References
- Centenaro, M., C. E. Costa, F. Granelli, C. Sacchi, L. Vangelista. A Survey on Technologies, Standards, and Open Challenges in Satellite IoT. – IEEE Communications Surveys & Tutorials, Vol. 23, 2021, No 3, pp. 1693-1720. DOI: 10.1109/COMST.2021.3078433.
- Aversano, L., M. L. Bernardi, M. Cimitile, R. Pecori. A Systematic Review of Deep Learning Approaches for IoT Security. – Computer Science Review, 2021, No 40, 100389. DOI: 10.1016/j.cosrev.2021.100389.
- Altunay, H. C., Z. Albayrak. A Hybrid CNN+ LSTM-Based Intrusion Detection System for Industrial IoT Networks. – Engineering Science and Technology, an International Journal, Vol. 38, 2023, 101322. DOI: 10.1016/j.jestch.2022.101322.
- Mohy-Eddine, M., A. Guezzaz, S. Benkirane, M. Azrour, Y. Farhaoui. An Ensemble Learning-Based Intrusion Detection Model for Industrial IoT Security. – Big Data Mining and Analytics, Vol. 6, 2023, No 3, pp. 273-287. DOI: 10.26599/BDMA.2022.9020032.
- Woo, S., J. Park, J. Y. Lee, I. S. Kweon. C B A M : Convolutional Block Attention Module. – In: Proc. of Eur. Conf. Comput. Vision, 2018, pp. 3-19. DOI: 10.48550/arXiv.1807.06521.
- Soliman, S., W. Oudah, A. Aljuhani. Deep Learning-Based Intrusion Detection Approach for Securing Industrial Internet of Things. – Alexandria Eng. J., Vol. 81, 2023, pp. 371-383. DOI: 10.1016/j.aej.2023.09.023.
- Hnamte, V., J. Hussain. DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System. – Telematics and Informatics Reports, Vol. 10, 2023, 100053. DOI: 10.1016/j.teler.2023.100053.
- Sahu, S., B. M. Mehtre. Network Intrusion Detection System Using J48 Decision Tree. – In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI’15), 2015, pp. 2023-2026. DOI:10.1109/ICACCI.2015.7275914.
- Chang, Y., W. Li, Z. Yang. Network Intrusion Detection Based on Random Forest and Support Vector Machine. – In: 2017 IEEE International Conference on Computational Science and Engineering (CSE’17) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC’17), Vol. 1, 2017, pp. 635-638. DOI: 10.1109/CSE-EUC.2017.118.
- Koc, L., T. A. Mazzuchi, S. Sarkani. A Network Intrusion Detection System Based on a Hidden Naïve Bayes Multiclass Classifier. – Expert Systems with Applications, Vol. 39, 2012, No 18, pp. 13492-13500. DOI: 10.1016/j.eswa.2012.07.009.
- Şen, S. Y, N. Özkurt. October Convolutional Neural Network Hyperparameter Tuning with Adam Optimizer for ECG Classification. – In: Innovations Intell. Syst. Appl. Conf. (ASYU’20), IEEE, 2020, pp. 1-6. DOI: 10.1109/ASYU50717.2020.9259896.
- Rosay, A., F. Carlier, P. Leroux. MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for the CICIDS2017 Dataset. – In: Machine Learning for Networking: 2nd IFIP TC 6 International Conference, MLN 2019, Paris, France, 3-5 December 2019, Revised Selected Papers, Vol. 2, 2020, pp. 240-254. DOI: 10.1007/978-3-030-45778-5_16.
- Yue, C., L. Wang, D. Wang, R. Duo, X. Nie. An Ensemble Intrusion Detection Method for Train Ethernet Consist Network Based on CNN and RNN. – IEEE Access, Vol. 9, 2021, pp. 59527-59539. DOI: 10.1109/ACCESS.2021.3073413.
- Ullah, F., S. Ullah, G. Srivastava, J. C. W. Li n. IDS-INT: Intrusion Detection System Using Transformer-Based Transfer Learning for Imbalanced Network Traffic. – Digital Commun. Networks, Vol. 10, 2024, No 1, pp. 190-204. DOI: 10.1016/j.dcan.2023.03.008.
