<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">66753</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2025.066753</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Future-Proofing CIA Triad with Authentication for Healthcare: Integrating Hybrid Architecture of ML &#x0026; DL with IDPS for Robust IoMT Security</article-title>
<alt-title alt-title-type="left-running-head">Future-Proofing CIA Triad with Authentication for Healthcare: Integrating Hybrid Architecture of ML &#x0026; DL with IDPS for Robust IoMT Security</alt-title>
<alt-title alt-title-type="right-running-head">Future-Proofing CIA Triad with Authentication for Healthcare: Integrating Hybrid Architecture of ML &#x0026; DL with IDPS for Robust IoMT Security</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Alanazi</surname><given-names>Saad Awadh</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Ahmad</surname><given-names>Fahad</given-names></name><xref ref-type="aff" rid="aff-2">2</xref><xref ref-type="aff" rid="aff-3">3</xref><email>fahad.ahmad@port.ac.uk</email></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Computer Science, College of Computer and Information Sciences, Jouf University</institution>, <addr-line>Sakaka, 72341, Aljouf</addr-line>, <country>Saudi Arabia</country></aff>
<aff id="aff-2"><label>2</label><institution>School of Computing, Faculty of Technology, University of Portsmouth, Winston Churchill Ave</institution>, <addr-line>Southsea, Portsmouth, PO1 2UP</addr-line>, <country>UK</country></aff>
<aff id="aff-3"><label>3</label><institution>Portsmouth Artificial Intelligence and Data Science Center, University of Portsmouth, Winston Churchill Ave</institution>, <addr-line>Southsea, Portsmouth, PO1 2UP</addr-line>, <country>UK</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Fahad Ahmad. Email: <email>fahad.ahmad@port.ac.uk</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>29</day><month>08</month><year>2025</year>
</pub-date>
<volume>85</volume>
<issue>1</issue>
<fpage>769</fpage>
<lpage>800</lpage>
<history>
<date date-type="received">
<day>16</day>
<month>4</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>20</day>
<month>6</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_66753.pdf"></self-uri>
<abstract>
<p>This study presents a comprehensive and secure architectural framework for the Internet of Medical Things (IoMT), integrating the foundational principles of the Confidentiality, Integrity, and Availability (CIA) triad along with authentication mechanisms. Leveraging advanced Machine Learning (ML) and Deep Learning (DL) techniques, the proposed system is designed to safeguard Patient-Generated Health Data (PGHD) across interconnected medical devices. Given the increasing complexity and scale of cyber threats in IoMT environments, the integration of Intrusion Detection and Prevention Systems (IDPS) with intelligent analytics is critical. Our methodology employs both standalone and hybrid ML &#x0026; DL models to automate threat detection and enable real-time analysis, while ensuring rapid and accurate responses to a diverse array of attacks. Emphasis is placed on systematic model evaluation using detection metrics such as accuracy, False Alarm Rate (FAR), and False Discovery Rate (FDR), with performance validation through cross-validation and statistical significance testing. Experimental results based on the Edge-IIoTset dataset demonstrate the superior performance of ensemble-based ML models such as Extreme Gradient Boosting (XGB) and hybrid DL models such as Convolutional Neural Networks with Autoencoders (CNN&#x002B;AE), which achieved detection accuracies of 96% and 98%, respectively, with notably low FARs. These findings underscore the effectiveness of combining traditional security principles with advanced AI-driven methodologies to ensure secure, resilient, and trustworthy healthcare systems within the IoMT ecosystem.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Healthcare</kwd>
<kwd>internet of medical things</kwd>
<kwd>patient-generated health data</kwd>
<kwd>confidentiality</kwd>
<kwd>integrity</kwd>
<kwd>availability</kwd>
<kwd>intrusion detection and prevention system</kwd>
<kwd>machine learning</kwd>
<kwd>deep learning</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>Jouf University</funding-source>
<award-id>DGSSR-2023-02-02516</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>In today&#x2019;s digital healthcare landscape, securing computing systems is critical, particularly with the rise of the Internet of Medical Things (IoMT), a network of interconnected devices central to modern medical services. These devices range from wearable health monitors to implantable sensors and smart medical equipment, each generating vast amounts of Patient-Generated Health Data (PGHD). PGHD refers to health-related data created, recorded, or gathered by patients, caregivers, or family members outside of clinical settings using IoMT devices. As IoMT expands, ensuring the security, integrity, and confidentiality of PGHD becomes increasingly vital due to evolving and sophisticated cyber threats [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>].</p>
