[2]
S. Jeschke, C. Brecher, T. Meisen, D. Özdemir, and T. Eschert, Industrial Internet of Things and cyber manufacturing systems, in Industrial Internet of Things, D. Serpanos and M. Wolf, eds. New York, NY, USA: Springer, 2017, pp. 3–19.
[10]
A. Borkar, A. Donode, and A. Kumari, A survey on intrusion detection system (IDS) and internal intrusion detection and protection system (IIDPS), in Proc. 2017 Int. Conf. Inventive Computing and Informatics (ICICI), Coimbatore, India, 2018, pp. 949–953.
[11]
M. Douiba, S. Benkirane, A. Guezzaz, and M. Azrour, Anomaly detection model based on gradient boosting and decision tree for IoT environments security, J. Reliab. Intell. Environ., pp. 1–12, 2022.
[12]
T. T. Bhavani, M. K. Rao, and A. M. Reddy, Network intrusion detection system using random forest and decision tree machine learning techniques, in Proc. 2022 Int. Conf. Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India, 2022, pp. 1–9.
[14]
Y. Jiang, W. Wang, and C. Zhao, A machine vision-based realtime anomaly detection method for industrial products using deep learning, in Proc. 2019 Chinese Automation Congress (CAC), Hangzhou, China, 2020, pp. 4842–4847.
[15]
M. A. Istiake Sunny, M. M. S. Maswood, and A. G. Alharbi, Deep learning-based stock price prediction using LSTM and Bi-directional LSTM model, in Proc. 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 2020, pp. 87–92.
[16]
L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, A novel network intrusion detection system based on CNN, in Proc. 2020 Eighth Int. Conf. Advanced Cloud and Big Data (CBD), Taiyuan, China, 2021, pp. 243–247.
[19]
D. Wang, B. Ding, and D. Feng, Meta reinforcement learning with generative adversarial reward from expert knowledge, in Proc. 2020 IEEE 3rd Int. Conf. Information Systems and Computer Aided Education (ICISCAE), Dalian, China, 2020, pp. 1–7.
[23]
M. Al-Kasassbeh, M. A. Abbadi, and A. M. Al-Bustanji, LightGBM algorithm for malware detection, Intell. Comput., pp. 391–403, 2020.
[27]
A. Guezzaz, M. Azrour, S. Benkirane, M. Mohy-Eddine, H. Attou, and M. Douiba, A lightweight hybrid intrusion detection framework using machine learning for edge-based IIoT security, Int. Arab J. Inf. Technol., vol. 19, no. 5, 2022.
[28]
M. Mohy-Eddine, A. Guezzaz, S. Benkirane, and M. Azrour, An effective intrusion detection approach based on ensemble learning for IIoT edge computing, J. Comput. Virol. Hacking Tech., pp. 1–13, 2022.
[29]
C. Zhou and R. C. Paffenroth, Anomaly detection with robust deep autoencoders, in Proc. 23rd ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Halifax, Canada, 2017, pp. 665–674.
[30]
D. J. Murray-Smith, Modelling and Simulation of Integrated Systems in Engineering. Amsterdam, the Netherlands: Elsevier, 2012.
[31]
M. A. Istiake Sunny, M. M. S. Maswood, and A. G. Alharbi, Deep learning-based stock price prediction using LSTM and Bi-directional LSTM model, in Proc. 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 2020, pp. 87–92.
[42]
N. Sharma, I. Kaushik, B. Bhushan, S. Gautam, and A. Khamparia, Applicability of WSN and biometric models in the field of healthcare, in Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks, K. Martin Sagayam, B. Bhushan, A. D. Andrushia, and V. H. C. Albuquerque, eds. Hershey, PA, USA: IGI Global, 2020, pp. 304–329.
[43]
A. Khamparia, P. K. Singh, P. Rani, D. Samanta, A. Khanna, and B. Bhushan, An Internet of health things-driven deep learning framework for detection and classification of skin cancer using transfer learning, Trans. Emerg. Telecommun. Technol., vol. 32, no. 7, p. e3963, 2021.
[44]
S. Goyal, N. Sharma, B. Bhushan, A. Shankar, and M. Sagayam, IoT enabled technology in secured healthcare: Applications, challenges and future directions, in Cognitive Internet of Medical Things for Smart Healthcare, A. E. Hassanien, A. Khamparia, D. Gupta, K. Shankar, and A. Slowik, eds. New York, NY, USA: Springer, 2021, pp. 25–48.
[46]
Z. Khan, A. Anjum, and S. L. Kiani, Cloud based big data analytics for smart future cities, in Proc. 2013 IEEE/ACM 6th Int. Conf. Utility and Cloud Computing, Dresden, Germany, 2014, pp. 381–386.
[50]
J. Dutta, C. Chowdhury, S. Roy, A. I. Middya, and F. Gazi, Towards smart city: Sensing air quality in city based on opportunistic crowd-sensing, in Proc. 18th Int. Conf. Distributed Computing and Networking, Hyderabad, India, 2017.
[52]
R. Varejão Andreão, M. Athayde, J. Boudy, P. Aguilar, I. de Araujo, and R. Andrade, Raspcare: A telemedicine platform for the treatment and monitoring of patients with chronic diseases, in Assistive Technologies in Smart Cities, A. R. G. Ramirez and M. G. G. Ferreira, eds. London, UK: IntechOpen, 2018.
[55]
F. Tao, J. Cheng, and Q. Qi, IIHub: An industrial internet-of-things hub toward smart manufacturing based on cyber-physical system, IEEE Trans. Ind. Inform., vol. 14, no. 5, pp. 2271–2280, 2018.
[57]
M. Weber and M. Boban, Security challenges of the Internet of Things, in Proc. 2016 39th Int. Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 2016, pp. 638–643.
[65]
C. Hazman, A. Guezzaz, S. Benkirane, and M. Azrour, lIDS-SIoEL: Intrusion detection framework for IoT-based smart environments security using ensemble learning, Cluster Comput., vol. 54, no. 1, pp. 1–15, 2022.
[69]
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, in Proc. 2009 IEEE Symp. on Computational Intelligence for Security and Defense Applications, Ottawa, Canada, 2009, pp. 1–6.
[71]
M. Kumar, Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network Using Gated Recurrent Neural Networks (GRU). Dayton, OH, USA: Wright State University, 2017.
[72]
B. Roy and H. Cheung, A deep learning approach for intrusion detection in Internet of Things using Bi-directional long short-term memory recurrent neural network, in Proc. 2018 28th Int. Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 2019, pp. 1–6.
[74]
M. Roopak, Y. T. Gui, and J. Chambers, Deep learning models for cyber security in IoT networks, in Proc. 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0452–0457.
[75]
Y. Otoum, D. Liu, and A. Nayak, DL-IDS: A deep learning–based intrusion detection framework for securing IoT, Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, p. e3803, 2022.
[76]
S. Pande, A. Khamparia, D. Gupta, and D. N. H. Thanh, DDOS detection using machine learning technique, in Recent Studies on Computational Intelligence, J. Kacprzyk, ed. Singapore: Springer, 2021, pp. 59–68.
[79]
A. Guezzaz, A. Asimi, A. Mourade, Z. Tbatou, and Y. Asimi, A multilayer perceptron classifier for monitoring network traffic, in Big Data and Networks Technologies, Y. Farhaoui, ed. New York, NY, USA: Springer, 2020, pp. 262–270.
[80]
C. Hazman, A. Guezzaz, S. Benkirane, and M. Azrour, Intrusion detection framework for IoT-based smart environments security using ensemble learning, Cluster Comput., vol. 26, pp. 4069–4083, 2023.