- Ullah, S., J. Ahmad, M. A. Khan, M. S. Alshehri, W. Boulila, A. Koubaa, S. U. Jan, M. M. I. Ch. TNN-IDS: Transformer Neural Network-Based Intrusion Detection System for MQTT-Enabled IoT Networks. – Comput. Networks, Vol. 237, 2023, 110072. DOI: 10.1016/j.comnet.2023.110072.
- Jullian, O., B. Otero, E. Rodríguez, N. Gutiérrez, H. Antona, R. Canal. Deep-Learning-Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework. – J. Network Syst. Manage, Vol. 31, 2023, No 2, 33. DOI: 10.1007/s10922-023-09722-7.
- Sana, L., M. M. Nazir, J. Yang, L. Hussain, Y. L. Chen, C. S. Ku, M. Alatiyyah, L. Y. Por. Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection with Vision Transformers. – IEEE Access, 2024. DOI: 10.1109/ACCESS.2024.3404778.
- Chalichalamala, S., N. Govindan, R. Kasarapu. Logistic Regression Ensemble Classifier for Intrusion Detection System in the Internet of Things. – Sensors, Vol. 23, 2023, No 23, 9583. DOI: 10.3390/s23239583.
- Alhenawi, E. A., H. Alazzam, R. Al-Sayyed, O. Abu-Alghanam, O. Adwan. Hybrid Feature Selection Method for Intrusion Detection Systems Based on an Improved Intelligent Water Drop Algorithm. – Cybernetics and Information Technologies, Vol. 22, 2022, No 4, pp. 73-90.
- Wang, S., W. Xu, Y. Liu. Res-TranBiLSTM: An Intelligent Approach for Intrusion Detection in the Internet of Things. – Comput. Networks, Vol. 235, 2023, 109982. DOI: 10.1016/j.comnet.2023.109982.
- Zhang, H. Development of an Intelligent Intrusion Detection System for IoT Networks Using Deep Learning. – Discover Internet of Things, Vol. 5, 2025, No 1, 74. DOI: 10.1007/s43926-025-00177-7.
- Beuran, R. FEDMSE: Semi-Supervised Federated Learning Approach for IoT Network Intrusion Detection. – Computers & Security, Vol. 151, 2025, 104337. DOI: 10.1016/j.cose.2025.104337.
- Hossain, M. A. Deep Learning-Based Intrusion Detection for IoT Networks: A Scalable and Efficient Approach. – Eurasip Journal on Information Security, Vol. 1, 2025, 28. DOI: 10.1186/s13635-025-00202-w.
- TheBoT-IoTDataset (AccessedonOctober 2024). https://www.kaggle.com/datasets/vigneshvenkateswaran/bot-iot
- TheUNSW-NB15 dataset (AccessedonOctober 2024). https://research.unsw.edu.au/projects/unsw-nb15-dataset
- Cascone, L., K. Alnowaiser, A. Alarfaj, E. A. Alabdulqader, M. Umer, B. Alankar. IoT-Based Smart Framework to Predict Air Quality in Congested Traffic Areas Using Sv-Cnn Ensemble and Knn Imputation Model. – Available at SSRN, 4737721. DOI: 10.1016/j.compeleceng.2024.109311.
- Fadlil, A. K. Nearest Neighbor Imputation Performance on Missing Value Data for Graduate User Satisfaction. – Jurnal Rekayasa Sistem Informasi dan Teknologi, Vol. 6, 2022, No 4, pp. 570-576. DOI: 10.59407/jrsit.v1i2.77.
- Ali, P. J. M., R. H. Faraj, E. Koya, P. J. M. Ali, R. H. Faraj. Data Normalization and Standardization: A Technical Report. – Mach. Learn. Tech. Rep., Vol. 1, 2014, No 1, pp. 1-6. DOI: 10.13140/RG.2.2.28948.04489.
- Hnamte, V., J. Hussain. Dependable Intrusion Detection System Using Deep Convolutional Neural Network: A Novel Framework and Performance Evaluation Approach. – Telematics Inf. Rep., Vol 11, 2023, 100077. DOI: 10.1016/j.teler.2023.100077.
- Fares, I., M. AbdElaziz, A. Aseeri, H. Zied, A. Abdellatif. TFKAN: Transformer Based on Kolmogorov-Arnold Networks for Intrusion Detection in IoT Environment. – Egyptian Informatics Journal, Vol. 30, 2025, 100666.
- Zhou, S., X. Li. Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection. – In: 25th International Conference on Pattern Recognition (ICPR’20), 2021, pp. 8148-8155.
