
Besides the developing threat of cyberattacks, cybersecurity is one of the most significant Internet of Things (IoT) regions. While the IoT has formed a novel model where a network of devices and machines is efficient in collaborating and communicating with each other, it is a novel process invention in enterprises. The role of cybersecurity is to mitigate risks for institutions and users by safeguarding data confidentiality across networks. The growing tools and technologies for cybersecurity improve safety in IoT systems. AI is helpful in improving cybersecurity by providing real-time information for faster threat detection, rapid responses, and smarter decisions. Moreover, integrating blockchain (BC) with IoT illustrates promise but encounters threats like performance issues, security vulnerabilities, and scalability limits. Still, BC plays a key part in protecting low-energy IoT devices. In this study, I proposed a novel approach using an Attention Mechanism-Based Recurrent Neural Network and Dimensionality Reduction for Cyber Threat Detection (AMRNN-DRCTD) model. The main goal of the proposed AMRNN-DRCTD model was to enhance the detection system for cyberattacks in IoT networks. I considered possible security breaches in BC and their influence on network processes. At the initial stage, the data normalization applied zero-mean normalization to alter data into a consistent setup. The feature selection process employed the chaotic and terminal strategy-based butterfly optimization algorithm (CTBOA). Furthermore, the proposed AMRNN-DRCTD model utilized the hybrid convolutional neural network and bi-directional long short-term memory with an attention mechanism (CNN-BiLSTM-AM) technique for the classification process. Finally, the Honey Badger Algorithm (HBA)-based hyperparameter selection range was accomplished to optimize the detection outcomes of the CNN-BiLSTM-AM technique. The experimental evaluation of the AMRNN-DRCTD methodology was examined under the BoT-IoT dataset. The performance validation of the AMRNN-DRCTD methodology highlighted a superior accuracy output of 99.28% over existing approaches.
Citation: Randa Allafi. An attention mechanism based recurrent neural network with dimensionality reduction model for cyber threat detection in IoT environment[J]. AIMS Mathematics, 2025, 10(5): 11998-12031. doi: 10.3934/math.2025544
[1] | Yefu Zheng, Jun Xu, Hongzhang Chen . TOPSIS-based entropy measure for intuitionistic trapezoidal fuzzy sets and application to multi-attribute decision making. Mathematical Biosciences and Engineering, 2020, 17(5): 5604-5617. doi: 10.3934/mbe.2020301 |
[2] | Fankang Bu, Jun He, Haorun Li, Qiang Fu . Correction: Interval-valued intuitionistic fuzzy MADM method based on TOPSIS and grey correlation analysis. Mathematical Biosciences and Engineering, 2020, 17(6): 6699-6701. doi: 10.3934/mbe.2020348 |
[3] | Yongfeng Yin, Routing Zhang, Qingran Su . Threat assessment of aerial targets based on improved GRA-TOPSIS method and three-way decisions. Mathematical Biosciences and Engineering, 2023, 20(7): 13250-13266. doi: 10.3934/mbe.2023591 |
[4] | Qiwen Wang, Guibao Song, Xiuxia Yang . Mixed-attitude three-way decision model for aerial targets: Threat assessment based on IF-VIKOR-GRA method. Mathematical Biosciences and Engineering, 2023, 20(12): 21514-21536. doi: 10.3934/mbe.2023952 |
[5] | Han Wu, Junwu Wang, Sen Liu, Tingyou Yang . Research on decision-making of emergency plan for waterlogging disaster in subway station project based on linguistic intuitionistic fuzzy set and TOPSIS. Mathematical Biosciences and Engineering, 2020, 17(5): 4825-4851. doi: 10.3934/mbe.2020263 |
[6] | Haiping Ren, Laijun Luo . A novel distance of intuitionistic trapezoidal fuzzy numbers and its-based prospect theory algorithm in multi-attribute decision making model. Mathematical Biosciences and Engineering, 2020, 17(4): 2905-2922. doi: 10.3934/mbe.2020163 |
[7] | Muhammad Akram, G. Muhiuddin, Gustavo Santos-García . An enhanced VIKOR method for multi-criteria group decision-making with complex Fermatean fuzzy sets. Mathematical Biosciences and Engineering, 2022, 19(7): 7201-7231. doi: 10.3934/mbe.2022340 |
[8] | Bo Sun, Ming Wei, Wei Wu, Binbin Jing . A novel group decision making method for airport operational risk management. Mathematical Biosciences and Engineering, 2020, 17(3): 2402-2417. doi: 10.3934/mbe.2020130 |
[9] | Tahir Mahmood, Zeeshan Ali, Kifayat Ullah, Qaisar Khan, Hussain AlSalman, Abdu Gumaei, Sk. Md. Mizanur Rahman . Complex pythagorean fuzzy aggregation operators based on confidence levels and their applications. Mathematical Biosciences and Engineering, 2022, 19(1): 1078-1107. doi: 10.3934/mbe.2022050 |
[10] | Nian Zhang, Yifan Zhou, Qiang Pan, Guiwu Wei . Multi-attribute decision-making method with triangular fuzzy numbers based on regret theory and the catastrophe progression method. Mathematical Biosciences and Engineering, 2022, 19(12): 12013-12030. doi: 10.3934/mbe.2022559 |