<p>The CIA triad; Confidentiality, Integrity, and Availability, along with authentication, forms the foundational framework for securing information systems. In traditional IT infrastructures, these principles provide a robust structure for managing and securing sensitive information. However, the IoMT environment presents unique challenges that make conventional security mechanisms less effective [<xref ref-type="bibr" rid="ref-3">3</xref>&#x2013;<xref ref-type="bibr" rid="ref-5">5</xref>]. IoMT systems are characterized by their heterogeneity, comprising a wide range of device types with varying capabilities and protocols. These devices often operate under strict resource constraints, including limited battery life, processing power, and memory. Furthermore, they are frequently deployed in dynamic environments and must support real-time communication and data exchange. The transmission of sensitive PGHD over potentially unsecured networks increases the risk of data breaches, while the lack of unified security standards across vendors complicates enforcement. As a result, traditional perimeter-based and signature-driven security solutions, such as firewalls and antivirus software, fall short in addressing the nuanced requirements of IoMT.</p>
<p>Machine Learning and Deep Learning (ML &#x0026; DL) techniques offer powerful enhancements to Intrusion Detection and Prevention Systems (IDPS), enabling not only real-time detection and response but also the ability to anticipate and mitigate threats before they occur [<xref ref-type="bibr" rid="ref-6">6</xref>,<xref ref-type="bibr" rid="ref-7">7</xref>]. ML &#x0026; DL models excel at identifying complex patterns and anomalies within massive data streams, a capability especially critical in IoMT environments where system downtime or breaches can have life-threatening implications [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>].</p>
<p>This study proposes an intelligent, hierarchical security framework that integrates ML &#x0026; DL with IDPS under the guidance of the CIA triad and authentication principles. The framework is designed to address the challenges posed by IoMT systems through an adaptive and scalable architecture. By aligning machine intelligence with security fundamentals, the framework strengthens both proactive and reactive defense mechanisms [<xref ref-type="bibr" rid="ref-10">10</xref>,<xref ref-type="bibr" rid="ref-11">11</xref>].</p>
<p>The proposed framework operates in two stages. Initially, ML algorithms analyse PGHD for signs of anomalies, functioning as a fast and efficient filter. If a potential threat is identified, DL models then conduct deeper, context-aware analysis to confirm and classify the threat. This two-tier architecture reduces false positives and provides a balance between speed and accuracy in threat detection and mitigation.</p>
<p>Although ML &#x0026; DL have been widely explored in cybersecurity, their hierarchical application in combination with the CIA triad and authentication mechanisms specifically for IoMT is a novel contribution [<xref ref-type="bibr" rid="ref-12">12</xref>,<xref ref-type="bibr" rid="ref-13">13</xref>]. This layered approach is not only technically rigorous but also practically significant, providing a pathway for secure, real-time, and resilient healthcare systems.</p>
<sec id="s1_1">
<label>1.1</label>
<title>Problem Statement</title>
<p>The increasing reliance on IoMT in healthcare has introduced new, complex cybersecurity challenges. Devices operate in dynamic and often untrusted environments, making them vulnerable to a wide range of attacks. Traditional measures such as firewalls and antivirus software lack the adaptability and intelligence required to protect such decentralized and heterogeneous systems [<xref ref-type="bibr" rid="ref-14">14</xref>].</p>
<p>There is an urgent need for a comprehensive security framework that integrates the principles of the CIA triad and authentication with the adaptive capabilities of IDPS, enhanced by ML &#x0026; DL. This integration aims to deliver real-time threat detection, reduced false positives, and improved resilience of healthcare infrastructures.</p>
</sec>
<sec id="s1_2">
<label>1.2</label>
<title>Research Questions</title>
<p><list list-type="bullet">
<list-item>
<p>How can ML &#x0026; DL, when integrated with IDPS, enhance threat classification and response in complex IoMT environments?</p></list-item>
<list-item>
<p>What is the empirical performance of a hierarchical ML &#x0026; DL-based IDPS in improving detection accuracy and response time?</p></list-item>
<list-item>
<p>How effective is the proposed framework in reducing false positives and negatives to ensure secure healthcare service delivery?</p></list-item>
</list></p>
</sec>
<sec id="s1_3">
<label>1.3</label>
<title>Aims and Objectives</title>
<p>This study aims to contribute original insights by combining the CIA triad and authentication with ML, DL, and IDPS in a robust framework tailored to IoMT. The research seeks to demonstrate how intelligent systems can be employed to secure sensitive medical data and ensure uninterrupted healthcare services.
