Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for IoMT intrusion detection, utilizing the WUSTL EHMS 2020 dataset, which focuses on cyb...
| Main Authors: | Bouke, Mohamed Aly, El Atigh, Hayate, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/115682/ http://psasir.upm.edu.my/id/eprint/115682/1/115682.pdf |
Similar Items
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024)
by: Abdullah, Azizol, et al.
Published: (2024)
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
The intersection of targeted advertising and security: unraveling the mystery of overheard conversations
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Conceptualizing generalizability: New contributions and a reply
by: Allen, L., et al.
Published: (2012)
by: Allen, L., et al.
Published: (2012)
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Trends in IoT intrusion detection: A bibliometric analysis of deep learning approaches
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by: Bouke, Mohamed Aly, et al.
Published: (2022)
by: Bouke, Mohamed Aly, et al.
Published: (2022)
Building generalizable case-based theory in human resources management
by: Ang, H., et al.
Published: (2018)
by: Ang, H., et al.
Published: (2018)
SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Emotion recognition training in autism spectrum disorder: A systematic review of challenges related to generalizability
by: Berggren, S., et al.
Published: (2017)
by: Berggren, S., et al.
Published: (2017)
Cross-cultural generalizability of the Theory of Planned Behavior among young people in a physical activity context
by: Hagger, Martin, et al.
Published: (2007)
by: Hagger, Martin, et al.
Published: (2007)
IoT intrusion detection using auto-encoder and machine learning techniques
by: Khudhu, Ahmed Ridha, et al.
Published: (2022)
by: Khudhu, Ahmed Ridha, et al.
Published: (2022)
Internet of things (IoT) device for web based monitoring of gas leakage / Mohd Aliff Mahdzir
by: Mahdzir, Mohd Aliff
Published: (2020)
by: Mahdzir, Mohd Aliff
Published: (2020)
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
by: Dehkordi, Iman Farhadian, et al.
Published: (2023)
by: Dehkordi, Iman Farhadian, et al.
Published: (2023)
Deep insight into IoT-enabled agriculture and network protocols
by: Hasan, Muhammad Zulkifl, et al.
Published: (2022)
by: Hasan, Muhammad Zulkifl, et al.
Published: (2022)
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Scalable machine learning-based intrusion detection system for IoT-enabled smart cities
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
Deep to shallow crustal differentiation of within-plate alkaline magmatism at Mt. Bambouto volcano, Cameroon Line
by: Marzoli, A., et al.
Published: (2015)
by: Marzoli, A., et al.
Published: (2015)
Deep learning for environmentally robust speech recognition
by: Alhamada, A. I., et al.
Published: (2020)
by: Alhamada, A. I., et al.
Published: (2020)
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks
by: Ibrahim, Mohammed, et al.
Published: (2021)
by: Ibrahim, Mohammed, et al.
Published: (2021)
Robust estimation of the three parameter Weibull distribution for addressing outliers in reliability analysis
by: Mohd Safari, Muhammad Aslam, et al.
Published: (2025)
by: Mohd Safari, Muhammad Aslam, et al.
Published: (2025)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT)
by: Haseeb, Shariq, et al.
Published: (2017)
by: Haseeb, Shariq, et al.
Published: (2017)
Vehicle gas leakage detector.
by: Che Soh, Azura, et al.
Published: (2010)
by: Che Soh, Azura, et al.
Published: (2010)
Leakage during seed imbibition
by: Simon, E. W., et al.
Published: (1972)
by: Simon, E. W., et al.
Published: (1972)
Socio-eonomic profile of Mt Isa
by: Gabunada, F., et al.
Published: (2009)
by: Gabunada, F., et al.
Published: (2009)
Ecologically, socially valuable Mt Singai
by: The Borneo Post
Published: (2012)
by: The Borneo Post
Published: (2012)
Azmi tawar diri tanding MT
Published: (2009)
Published: (2009)
Incremental learning of deep neural network for robust vehicle classification
by: Ahmad Mimi Nathiratul Athriyah,, et al.
Published: (2022)
by: Ahmad Mimi Nathiratul Athriyah,, et al.
Published: (2022)
Intelligent kitchen waste composting system via deep learning and internet-of-things (IoT)
by: Teh, Boon Hong, et al.
Published: (2024)
by: Teh, Boon Hong, et al.
Published: (2024)
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
by: Abdulkareem, Fatimah Saleem, et al.
Published: (2023)
by: Abdulkareem, Fatimah Saleem, et al.
Published: (2023)
An epidemic based model for the predictions of OOFI in an IoT platform
by: Ibrahim, Mohammed, et al.
Published: (2020)
by: Ibrahim, Mohammed, et al.
Published: (2020)
Quantification of MT & CEST MRI for in vivo applications
by: Carradus, Andrew
Published: (2021)
by: Carradus, Andrew
Published: (2021)
Ashwin menang anugerah terbaik 3MT
by: Ahmad Zarif, Ahmad Fauzi
Published: (2017)
by: Ahmad Zarif, Ahmad Fauzi
Published: (2017)
Penuntut UMP muncul juara 3MT
by: Erma Yusnida, Jusoh
Published: (2017)
by: Erma Yusnida, Jusoh
Published: (2017)
Information and knowledge leakage in supply chain
by: Tan, Kim Hua, et al.
Published: (2016)
by: Tan, Kim Hua, et al.
Published: (2016)
Similar Items
-
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023) -
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024) -
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023) -
The intersection of targeted advertising and security: unraveling the mystery of overheard conversations
by: Bouke, Mohamed Aly, et al.
Published: (2023)