Besides the developing threat of cyberattacks, cybersecurity is one of the most significant Internet of Things (IoT) regions. While the IoT has formed a novel model where a network of devices and machines is efficient in collaborating and communicating with each other, it is a novel process invention in enterprises. The role of cybersecurity is to mitigate risks for institutions and users by safeguarding data confidentiality across networks. The growing tools and technologies for cybersecurity improve safety in IoT systems. AI is helpful in improving cybersecurity by providing real-time information for faster threat detection, rapid responses, and smarter decisions. Moreover, integrating blockchain (BC) with IoT illustrates promise but encounters threats like performance issues, security vulnerabilities, and scalability limits. Still, BC plays a key part in protecting low-energy IoT devices. In this study, I proposed a novel approach using an Attention Mechanism-Based Recurrent Neural Network and Dimensionality Reduction for Cyber Threat Detection (AMRNN-DRCTD) model. The main goal of the proposed AMRNN-DRCTD model was to enhance the detection system for cyberattacks in IoT networks. I considered possible security breaches in BC and their influence on network processes. At the initial stage, the data normalization applied zero-mean normalization to alter data into a consistent setup. The feature selection process employed the chaotic and terminal strategy-based butterfly optimization algorithm (CTBOA). Furthermore, the proposed AMRNN-DRCTD model utilized the hybrid convolutional neural network and bi-directional long short-term memory with an attention mechanism (CNN-BiLSTM-AM) technique for the classification process. Finally, the Honey Badger Algorithm (HBA)-based hyperparameter selection range was accomplished to optimize the detection outcomes of the CNN-BiLSTM-AM technique. The experimental evaluation of the AMRNN-DRCTD methodology was examined under the BoT-IoT dataset. The performance validation of the AMRNN-DRCTD methodology highlighted a superior accuracy output of 99.28% over existing approaches.
It is well established that the breadth of equilibrium fluid phases exhibited by relevant soft matter, such as globular protein solutions and colloidal suspensions, extends well beyond a macroscopic liquid-vapor phase separation, giving rise to inhomogeneous fluids phases composed of clusters or patterned morphologies [1].
At the microscopic level, the origin of such structures is commonly ascribed to the presence of competing interactions acting on different length scales: the propensity to form equilibrium clusters phases — heralding the development of patterned morphologies — stems from the competition between a short-range attraction, favouring agammaegation, and a long-range repulsion, frustrating a complete phase separation [2]. Model potentials of this kind are usually referred to as SALR (Short-range Attractive and Long-range Repulsive) interactions [3].
A flourishing literature clarified many aspects of the physics of SALR models (see e.g. [4,5,6,7,8,9,10,11,12,13,14,15,16,17]), including a broad assessment of their accuracy in describing general aspects of structure and thermodynamics of real protein solutions and colloidal suspensions, see e.g. [18,19,20,22,21,23]. The large interest on this topic is witnessed by several recent reviews [24,25,26,27].
At the structural level, a ubiquitous indication to detect the presence of agammaegates is provided by a peak in the static structure factor S(q), located at a wavenumber qc well below the position of the main diffraction peak, see e.g. [28,29,30,31]. Nonetheless, a live debate concerns the correct relationship between such a low-q peak and the effective microscopic arrangement taking place in the fluid. Initially, this feature was related to the specific existence of equilibrium clusters, as observed both in colloid-polymer mixtures and in protein solutions [28]. However, the presence of such clusters was questioned by other experiments on similar systems [32,33,34]. Later on, a series of coupled dynamical and structural experiments on lysozyme solutions suggested the low-q peak in S(q) to arise from the formation of a generic Intermediate-Range Order (IRO) taking place in the fluid [22,21,23]. Such a situation, to be contrasted with the more specific formation of clusters, corresponds to a less distinct, locally non-homogeneous microscopic arrangement characterized by the presence of agammaegates with sizes ranging from dimers, trimers on, with a fast decrease of associated probability distribution [35,36]. This picture turns back to prior conclusions about the onset of a "medium–range order'' in models for covalently-bonded non-crystalline materials [37,38]. Therein, the presence of the low-q peak was ascribed to a local icosahedral order in the fluid. The original investigations in [22,21,23] prompted most recent studies, investigating dynamical properties of SALR fluids [39,40].