<list list-type="bullet">
<list-item>
<p>To establish the originality of integrating the CIA triad, authentication, and advanced IDPS with ML &#x0026; DL for improved IoMT security.</p></list-item>
<list-item>
<p>To develop and evaluate a hierarchical ML &#x0026; DL-based IDPS for accurate anomaly detection and threat response.</p></list-item>
<list-item>
<p>To assess the effectiveness of the proposed framework in minimizing false alerts while ensuring reliable healthcare service delivery.</p></list-item>
</list></p>
</sec>
<sec id="s1_4">
<label>1.4</label>
<title>Contribution of Study</title>
<p>This research presents a novel integration of ML &#x0026; DL with the CIA triad and authentication in an IDPS designed for IoMT. The proposed architecture is multi-layered: ML techniques handle initial anomaly detection, and DL models perform more complex threat verification and classification. This allows the system to maintain high detection accuracy while being computationally efficient.</p>
<p>The framework not only supports efficient resource use but also enhances system responsiveness, contributing to the reliability and sustainability of healthcare IT infrastructures. Additionally, its modular and scalable design makes it adaptable to other critical domains, such as industrial IoT, smart cities, and financial systems. These extensions demonstrate the broader relevance and transferability of the proposed model.</p>
</sec>
<sec id="s1_5">
<label>1.5</label>
<title>Rest of the Manuscript</title>
<p>Following this Introduction, the manuscript will present a detailed Literature Review to place the protection of the CIA Triad with authentication and ML &#x0026; DL based IDPS within the current landscape of IoMT security solutions. <xref ref-type="sec" rid="s3">Section 3</xref> will outline the experimental design, data collection, and analysis procedures used in this study. Then explanation of Identified Machine Learning and Deep Learning Models. <xref ref-type="sec" rid="s5">Section 5</xref> will demonstrate the effectiveness of the proposed hybrid security framework in an IoMT setting. <xref ref-type="sec" rid="s6">Sections 6</xref> and <xref ref-type="sec" rid="s7">7</xref> will reflect on the implications of these findings for future research and practical application, advocating for the broader adoption of advanced, integrated security systems across various industries.</p>
</sec>
</sec>
<sec id="s2">
<label>2</label>
<title>Literature Review</title>
<p>The integration of IoMT into healthcare has transformed patient care by enabling real-time monitoring, remote diagnostics, and continuous health data acquisition. However, this progress has introduced major security concerns, particularly in safeguarding Patient-Generated Health Data (PGHD), ensuring system integrity, and maintaining uninterrupted medical services. Conventional security methods such as firewalls, antivirus software, and rule-based IDPS fall short in addressing the heterogeneous, resource-constrained, and highly connected nature of IoMT systems [<xref ref-type="bibr" rid="ref-14">14</xref>,<xref ref-type="bibr" rid="ref-15">15</xref>].</p>
<sec id="s2_1">
<label>2.1</label>
<title>Traditional Security Challenges in IoMT</title>
<p>Traditional security frameworks struggle to keep up with the dynamic demands of IoMT due to several limitations. These include limited device capabilities, diverse hardware and software ecosystems, and the need for low-latency, real-time communication. Studies have demonstrated that these limitations impede real-time anomaly detection and data protection at both device and network layers [<xref ref-type="bibr" rid="ref-16">16</xref>,<xref ref-type="bibr" rid="ref-17">17</xref>]. Additionally, securing PGHD during transmission and processing is critical, as these data streams are vulnerable to man-in-the-middle and spoofing attacks [<xref ref-type="bibr" rid="ref-18">18</xref>]. Integrating edge computing with lightweight cryptographic algorithms and access control mechanisms has been proposed to mitigate latency and computational overhead [<xref ref-type="bibr" rid="ref-19">19</xref>].</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Role of IDPS in IoMT Security</title>
<p>An effective IDPS serves as the backbone of IoMT security by enabling real-time intrusion detection and system resilience. Unlike static, signature-based detection, which fails against zero-day threats, anomaly-based IDPS dynamically learns traffic patterns and user behavior by [<xref ref-type="bibr" rid="ref-20">20</xref>,<xref ref-type="bibr" rid="ref-21">21</xref>]. These systems require high adaptability, especially in healthcare where threats evolve rapidly and detection delays can result in critical failures.</p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Application of ML and DL in IDPS</title>
