[2] S. Li, L. D. Xu, and S. Zhao, "The internet of things: a survey," Information systems frontiers, vol. 17, pp. 243-259, 2015. doi.org/10.1007/s10796-014-9492-7
[3] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future generation computer systems, vol. 29, no. 7, pp. 1645-1660, 2013. doi.org/10.1016/j.future.2013.01.010
[4] I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, "Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions," Mobile Networks and Applications, pp. 1-17, 2022. doi.org/10.1007/s11036-022-01937-3
[5] M. Injadat, A. Moubayed, and A. Shami, "Detecting botnet attacks in IoT environments: An optimized machine learning approach," in 2020 32nd International Conference on Microelectronics (ICM), 2020: IEEE, pp. 1-4. doi.org/ 10.1109/ICM50269.2020.9331794
[6] N. Nokia, "Threat intelligence report 2020," Comput. Fraud Secur, 2020. doi.org/10.1016/S1361-3723(20)30115-9
[8] T. Verdonck, B. Baesens, M. Óskarsdóttir, and S. vanden Broucke, "Special issue on feature engineering editorial," Machine Learning, pp. 1-12, 2021. doi.org/10.1007/s10994-021-06042-2
[9] O. Sagi and L. Rokach, "Ensemble learning: A survey," Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 8, no. 4, p. e1249, 2018. doi.org/10.1002/widm.1249
[10] Y. Sun, A. K. Wong, and M. S. Kamel, "Classification of imbalanced data: A review," International journal of pattern recognition and artificial intelligence, vol. 23, no. 04, pp. 687-719, 2009. doi.org/10.1142/S0218001409007326
[11] N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, "Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset," Future Generation Computer Systems, vol. 100, pp. 779-796, 2019, doi: 10.1016/j.future.2019.05.041.
[12] A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, "Survey of intrusion detection systems: techniques, datasets and challenges," Cybersecurity, vol. 2, no. 1, pp. 1-22, 2019. doi.org/10.1186/s42400-019-0038-7
[13] I. H. Sarker, "Machine learning: Algorithms, real-world applications and research directions," SN computer science, vol. 2, no. 3, p. 160, 2021. doi.org/10.1007/s42979-021-00592-x
[14] I. H. Sarker, A. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, "Cybersecurity data science: an overview from machine learning perspective," Journal of Big data, vol. 7, pp. 1-29, 2020. doi.org/10.1186/s40537-020-00318-5
[15] M. Shafiq, Z. Tian, A. K. Bashir, X. Du, and M. Guizani, "CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques," IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3242-3254, 2020. doi.org/ 10.1109/JIOT.2020.3002255
[16] M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. Guizani, "Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city," Future Generation Computer Systems, vol. 107, pp. 433-442, 2020. doi.org/10.1016/j.future.2020.02.017
[17] R. Vijayanand, D. Devaraj, and B. Kannapiran, "Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection," Computers & Security, vol. 77, pp. 304-314, 2018. doi.org/10.1016/j.cose.2018.04.010
[18] M. Mohammadi, A. Al-Fuqaha, S. Sorour, and M. Guizani, "Deep learning for IoT big data and streaming analytics: A survey," IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 2923-2960, 2018.doi.org/ 10.1109/COMST.2018.2844341
[19] M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, "Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study," Journal of Information Security and Applications, vol. 50, p. 102419, 2020. doi.org/ 10.1016/j.jisa.2019.102419.
[20] M. Ge, X. Fu, N. Syed, Z. Baig, G. Teo, and A. Robles-Kelly, "Deep learning-based intrusion detection for IoT networks," in IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC): IEEE, 2020, pp. 256-25609, doi: 10.1109/PRDC47002.2019.00056.
[21] M. Ge, N. F. Syed, X. Fu, Z. Baig, and A. Robles-Kelly, "Towards a deep learning-driven intrusion detection approach for Internet of Things," Computer Networks, vol. 186, p. 107784, 2021, doi: doi.org/10.1016/j.comnet.2020.107784.
