:
  eissn: 1886-1784
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0054992
  issn: 1134-3060
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1NS8MwNOj0oAenU3E6JQdvrtA2Xdp6G5tDQcdwH-xWmo-KIO1Ypxf_vC9palVU0GuTPEred94XQuexdGI7BMvNpYJbngAHhVFASCBBZAZMBEwP7Zvd-sNhMJ-HI1MUlpfZ7mVIUkvqqtgNqA9cX4AGLolKnV1HG6DuAsWO9-NZKX-Vw6NjnA5Rb_7UNqUy38P4rI4qG_NLWFRrm0H9f_-5i3aMdYm7BTnsoTWZNlDdWJrY8HHeQNsf2hDuo9cuLkIEOEvxnc6ulNg0Xn3AcSpwX8pF9WVUFWjmOEvwTX-MwfbFN9nkEiCpfE88XainhLyNx2ZAHi7m_LU1vF45wiU_QNPB1aR3bZmhDBYHbl1ZDqNxJySq85zHEyFpQoTtCN-OXcY6wmcuA73LPBrTwJauoBzIgXIQG1JIsO7IIaqlWSqPEJZE-uBfckFDz4uDhIF4cJhNmOfCYSdsIqfETcRNx3I1OOMpqnotq7uO4K4jfdeR3UQX72cWRb-OX3e3SpRHhnfzyO0Q1bWfuLDcLlFcLf8M7fhv20_QlqsSZPSTTgvVVstneYo2-cvqMV-eaZp-A09P7g4
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1NT8Iw9EXRRD2IokYUtQdvQrIvyuaNoAQiECIf4basa2dMzCAMvfjnfe06p0ZN9Lq2L0vfd98XwGUgzMDw0HKzKA9rDkcHhVFEiCtQZLqMu0wN7Zv2GoOBO5t5Q10UlmTZ7llIUknqvNgNqQ9dX4SGLolMnV2HDQc1lkzkux9NM_krHR4V4zRt-eZPDV0q8z2Mz-ootzG_hEWVtmkX__efe7CrrUvSTMlhH9ZEXIKitjSJ5uOkBDsf2hAewGuTpCECMo9JX2VXCqIbrz6QIObkRohF_mWYF2gmZB6R7s2IoO1LuvPxNUKS-Z5kspBPCUmVjPSAPJLO-asqeK1shEtyCJP27bjVqemhDLUQuXVVMxkN6p4tO885YcQFjWxumLxhBBZjdd5gFkO9yxwaUNcQFqchkgMNUWwILtC6s4-gEM9jcQxE2KKB_mXIqec4gRsxFA8mM2zmWHjY9MpgZrjxQ92xXA7OePLzXsvyrn28a1_dtW-U4er9zCLt1_Hr7kqGcl_zbuJbdVt27bctXK5mKM6Xf4Z28rftF7DVGfd7fq87uDuFbUsmy6jnnQoUVstncQab4cvqMVmeK_p-A3-J8PI
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED90iuiD06k4nZoH39ywX8ta38bmcDjHYB_srTRNKoJ0Y52--M97SVM7RQXxtUmOkrtc7nJ3vwO4DIQZGB5abhblYc3h6KAwigxxBapMl3GXqaZ9k16j33enU2-wUsWvst2zkGRa0yBRmuLl9ZxH13nhG0oiusFIGd0TmUa7DhuObBok_fXhJNPF0vlR8U7Tlu__1NBlM9_T-Hw15fbmlxCpunk6xf__8x7saquTNFMx2Yc1EZegqC1Qos93UoKdFXjCA3hrkjR0QGYxeVBZl4JoQNZHEsSctIWY518GeeFmQmYR6baHBG1i0p2NbpCSzAMl47l8YkiqZKgb55G0_19V0WtlrV2SQxh3bketu5pu1lAL8RQvayajQd2zJSKdE0Zc0MjmhskbRmAxVucNZjG8j5lDA-oawuI0RDGhIaoTwQVaffYRFOJZLI6BCFs00O8MOfUcJ3AjhmrDZIbNHAsXm14ZzIxPfqiRzGVDjWc_x2CWe-3jXvtqr32jDFcfa-YpjsevsysZ-319phPfqtsSzd-2cLiasTsf_pnayd-mX8DWoN3xe93-_SlsWzKHRr36VKCwXLyIM9gMX5dPyeJcifo740z51g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Review+on+Machine+Learning+and+Deep+Learning+Perspectives+of+IDS+for+IoT%3A+Recent+Updates%2C+Security+Issues%2C+and+Challenges&rft.jtitle=Archives+of+computational+methods+in+engineering&rft.au=Thakkar%2C+Ankit&rft.au=Lohiya%2C+Ritika&rft.date=2021-06-01&rft.issn=1134-3060&rft.eissn=1886-1784&rft.volume=28&rft.issue=4&rft.spage=3211&rft.epage=3243&rft_id=info:doi/10.1007%2Fs11831-020-09496-0&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11831_020_09496_0
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1134-3060&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1134-3060&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1134-3060&client=summon