<p>ML and DL have demonstrated high potential in strengthening IDPS functionalities by learning from vast and diverse datasets to identify anomalies, classify intrusions, and adapt to evolving threats [<xref ref-type="bibr" rid="ref-22">22</xref>,<xref ref-type="bibr" rid="ref-23">23</xref>]. ML models such as Decision Trees, Na&#x00EF;ve Bayes, and ensemble techniques have been extensively used to achieve fast and interpretable intrusion detection. DL models such as CNN, LSTM, and attention-based networks are particularly effective in identifying subtle patterns within sequential and high-dimensional data streams, significantly reducing false positives [<xref ref-type="bibr" rid="ref-24">24</xref>,<xref ref-type="bibr" rid="ref-25">25</xref>].</p>
<p>Yet, deploying these models in practice involves challenges such as data imbalance, explainability, and the need for efficient model execution on constrained devices [<xref ref-type="bibr" rid="ref-26">26</xref>,<xref ref-type="bibr" rid="ref-27">27</xref>]. Therefore, there is a strong need for scalable, low-latency, and accurate models that can generalize across a wide range of attack scenarios and IoMT configurations.</p>
</sec>
<sec id="s2_4">
<label>2.4</label>
<title>ML-Based Approaches for IoMT IDPS</title>
<p>Various ML methods have demonstrated their effectiveness in intrusion detection. For example, the Enhanced Random Forest Classifier for Achieving the Best Execution Time (ERF-ABE) achieved 99% accuracy in detecting DDoS and delay attacks [<xref ref-type="bibr" rid="ref-28">28</xref>]. Similarly, an ensemble model combining DTs, Na&#x00EF;ve Bayes, RF, and XGBoost reported 96.35% accuracy and 99.98% detection rate [<xref ref-type="bibr" rid="ref-29">29</xref>]. A hybrid approach of Logistic Regression and Gradient Boosted Trees achieved 95.4% accuracy while optimizing for real-time use with a lightweight feature set [<xref ref-type="bibr" rid="ref-30">30</xref>]. Meta-learning strategies have also emerged, such as the one presented by [<xref ref-type="bibr" rid="ref-31">31</xref>], which attained 99.99% accuracy and a remarkably low False Alarm Rate of 0.00004%.</p>
</sec>
<sec id="s2_5">
<label>2.5</label>
<title>DL-Based Approaches for IoMT IDPS</title>
<p>In the DL domain, several models have shown promising results. A Deep Neural Network with global attention achieved an accuracy range of 89%&#x2013;99% [<xref ref-type="bibr" rid="ref-32">32</xref>]. A GRU with attention mechanism also delivered near-perfect results in classification tasks [<xref ref-type="bibr" rid="ref-33">33</xref>]. To improve efficiency, one study combined PCA and Grey Wolf Optimization (GWO) with a DNN to reduce time complexity by 32% without sacrificing performance [<xref ref-type="bibr" rid="ref-34">34</xref>]. Moreover, CNN-Transformer hybrids and LSTM architectures have proven useful for detecting anomalies in time-series medical data [<xref ref-type="bibr" rid="ref-32">32</xref>].</p>
<p>Despite these achievements, real-world deployments remain limited. Execution time and resource usage are underreported in many studies, although some like [<xref ref-type="bibr" rid="ref-28">28</xref>,<xref ref-type="bibr" rid="ref-34">34</xref>] address performance efficiency directly.</p>
<p><bold><italic>2.6 Emerging Trends and Limitations</italic></bold></p>
<p>Emerging frameworks such as Federated Learning [<xref ref-type="bibr" rid="ref-35">35</xref>] and Meta-Learning [<xref ref-type="bibr" rid="ref-31">31</xref>] are gaining traction due to their privacy-preserving capabilities and potential to scale across distributed IoMT environments. However, issues like regulatory compliance, model interpretability, and deployment readiness continue to hinder widespread adoption.</p>
<p>In summary, while ML and DL techniques offer strong enhancements to IDPS in IoMT, the path forward involves addressing deployment efficiency, compliance, and model transparency. Tailored, intelligent systems are essential for safeguarding PGHD and ensuring the resilience of healthcare infrastructures. We have summarised some important methodologies, findings and limitations of the studies in <xref ref-type="table" rid="table-1">Table 1</xref> shown below:</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Summary of key studies on ML and DL for IoMT security</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th align="center">Study</th>
<th align="center">Methodology</th>