Two different criteria, based on the property of the low-q peak, were proposed to discriminate between IRO and genuine clustering in model SALR fluids. In the first scheme [36], it is argued that clusters (at low density) or cluster-percolated states (at higher densities), are signaled by a height of the low-q peak rising over ∼2.7. This empirical observation closely recalls the Hansen-Verlet criterion for the freezing of simple fluids [41]. As for the second criterion, it is argued in [42] that clustering occurs as far as the thermal correlation length encoded in S(qc) becomes larger than the typical length-scale associated with the long-range repulsion. Recently, we addressed the same issue by using Monte Carlo simulation for a common SALR model, focusing on correlations in the real space, as described by the local density ρ(r) [43,44]. We have shown that, as the attractive strength increases, a threshold is crossed, whereupon a portion of ρ(r) experiences, at long distance, a tiny peculiar rearrangement, consisting in a reversal of trend. In coincidence, S(qc) rapidly rises, in such a way that it goes almost discontinuously well over the threshold S(qc)≈2.7 (in agreement with the criterion of [36]), with the simultaneous appearance of a shoulder in the cluster-size distribution. Based on all such evidence, we argued that modifications observed in real-space correlation and onset of clustering are tightly linked.
In this work, we extend our previous investigation [43,44], to ascertain the worth of Integral Equation Theories (IETs) of the liquid state to study the onset of clustering. The possibility to discriminate on the basis of purely structural indicators the underlying arrangement of SALR fluids, coupled with the use of effective theoretical tools, turns to be especially advantageous in all those cases in which microscopic data are not readily available. Theoretical tools are also beneficial for a wide investigation of clustering conditions in different SALR models upon disparate thermodynamic conditions, a task prohibitively costly to bear by simulations only. We have organized the paper as follows: after introducing our SALR model and IETs (Section 2), we present and discuss our main findings in Section 3. Concluding remarks and perspectives follow in Section 4.
Theoretical calculations concern a standard SALR model, constituted by hard spheres of diameter σ interacting via a potential formed by the sum of two Yukawa contributions of opposite sign (hard-sphere two-Yukawa, HS2Y). Hence, the total interaction between a pair of spheres, v(x) — with x=r/σ as the (reduced) interparticle distance — reads:
βv(x)={∞for x<1−ε exp[−za(x−1)]x+A exp[−zr(x−1)]xfor x ≥1 | (1) |
where β=1/kBT, with T and kB as the temperature and the Boltzmann constant, respectively. Positive parameters ε and A determine the strength of attractive and repulsive contributions respectively, while za and zr (with za>zr), determine their corresponding ranges. We focus on a particular set of HS2Y parameters, widely adopted in previous studies [2,8,9,15,45]: we have fixed za=1, zr=0.5, A=0.5 and let ε move from 0.9 to 1.6. Within our choice, the Mean Spherical Approximation predicts the occurrence of a microphase separation [2], the liquid-vapor coexistence taking over only for ε≳5.
We carry out our study at fixed reduced density ρσ3=0.6, while the temperature is included in the definition of v(x), see Eq 1. Our choice for such a relatively high density allows the fluid to develop spatial correlations extending over relatively large distances. In this way, we observe under optimal conditions the tiny structural rearrangements at the heart of our findings, to be discussed in the next section.
We determine the pair structure of our model by means of two thermodynamically self-consistent integral equations, namely the hybrid mean spherical approximation (HMSA), derived by Zerah and Hansen [46], and the Self-Consistent Integral Equation (SCIE) derived by two of us [47,48,49]. Both approaches provide a closure to the Ornstein–Zernike equation [1], relating the pair correlation function g(x) to the direct correlation function c(x). Thermodynamically self-consistency is ensured by enforcing the equality of compressibilities obtained by two different routes from structure to thermodynamics [1], thank to the mixing parameter f, i.e.:
ρkBTχT=[1−ρσ3∫c(x;f)d3x]−1=S(q=0), | (2) |
where χT=−1/ρ(∂P/∂ρ)−1 is the isothermal compressibility and P is the pressure calculated via the virial theorem [1]. In order to calculate the total correlation function h(x)=g(x)−1 and the structure factor S(q), both theories are solved numerically by the iterative Newton–Raphson method [50], over an extended grid of 214 points with a fine mesh of Δx=0.005. Convergence is assumed when a difference smaller than 10−8 is reached between two consecutive iterations. The mixing parameter f is determined so that Eq 2 is satisfied to within less than one percent.