[22] M. A. Ferrag and L. Maglaras, "DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids," IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1285-1297, 2019. doi.org/ 10.1109/TEM.2019.2922936
[23] S. Aldhaheri, D. Alghazzawi, L. Cheng, B. Alzahrani, and A. Al-Barakati, "Deepdca: novel network-based detection of iot attacks using artificial immune system," Applied Sciences, vol. 10, no. 6, p. 1909, 2020. doi.org/10.3390/app10061909
[24] O. Alkadi, N. Moustafa, B. Turnbull, and K.-K. R. Choo, "A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks," IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9463-9472, 2020. doi.org/ 10.1109/JIOT.2020.2996590
[25] B. A. NG and S. Selvakumar, "Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment," Future Generation Computer Systems, vol. 113, pp. 255-265, 2020. doi.org/10.1016/j.future.2020.07.020
[26] S. I. Popoola, B. Adebisi, R. Ande, M. Hammoudeh, and A. A. Atayero, "Memory-efficient deep learning for botnet attack detection in IoT networks," Electronics, vol. 10, no. 9, p. 1104, 2021. doi.org/10.3390/electronics10091104
[27] I. Ullah and Q. H. Mahmoud, "Design and development of a deep learning-based model for anomaly detection in IoT networks," IEEE Access, vol. 9, pp. 103906-103926, 2021, doi: 10.1109/ACCESS.2021.3094024. doi.org/
[28] A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, and A. Alazab, "A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks," Electronics, vol. 8, no. 11, p. 1210, 2019. doi.org/10.3390/electronics8111210
[29] A. Derhab, A. Aldweesh, A. Z. Emam, and F. A. Khan, "Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering," Wireless Communications and Mobile Computing, vol. 2020, 2020. doi.org/10.1155/2020/6689134
[30] I. Idrissi, M. Azizi, and O. Moussaoui, "IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review," in 2020 Fourth international conference on intelligent computing in data sciences (ICDS), 2020: IEEE, pp. 1-10. doi.org/10.1109/ICDS50568.2020.9268713
[31] V. Sze, Y.-H. Chen, T.-J. Yang, and J. S. Emer, "Efficient processing of deep neural networks: A tutorial and survey," Proceedings of the IEEE, vol. 105, no. 12, pp. 2295-2329, 2017.doi.org/ 10.1109/JPROC.2017.2761740
[32] K. Simran, S. Sriram, R. Vinayakumar, and K. Soman, "Deep learning approach for intelligent named entity recognition of cyber security," in International Symposium on Signal Processing and Intelligent Recognition Systems, 2020: Springer, pp. 163-172. doi.org/10.1007/978-981-15-4828-4_14
[33] Z. Ahmad et al., "Anomaly detection using deep neural network for IoT architecture," Applied Sciences, vol. 11, no. 15, p. 7050, 2021.doi.org/ doi.org/10.3390/app11157050
[34] C. Yin, S. Zhang, J. Wang, and N. N. Xiong, "Anomaly detection based on convolutional recurrent autoencoder for IoT time series," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 1, pp. 112-122, 2020, doi: 10.1109/TSMC.2020.2968516.
[35] L. Aversano, M. L. Bernardi, M. Cimitile, and R. Pecori, "A systematic review on Deep Learning approaches for IoT security," Computer Science Review, vol. 40, p. 100389, 2021. doi.org/10.1016/j.cosrev.2021.100389
[36] R. Vinayakumar, K. Soman, and P. Poornachandran, "Evaluation of recurrent neural network and its variants for intrusion detection system (IDS)," International Journal of Information System Modeling and Design (IJISMD), vol. 8, no. 3, pp. 43-63, 2017.doi.org/ 10.4018/IJISMD.2017070103
[37] Y. Bengio, P. Simard, and P. Frasconi, "Learning long-term dependencies with gradient descent is difficult," IEEE transactions on neural networks, vol. 5, no. 2, pp. 157-166, 1994.doi.org/ 10.1109/72.279181
[38] S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural computation, vol. 9, no. 8, pp. 1735-1780, 1997.doi.org/ 10.1162/neco.1997.9.8.1735
[39] A. G. Felix, S. Jürgen, and C. Fred, "Learning to forget: Continual prediction with LSTM," Neural computation, vol. 12, no. 10, pp. 2451-2471, 2000.doi.org/ 10.1162/089976600300015015
[40] R. Fu, Z. Zhang, and L. Li, "Using LSTM and GRU neural network methods for traffic flow prediction," in 2016 31st Youth Academic Annual Conference of Chinese Association of Automation (YAC), 2016: IEEE, pp. 324-328.doi.org/ 10.1109/YAC.2016.7804912
[41] R. Vinayakumar, K. Soman, and P. Poornachandran, "Applying convolutional neural network for network intrusion detection," in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017: IEEE, pp. 1222-1228.doi.org/ 10.1109/ICACCI.2017.8126009
[42] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and M. Guizani, "A survey of machine and deep learning methods for internet of things (IoT) security," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646-1685, 2020.doi.org/ 10.1109/COMST.2020.2988293
[43] A. Thakkar and R. Lohiya, "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges," Archives of Computational Methods in Engineering, vol. 28, pp. 3211-3243, 2021. doi.org/10.1007/s11831-020-09496-0
[44] P. Branco, L. Torgo, and R. P. Ribeiro, "A survey of predictive modeling on imbalanced domains," ACM Computing Surveys (CSUR), vol. 49, no. 2, pp. 1-50, 2016. doi.org/10.1145/2907070