<th align="center">Key findings</th>
<th align="center">Limitations</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-28">28</xref>]</td>
<td>Enhanced Random Forest (ERF-ABE)</td>
<td>99% accuracy for DDoS and delay attack detection</td>
<td>Focused on specific attacks, execution time only partially analyzed</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-29">29</xref>]</td>
<td>Ensemble: DT &#x002B; NB &#x002B; RF &#x002B; XGB</td>
<td>96.35% accuracy, 99.98% detection rate</td>
<td>Lack of detail on model deployment overhead</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-30">30</xref>]</td>
<td>Hybrid LR &#x002B; Gradient Boosted Trees</td>
<td>95.4% accuracy with real-time capability</td>
<td>Limited exploration of advanced attack types</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-31">31</xref>]</td>
<td>Meta-Learning</td>
<td>99.99% accuracy, 0.00004% FAR</td>
<td>Scalability in live IoMT not fully tested</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-32">32</xref>]</td>
<td>DNN with Attention/CNN-Transformer</td>
<td>Accuracy range: 89%&#x2013;99%</td>
<td>Does not discuss resource usage in detail</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-33">33</xref>]</td>
<td>GRU with Attention</td>
<td>Near-perfect classification</td>
<td>High complexity, potential latency issues</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-34">34</xref>]</td>
<td>PCA &#x002B; GWO &#x002B; DNN</td>
<td>32% time complexity reduction</td>
<td>Requires further validation in clinical scenarios</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-35">35</xref>]</td>
<td>Federated Learning</td>
<td>Preserves data privacy across nodes</td>
<td>Regulatory and communication overhead not explored</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Materials and Methods</title>
<sec id="s3_1">
<label>3.1</label>
<title> Innovative IoMT Architecture</title>
<p>Our innovative architecture for the IoMT, which is structured into three primary layers: the Device layer, the Fog layer, and the Cloud layer refer to <xref ref-type="fig" rid="fig-1">Fig. 1</xref> for a visual representation.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Internet of medical things network</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-1.tif"/>
</fig>
<p><bold>Device Layer:</bold> This foundational layer consists of wearables and medical sensors. These devices are crucial as they collect and transmit medical data directly from patients. Their primary function is to ensure that vital health metrics are captured in real-time and sent forward for further processing.</p>
<p><bold>Fog Layer:</bold> Serving as an intermediary, the Fog layer plays a pivotal role in the IoMT architecture. It facilitates the seamless transmission of data from the Device layer to the Cloud layer [<xref ref-type="bibr" rid="ref-36">36</xref>,<xref ref-type="bibr" rid="ref-37">37</xref>]. Beyond just relaying data, this layer has critical functionalities including the initial processing of data, as well as handling aspects of security and privacy. Its position in the architecture makes it a key point for implementing robust security measures because it acts as a bridge between data collection points and the data storage and analysis centres.</p>
<p><bold>Cloud Layer:</bold> As the uppermost layer in this architecture, the Cloud layer serves as the central repository for all IoMT data. It is where data is stored, analysed, and made accessible to authorized healthcare providers and researchers. This layer enables the deep analysis of collected data, supporting healthcare professionals in making informed decisions based on comprehensive data insights.</p>
<p>Given the essential role of the Fog layer in connecting the device-collected data with cloud-based analysis and storage, it also represents a significant point of vulnerability within the IoMT framework. To address this, it is equipped with advanced security systems, including intelligent IDPS that utilize ML &#x0026; DL techniques in layered fashion. These systems are designed to detect and mitigate potential security threats in real-time, ensuring that the integrity and confidentiality of medical data are maintained as it moves through the architecture. This multi-layered approach not only enhances the functionality and efficiency of medical data processing but also fortifies the security framework necessary to protect sensitive health information in the evolving digital landscape of healthcare. Our proposed advanced IDPS, which are integral to reinforcing the security of the IoMT is designed to identify and respond to potential security threats, ensuring the integrity and confidentiality of PGHD across IoMT networks.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Integration of IDPS in IoMT</title>