We also study the onset of clustering in terms of the entropy of the fluid [51]. An approximation for such a property is provided by the pair entropy s2, which involves only g(x):
s2kB=−2πρσ3∫∞0[g(x)lng(x)−g(x)+1]x2dx | (3) |
This expression derives from the expansion of the configurational entropy in terms of multi-body correlations involving two, three and successively more particles [52,53,54]. In simple fluids, the leading term s2 is generally found to account for about 90% of the configurational entropy [54,55,56].
In Figure 1, we show SCIE structural predictions for two different attractive strengths, namely ε=0.9 and 1.6. A low-q peak is visible in the S(q) (A) and becomes more and more pronounced as ε increases. According to [36], an IRO state takes place for ε=0.9 [where S(qc)≈0.2], while a more ordered clustered state occurs for ε=1.6 [where S(qc)>10]. As for g(x), in Figure 1B, the amplitude of the first four coordination shells — and apparently of the fifth one — increases with ε, while the corresponding position shifts to slightly lower distances. In contrast, for ε=1.6, g(x) no longer oscillates around one below x=5 and, as shown in the large view in the inset, next distant neighbors eventually merge into a single oscillation of wavelength ≈9σ.
Since SCIE correctly predicts the typical structural features we documented by MC [43], the question naturally arises so as to whether IETs are able to discriminate — on the basis of local, real-space properties — between a generic intermediate-range order and the more specific onset of clustering. To this purpose, we examine now in detail the structural modifications undergone by h(x), as predicted by SCIE and HMSA, for intermediate attractive strengths. We recall that in[43] we identified the MC clustering threshold as falling at εt=1.47. In Figures 2A and 2B we focus on the amplitude of the fifth neighbor peak of h(x), denoted as h(x5); therein, we see that the behavior of h(x5) contrasts with that of the first four coordination shells in that it does not monotonically increases with ε. Specifically, in Figure 2A SCIE predicts that (i) h(x5) starts to decrease from positive values as ε increases till, for ε=1.33≡ε0, it turns negative and goes on decreasing, pointing to an increase of inhomogeneity in the fluid; apparently, since the fifth shell of neighbors seems to behave as next ones do, one may argue that it is about to merge into the heralding long-range oscillation. However, (ii) for ε=1.545≡εt, h(x5) reaches a minimum and starts rising, going over zero for higher ε values; in this way, the fifth coordination shell eventually contributes to the overall stabilization of the structure formed by the first four shells. This scenario remains unchanged within HMSA in Figure 2B, but for slightly different ε0 (1.375) and εt (1.535) and, as shown in Figure 2C, it faithfully reproduces the MC data [43]; the little anticipation of the MC threshold εt=1.47 does not impair, in our opinion, the quality of our theoretical predictions.To summarize, whatever the method used, a generic behavior of h(x5) can be drawn in Figure 2D. Therein, a threshold value εt is identified, whereupon h(x5) reaches a minimum, leading to the local property:
∂h(x5;ε)∂ε|ε=εt=0 | (4) |
The consequences of our findings on the low-wavevector portion of the structure factor can be clearly appraised from Figure 3. In 3A we see that, as ε approaches εt, the height of the low-q peak, S(qc), slowly grows, with the fluid initially characterized by an intermediate-range order, then becoming progressively more structured. At ε=εt, S(qc) abruptly rises, exactly in correspondence with the real-space evidence that the fifth coordination shell correlates with the preceding ones. In agreement with our MC results [43], at this point the nature of the fluid changes, almost discontinuously, into a clustered state characterized by S(qc)>2.7 [36]. We see in the Figure that SCIE and HMSA results closely agree, and appear slightly delayed with respect to the MC datum [43]; also, theories predict a sharp increase of S(qc) whereas MC shows a more rounded growth of this property. Since S(q=0) is roughly proportional to S(qc) [8], also this property turns to discontinuously rise, as visible from Figure 3B; therein we see moreover that both SCIE and HMSA predict smaller jumps to occur also at ε0.
The moderate increase of compressibility witnesses the development of larger and larger density fluctuations, as the system progresses within an increasingly inhomogeneous arrangement, heralding the onset of clustering.
If we recall Eq 2, we conclude that structural rearrangements within the fluid taking place at ε0 and εt involve corresponding changes in the isothermal compressibility χT. Based on all evidence reported so far, both in real-space and reciprocal-space, we conclude that the observed atypical reversal of trend in the pair correlation faithfully witnesses the onset of clustering. The overall phenomenology observed by MC simulations is positively reproduced by IETs.