<p>The implementation of both IDPS within the IoMT environment is crucial for maintaining a secure operational landscape. By integrating these systems, IoMT can benefit from a comprehensive security approach that not only detects a wide range of known and unknown threats but also actively works to prevent these threats from causing harm. This dual approach ensures that PGHD transmitted across IoMT networks remains secure from both passive and active cyber threats, safeguarding critical healthcare operations and patient information.</p>
<p>This methodology represents a robust security framework that adapts to the evolving challenges and complexities of the IoMT environment. By employing the proactive capabilities of IDPS, the IoMT infrastructure is equipped to handle the multifaceted nature of modern cybersecurity threats. Refer to <xref ref-type="fig" rid="fig-2">Fig. 2</xref> for a visual representation.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Intrusion detection and prevention system architecture</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-2.tif"/>
</fig>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Metrics for Assessing IDPS Performance</title>
<p>In this section, we outline the criteria used to evaluate the effectiveness of IDPS within the IoMT environment.</p>
<p><bold>Detection Rate</bold> is a critical metric that measures the IDPS&#x2019;s ability to correctly identify actual threats within the network. An effective IDPS should demonstrate a high detection rate, signifying its efficiency in recognizing and reacting to genuine security threats. This metric is essential for maintaining the integrity and security of the IoMT network.</p>
<p><bold>False Discovery Rate</bold> measures the proportion of false alarms, where the system erroneously flags normal activities as malicious. Minimizing the FDR is crucial because a high rate of false alarms can lead to resource wastage and potentially desensitize the system administrators to alerts, increasing the risk of overlooking actual threats.</p>
<p><bold>Response Time</bold> evaluates the promptness of the IDPS in detecting and responding to intrusions. It tracks the duration from when a threat is detected to when action is taken by the system. Rapid response is vital in IoMT environments to prevent the escalation of incidents and to minimize the damage caused by security breaches.</p>
<p><bold>Scalability</bold> assesses the ability of the IDPS to handle growing amounts of network traffic effectively as the IoMT infrastructure expands. This metric is indicative of the system&#x2019;s capability to adapt and maintain performance levels despite an increase in load, ensuring that security does not become compromised as the network evolves.</p>
<p>Together, these metrics provide a comprehensive assessment of an IDPS&#x2019;s performance, highlighting its accuracy, reliability, responsiveness, and adaptability in the dynamic and growing field of IoMT. By continuously monitoring these metrics, stakeholders can ensure that the IDPS is effectively safeguarding the IoMT environment against current and future cybersecurity challenges.</p>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Integrating Machine Learning and Deep Learning in IDPS to Protect the CIA Triad with Authentication</title>
<p>ML &#x0026; DL technologies are incorporated into IDPS to enhance the security of IoMT networks. Machine Learning algorithm in IDPS analyse network traffic initially to detect potential security threats. Then DL, a subset of ML, utilizes layers of neural networks to process data and identify complex patterns. This technology is especially effective in IDPS for several reasons especially due to in depth analysis of data and then automatic identification of normal and malicious traffic patterns as shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>. The integration of ML and DL within IDPS marks a pivotal advancement in cybersecurity strategies, particularly within the IoMT. The primary goal of implementing these advanced technologies in IDPS for IoMT is to bolster the protection of the CIA Triad with authentication, which is foundational to the security framework of IoMT.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Machine learning and deep learning procedure</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-3.tif"/>
</fig>
<p><bold>Confidentiality</bold> ensures that sensitive medical data is accessible only to authorized individuals. ML &#x0026; DL enhance IDPS capabilities to detect unauthorized access attempts, thereby safeguarding patient privacy and sensitive information.</p>
<p><bold>Integrity</bold> guarantees that medical data and device configurations are not altered maliciously or inadvertently. By using ML &#x0026; DL, IDPS can more accurately identify and thwart attempts to tamper with or corrupt data, ensuring that medical records and treatment protocols remain trustworthy and unaltered.</p>
<p><bold>Availability</bold> ensures that medical data and IoMT services are available to authorized users when needed. Advanced IDPS, powered by ML &#x2026; DL, can quickly detect and mitigate attacks that threaten to disrupt service availability, such as Distributed Denial of Service (DDoS) attacks.</p>
<p><bold>Authentication</bold> verifies the identity of users or devices accessing IoMT networks. ML &#x0026; DL techniques strengthen IDPS by detecting anomalies in login patterns, device behaviors, or access requests, ensuring that only legitimate entities can interact with sensitive systems, thus preventing unauthorized access and impersonation attacks.</p>
<p>By leveraging ML &#x0026; DL, in IDPS can achieve a higher level of accuracy in detecting threats, significantly reduce false positives, and respond more swiftly and effectively to potential security threats. This comprehensive approach shown in <xref ref-type="fig" rid="fig-4">Fig. 4</xref> not only enhances the protection of PGHD and devices but also supports the overall reliability and efficiency of healthcare services that rely on IoMT technologies. In summary, the integration of these sophisticated technologies into IDPS is essential for maintaining robust cybersecurity measures that uphold the principles of the CIA Triad with authentication in IoMT environments.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Proposed architecture of machine learning and deep learning procedure based intrusion detection and prevention system for internet of medical things environment to protect confidentiality integrity and availability triad with authentication</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-4.tif"/>
</fig>
<p>Each ML and DL models&#x2019; hyperparameters as shown in <xref ref-type="table" rid="table-2">Tables 2</xref> and <xref ref-type="table" rid="table-3">3</xref> are tailored to optimize their specific architectures and tasks. These hyperparameters are essential for tuning the models to achieve optimal performance in various applications, including the complex environments typical of IoMT systems.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Hyper-parameters used in identified machine learning models</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Model</th>
<th>Hyperparameters</th>
</tr>
</thead>
<tbody>
<tr>
<td>Decision trees</td>
<td>Min sample leaf, max depth, criteria, min split</td>
</tr>
<tr>
<td>Linear support vector machine</td>
<td>Regularization parameter, loss rate, penalty</td>
</tr>
<tr>
<td>Logistic regression</td>
<td>Iterations, regularization parameter, penalty</td>
</tr>
<tr>
<td>Logistic regression with stochastic gradient descent</td>
<td>Class weight, eta, learning rate, alpha value, penalty, loss rate</td>
</tr>
<tr>
<td>Na&#x00EF;ve Base</td>
<td>Alpha value</td>
</tr>
<tr>
<td>AdaBoost</td>
<td>Learning rate, number of estimators</td>
</tr>
<tr>
<td>Extreme gradient boosting</td>
<td>Maximum depth, gamma, min child weight, number of estimators, learning rate</td>
</tr>
<tr>
<td>Gradient boosting classifier</td>
<td>Number of estimators, learning rate, max depth, criteria, subsample</td>
</tr>
<tr>
<td>Random forest</td>
<td>Number of Estimators, min samples per leaf, min split, max depth, loss rate</td>
</tr>
<tr>
<td>Bagging algorithm</td>
<td>Max depth, max features, max samples, number of estimators</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Hyper-parameters used in identified deep learning models</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th align="center">Model</th>
<th align="center">Hyperparameters</th>
</tr>
</thead>
<tbody>
<tr>
<td>Convolutional neural network</td>
<td>Number of layers, filter size, stride, padding, activation function</td>
</tr>
<tr>
<td>Gated recurrent unit</td>
<td>Number of layers, units per layer, activation function, dropout rate</td>
</tr>
<tr>
<td>Long short-term memory</td>
<td>Number of layers, units per layer, activation function, dropout rate</td>
</tr>
<tr>
<td>Convolutional neural network with autoencoder</td>
<td>Encoder filter sizes, decoder filter sizes, latent space dimension</td>
</tr>
<tr>
<td>Gated recurrent unit with convolutional neural network</td>