In agreement with our MC results [43], refined IETs predict a discontinuity in S(qc) at ε=εt. At this stage, an interesting issue concerns the origin, within the theoretical framework, of the observed discontinuities. Indeed, as seen in Figure 4, successive steps in the gain of inhomogeneity, observed at ε0 and εt, are marked by clear-cut jumps in the mixing parameter f. Consequently, it is the very fulfillment of the thermodynamic consistency condition (Eq 2) — enforced by any refined IET — that allows us to identify the observed structural changes. In the case f=1, both SCIE and HMSA reduce to the thermodynamically inconsistent HyperNetted chain (HNC) approximation. We refer the reader to our recent work [44] for an extended analysis of HNC predictions concerning the HS2Y model of Eq 1 within various parameterizations including the one employed in this work. We simply note here that, consistently with the assumption of a constant f value, HNC is unable to capture the discontinuous changes in the structural properties documented by MC [43].
We finally turn to the pair entropy s2 of (Eq 3), a global property found to be a fingerprint to distinguish between liquid-like and solid-like environments on the one hand, and between different crystal structures on the other hand [57]. More generally, in simple liquids s2 decreases as the system becomes progressively more structured. As seen from Figure 5, this statement holds also for our model, during the clustering process. In facts, as ε increases, the formation of a further coordination shell contributes to the overall stabilization of the local environment around a given particle, provided by the existing shells of neighbours; as we have seen, this structural rearrangement abruptly triggers the clustering process, with the consequence that a drastic reduction of available configurational states affects all those particles forming agammaegates. This mechanism is exactly reflected in the rapid, almost discontinuous decrease of pair entropy visible in Figure 5. As ε increases, both structural rearrangements affecting h(x) at ε0 and εt have visible effects on s2: a first discontinuity is followed, by further increasing the attractive strength, by a second discontinuous jump observed at ε=εt to be ascribed to the entropy change related to the onset of clustering. In a previous study [14], we identified a possible signature of the arising IRO peak in HS2Y models, as a jump in the entropy, based on chemical potential calculations [58,59,60,61]; therein, we surmised that the loss of available space within the clusters is tempered by a gain of accessible space between clusters, mitigating overall the decrease of the total entropy due to the decrease of the main contribution provided by s2. In general, the search for thermodynamic signatures of clustering could greatly help our understanding of these systems, favouring as well our capability of experimentally identifying agammaegation processes.
Refined thermodynamically self-consistent integral equations are shown to reproduce a mechanism, previously unearthed by MC [43], governing the clustering process in a model SALR fluid. Refined IETs, designed a priori for the study of the liquid state, are able to capture the structure of such a system across the clustering threshold. In a previous study [14], we documented the existence of small simultaneous discontinuities of several thermodynamic and structural properties of the same pair potential (but within different parameterizations), under physical conditions close to the early development of an intermediate-range order in the fluid. In comparison, discontinuities presently observed when passing from an IRO to a clustered state are neater. We speculate that in model colloids with competing interactions, the present mechanism is a generic feature intrinsic to the clustering process.
Possibly due to the fact that the scale at which our effect shows up is rather small, this process was overlooked in other studies using the same HS2Y model with identical parameters, but for those we already published [43,44]. As for the experimental side, the pair potential adopted in this work provides a reasonable description of dispersions of charged colloidal particles in the presence of a depletant, e.g. non-adsorbing polymer-coils, in which ε is proportional to the polymer concentration, the radius of gyration governs za, and the parameters entering the long-range repulsion depend on the electrostatic properties of the mixture [62]. Hence, an experimental realization of our setup, to gauge our findings against, would consist of a colloidal suspension, where all chemical and physical conditions are held fixed, but for the concentration of the polymer, so as to control the depletion potential strength. Similarly to what observed for simulations, also in experiments the process could be difficult to be traced in the neighborhood of the fifth coordination shell. Nevertheless, this limitation could be overcome since we have preliminary evidence that, for lower densities, the formation of clusters is signaled by reversals of trend occurring at shorter distances, making them easier to be detected.
The authors wish to thank Prof. Jean-Pierre Hansen, Prof. L. Lloyd Lee and Prof. Gerhard Kahl for their advices on the manuscript and fruitful discussions. We gratefully acknowledge the computer time made available at the Pôle Messin de Modélisation et Simulation (PMMS) and within the PO-FESR 2007-2013 MedNETNA (Mediterranean Network for Emerging Nanomaterials) Project.
All the authors declare no conflict of interest regarding the publication of this article.
[1] |
S. Mishra, The impact of AI-based cyber security on the banking and financial sectors, J. Cybersecurity Inform. Manage., 14 (2024). https://doi.org/10.54216/JCIM.140101 doi: 10.54216/JCIM.140101
![]() |
[2] | S. F. Rabooki, B. Li, F. G. Febrinanto, C. Peng, E. Naghizade, F. Han, et al., GraphDART: Graph distillation for efficient advanced persistent threat detection, arXiv preprin, 2025. https://doi.org/10.48550/arXiv.2501.02796 |
[3] |
Y. M. Tashtoush, D. A. Darweesh, G. Husari, O. A. Darwish, Y. Darwish, L. B. Issa, et al, Agile approaches for cybersecurity systems, IoT, and intelligent transportation, IEEE Access, 10 (2021), 1360−1375. https://doi.org/10.1109/ACCESS.2021.3136861 doi: 10.1109/ACCESS.2021.3136861
![]() |
[4] | A. Abdullah, R. Hamad, M. Abdulrahman, H. Moala, S. Elkhediri, CyberSecurity: A review of internet of things (IoT) security issues, challenges and techniques, In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), IEEE, 2019, 1−6. https://doi.org/10.1109/CAIS.2019.8769560 |
[5] | M. Roopak, G. Y. Tian, J. Chambers, Deep learning models for cyber security in IoT networks, In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC), IEEE, 2019. https://doi.org/10.1109/CCWC.2019.8666588 |
[6] |
R. O. Andrade, S. G. Yoo, L. Tello-Oquendo, I. Ortiz-Garcés, A comprehensive study of the IoT cybersecurity in smart cities, IEEE Access, 8 (2020), 228922−228941. https://doi.org/10.1109/ACCESS.2020.3046442 doi: 10.1109/ACCESS.2020.3046442
![]() |
[7] |
M. Kuzlu, C. Fair, O. Guler, Role of artificial intelligence in the Internet of Things (IoT) cybersecurity, DIOT, 1 (2021), 7. https://doi.org/10.1007/s43926-020-00001-4 doi: 10.1007/s43926-020-00001-4
![]() |
[8] |
K. Kimani, V. Oduol, K. Langat, Cyber security challenges for IoT-based smart grid networks, Int. J. Crit. Infr. Prot., 25 (2019), 36−49. https://doi.org/10.1016/j.ijcip.2019.01.001 doi: 10.1016/j.ijcip.2019.01.001
![]() |
[9] |
I. Lee, Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management, Future Internet, 12 (2020), 157. https://doi.org/10.3390/fi12090157 doi: 10.3390/fi12090157
![]() |
[10] | A. Maseleno, Design of optimal machine learning based cybersecurity intrusion detection systems, J. Cybersecurity Inform. Manage., 1 (2019). |
[11] |
E. Gelenbe, M. Nakip, IoT network cybersecurity assessment with the associated random neural network, IEEE Access, 2023. https://doi.org/10.1109/ACCESS.2023.3297977 doi: 10.1109/ACCESS.2023.3297977
![]() |
[12] | D. M. Mirzaaxmedov, Cybersecurity risk analysis in the IoT: A systematic review, Econ. Soc., 7 (2024), 145−151. |
[13] |
H. Zeng, M. Yunis, A. Khalil, N. Mirza, Towards a conceptual framework for AI-driven anomaly detection in smart city IoT networks for enhanced cybersecurity, J. Innov. Knowl., 9 (2024), 100601. https://doi.org/10.1016/j.jik.2024.100601 doi: 10.1016/j.jik.2024.100601
![]() |
[14] |
P. Kaliyaperumal, S. Periyasamy, M. Thirumalaisamy, B. Balusamy, F. Benedetto, A novel hybrid unsupervised learning approach for enhanced cybersecurity in the IoT, Future Internet, 16 (2024), 253. https://doi.org/10.3390/fi16070253 doi: 10.3390/fi16070253
![]() |
[15] | A. L. Yakubu, Cybersecurity in the Internet of Things: Securing the connected world, Fac. Nat. Appl. Sci. J. Comput. Appl., 2 (2024), 100−104. |
[16] | D. R. N. Pitty, V. Jain, M. Tamilselvam, D. Haripriya, S. Bansal, Cybersecurity challenges in the era of the Internet of Things (IoT): Developing robust frameworks for securing connected devices, Libr. Prog. Int., 44 (2024), 5644−5653. |
[17] |
A. Adewuyi, A. A. Oladele, P. U. Enyiorji, O. O. Ajayi, T. E. Tsambatare, K. Oloke, et al., The convergence of cybersecurity, Internet of Things (IoT), and data analytics: Safeguarding smart ecosystems, World J. Adv. Res. Rev., 23 (2024), 379−394. https://doi.org/10.30574/wjarr.2024.23.1.1993 doi: 10.30574/wjarr.2024.23.1.1993
![]() |
[18] |
K. S. Prasad, E. L. Lydia, M. V. Rajesh, K. Radhika, J. V. N. Ramesh, N. Neelima, et al., Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks, Sci. Rep., 14 (2024), 30833. https://doi.org/10.1038/s41598-024-81162-y doi: 10.1038/s41598-024-81162-y
![]() |
[19] |
S. Markkandeyan, A. D. Ananth, M. Rajakumaran, R. G. Gokila, R. Venkatesan, B. Lakshmi, Novel hybrid deep learning based cyber security threat detection model with optimization algorithm, Cyber Secur. Appl., 3 (2025), 100075. https://doi.org/10.1016/j.csa.2024.100075 doi: 10.1016/j.csa.2024.100075
![]() |
[20] |
D. M. Dhanvijay, M. M. Dhanvijay, V. H. Kamble, Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IoT networks, Cyber Secur. Appl., 3 (2025), 100088. https://doi.org/10.1016/j.csa.2025.100088 doi: 10.1016/j.csa.2025.100088
![]() |
[21] | S. Misra, A step by step guide for choosing project topics and writing research papers in ICT related disciplines, In: Misra, S., Muhammad-Bello, B. (eds) Information and Communication Technology and Applications. ICTA 2020, Communications in Computer and Information Science, Springer, Cham, 3 (2021), 727−744. https://doi.org/10.1007/978-3-030-69143-1_55 |
[22] | E. A. Adeniyi, R. O. Ogundokun, S. Misra, J. B. Awotunde, K. M. Abiodun, Enhanced security and privacy issue in multi-tenant environment of green computing using blockchain technology, In: Blockchain applications in the smart era, Springer, Cham, 2022, 65−83. https://doi.org/10.1007/978-3-030-89546-4_4 |
[23] |
W. Guo, S. Liu, L. Weng, X. Liang, Power grid load forecasting using a CNN-LSTM network based on a multi-modal attention mechanism, Appl. Sci., 15 (2025), 2435. https://doi.org/10.3390/app15052435 doi: 10.3390/app15052435
![]() |
[24] | H. Zhang, D. Zhu, Y. Gan, S. Xiong, End-to-end learning-based study on the Mamba-ECANet model for data security intrusion detection, J. Inform. Technol. Policy, 2024, 1−17. https://doi.org/10.62836/jitp.v1i1.219 |
[25] |
Y. Wu, Z. Zang, X. Zou, W. Luo, N. Bai, Y. Xiang, et al., Graph attention and Kolmogorov–Arnold network based smart grids intrusion detection, Sci. Rep., 15 (2025), 8648. https://doi.org/10.1038/s41598-025-88054-9 doi: 10.1038/s41598-025-88054-9
![]() |
[26] | L. Sana, M. M. Nazir, J. Yang, L. Hussain, Y. L. Chen, C. S. Ku, et al., Securing the IoT cyber environment: Enhancing intrusion anomaly detection with vision transformers, IEEE Access, 2024. https://doi.org/10.1109/ACCESS.2024.3404778 |
[27] | H. Mancy, Q. H. Naith, SwinIoT: A hierarchical transformer-based framework for behavioral anomaly detection in IoT-Driven smart cities, IEEE Access, 2025. https://doi.org/10.1109/ACCESS.2025.3551207 |
[28] |
J. Huang, Z. Chen, A. Z. Liu, H. Zhang, H. X. Long, Improved intrusion detection based on hybrid deep learning models and federated learning, Sensors, 24 (2024), 4002. https://doi.org/10.3390/s24124002 doi: 10.3390/s24124002
![]() |
[29] |
C. Su, J. Huang, S. Dong, Y. He, J. Li, L. Hu, et al., Transformer-gate recurrent unit-based hourly purified natural gas prediction algorithm, Processes, 13 (2025), 116. https://doi.org/10.3390/pr13010116 doi: 10.3390/pr13010116
![]() |
[30] | X. Ru, An improved butterfly optimization algorithm for numerical optimization and parameter identification of photovoltaic model, Eng. Let., 2025. |
[31] |
M. Lin, Y. Luo, S. Chen, Z. Qiu, Z. Dai, Low-voltage biological electric shock fault diagnosis based on the attention mechanism fusion parallel convolutional neural network/bidirectional long short-term memory model, Mathematics, 12 (2024), 3984. https://doi.org/10.3390/math12243984 doi: 10.3390/math12243984
![]() |
[32] |
U. I. Maijeddah, M. Abdullahi, I. H. Hassan, A hybrid transfer learning model with optimized SVM using honey badger optimization algorithm for multi-class lung cancer classification, Sci. World J., 19 (2024), 977−986. https://doi.org/10.4314/swj.v19i4.10 doi: 10.4314/swj.v19i4.10
![]() |
[33] | https://research.unsw.edu.au/projects/bot-iot-dataset |
[34] | https://research.unsw.edu.au/projects/toniot-datasets |
[35] |
I. Tareq, B. M. Elbagoury, S. El-Regaily, E. S. M. El-Horbaty, Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT datasets using DL in cybersecurity for IoT, Appl. Sci., 12 (2022), 9572. https://doi.org/10.3390/app12199572 doi: 10.3390/app12199572
![]() |
[36] |
I. Katib, M. Ragab, Blockchain-assisted hybrid Harris Hawks optimization based deep DDoS attack detection in the IoT environment, Mathematics, 11 (2023), 1887. https://doi.org/10.3390/math11081887 doi: 10.3390/math11081887
![]() |
[37] |
M. Zeeshan, Q. Riaz, M. A. Bilal, M. K. Shahzad, H. Jabeen, S. A. Haider, et al., Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT data-sets, IEEE Access, 10 (2021), 2269−2283. https://doi.org/10.1109/ACCESS.2021.3137201 doi: 10.1109/ACCESS.2021.3137201
![]() |
[38] | C. Yang, L. Wu, J. Xu, Y. Ren, B. Tian, Z. Wei, Graph learning framework for data link anomaly detection, IEEE Access, 2024. https://doi.org/10.1109/ACCESS.2024.3445533 |
1. | Jing Gao, Zhenfeng Wang, Zhanwu Wang, Chao Wang, Runkai Zhang, Guangyin Xu, Xin Wu, Macro-site selection and obstacle factor extraction of biomass cogeneration based on comprehensive weight method of Game theory, 2022, 8, 23524847, 14416, 10.1016/j.egyr.2022.10.409 | |
2. | Hui Teng, Syed Hassan Ahmed, Construction and Drug Evaluation Based on Convolutional Neural Network System Optimized by Grey Correlation Analysis, 2021, 2021, 1687-5273, 1, 10.1155/2021/2794588 | |
3. | Tao Sun, Rongchao Jiang, Haixia Sun, Dawei Liu, Zhenkuan Pan, Multiscale uncertainty propagation analysis and reliability optimization of the CFRP crossbeam of the twist beam axle, 2023, 242, 00207403, 108022, 10.1016/j.ijmecsci.2022.108022 | |
4. | Shuai Wang, Jianghui Wen, Haijian Li, Congjun Rao, Xiaohua Zhao, A Novel Fuzzy Comprehensive Evaluation Model for Application Effect of Connected Vehicle System in a Tunnel Scenario, 2022, 24, 1562-2479, 1986, 10.1007/s40815-022-01254-7 | |
5. | Huchang Liao, Jiayi Wang, Ming Tang, Abdullah Al-Barakati, An Overview of Interval Analysis Techniques and Their Fuzzy Extensions in Multi-Criteria Decision-Making: What’s Going on and What’s Next?, 2023, 1562-2479, 10.1007/s40815-022-01448-z | |
6. | Yingjie Hu, Shouzhen Zeng, Llopis-Albert Carlos, Kifayat Ullah, Yuqi Yang, Social Network Group Decision-Making Method Based on Q-Rung Orthopair Fuzzy Set and Its Application in the Evaluation of Online Teaching Quality, 2021, 10, 2075-1680, 168, 10.3390/axioms10030168 | |
7. | Jing Meng, Xinyu Zhang, Xiaoyu Tan, 2022, Evaluation system of short video influence based on TOPSIS-Kmeans method, 978-1-6654-6533-5, 1989, 10.1109/CAC57257.2022.10055820 | |
8. | Jing Wang, Qiang Cai, Guiwu Wei, Ningna Liao, An Extended EDAS Approach Based on Cumulative Prospect Theory for Multiple Attributes Group Decision Making with Interval-Valued Intuitionistic Fuzzy Information, 2024, 0868-4952, 421, 10.15388/24-INFOR547 | |
9. | Wenping Fan, Xueyan Song, Mengnan Liu, Baoyan Shan, Mingliang Ma, Yan Liu, Spatio-temporal evolution of resources and environmental carrying capacity and its influencing factors: A case study of Shandong Peninsula urban agglomeration, 2023, 234, 00139351, 116469, 10.1016/j.envres.2023.116469 | |
10. | Yao Ji, Daming Gao, Quanli Liu, Jing Su, Yue Liu, Jian Zhao, Yanmei Yang, Yu Fu, Guohe Huang, An integrated framework for agricultural non-point source pollution control technology evaluation: Application of an improved multiple attribute decision making method, 2023, 229, 09574174, 120319, 10.1016/j.eswa.2023.120319 | |
11. | Zuo Xu, Light sensors and infrared radiation images based on artificial intelligence data mining for football performance evaluation and prediction, 2025, 58, 24519049, 103250, 10.1016/j.tsep.2025.103250 |