<td>CNN filter sizes, GRU units, activation functions, dropout rates</td>
</tr>
<tr>
<td>Autoencoder with gated recurrent unit</td>
<td>Encoder filter sizes, GRU units, latent space dimension, dropout rate</td>
</tr>
<tr>
<td>Autoencoder with long short-term memory</td>
<td>Encoder filter sizes, LSTM units, latent space dimension, dropout rate</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3_5">
<label>3.5</label>
<title>System Configuration</title>
<p>The experiments were carried out on identified dataset using Lenovo Mobile Workstation equipped with Processor: 12th Generation Intel Core i9, Windows 11 operating system with Memory: 128 GB DDR4, Hard Drive: 2 TB SSD, Graphics: NVIDIA RTX A4000, and the library used Python 3.4. Scikit-learn 0.21.</p>
</sec>
<sec id="s3_6">
<label>3.6</label>
<title>Dataset and Rationale for Its Selection</title>
<p>For our project, we have selected the Edge-IIoTset [<xref ref-type="bibr" rid="ref-38">38</xref>], a dataset specifically designed for Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. This dataset stands out due to its comprehensive collection of data from various IoMT devices simulated in a real-world environment, which makes it highly relevant for our ML &#x0026; DL based IDPS. Its utility is further enhanced by its ability to support both centralized and federated learning modes, which are crucial for the development of scalable and robust cybersecurity solutions in diverse operational environments.</p>
<p>The Edge-IIoTset includes data from over ten types of IoT devices such as temperature and humidity sensors, ultrasonic sensors, water level detection sensors, and heart rate monitors, among others. These diverse data sources provide a rich foundation for training our IDPS to recognize a wide range of normal operational patterns as well as potential security threats. The dataset encompasses fourteen attack types associated with IoT connectivity protocols, organized into five main threat categories: DoS/DDoS attacks, information gathering, man-in-the-middle attacks, injection attacks, and malware. This classification helps in precisely training and testing the IDPS to detect and mitigate specific types of cyber threats effectively.</p>
<p>The structured testbed of the dataset spans seven layers, including cloud computing, network functions virtualization, blockchain network, fog computing, software-defined networking, edge computing, and IoT and IIoT Perception layers. Each layer integrates emerging technologies that meet the specific requirements of IoT and IIoT applications, such as the ThingsBoard IoT platform, OPNFV platform, Hyperledger Sawtooth, and ONOS SDN controller. This layered approach not only mimics a real-world IoT ecosystem but also enables comprehensive security testing across all levels of an IoMT infrastructure.</p>
<p>The selection of the Edge-IIoTset for our project is based on its ability to provide a realistic and dynamic environment for developing and evaluating the effectiveness of our ML &#x0026; DL-based IDPS. It allows us to conduct a thorough exploratory data analysis and to rigorously evaluate the performance of machine learning methods in both centralized and federated learning contexts, ensuring our IDPS can operate effectively under varied and realistic conditions.</p>
<p>Here is <xref ref-type="table" rid="table-4">Table 4</xref> to visualize the diversity and frequency of attacks in the IoMT environment in an interesting way using the Edge-IIoTset dataset. This representation emphasizes the variety and relative occurrence of different types of cyber threats encountered.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Instances of diverse attacks in edge-IIoTset dataset</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th align="center">Attack type</th>
<th align="center">Number of instances</th>
<th align="center">Relative frequency (%)</th>
<th align="center">Attack type</th>
<th align="center">Number of instances</th>
<th align="center">Relative frequency (%)</th>
</tr>
</thead>
<tbody>
<tr>
<td>Normal Operations</td>
<td>1,615,643</td>
<td>91.42%</td>
<td><bold>Uploading</bold></td>
<td>37,634</td>
<td>2.13%</td>
</tr>
<tr>
<td>DDoS_UDP</td>
<td>121,568</td>
<td>6.87%</td>
<td><bold>Backdoor</bold></td>
<td>24,862</td>
<td>1.40%</td>
</tr>
<tr>
<td>DDoS_ICMP</td>
<td>116,436</td>
<td>6.58%</td>
<td><bold>Port scanning</bold></td>
<td>22,564</td>
<td>1.28%</td>
</tr>
<tr>
<td>SQL_Injection</td>
<td>51,203</td>
<td>2.89%</td>
<td><bold>XSS</bold></td>
<td>15,915</td>
<td>0.90%</td>
</tr>
<tr>
<td>Password</td>
<td>50,153</td>
<td>2.83%</td>
<td><bold>Ransomware</bold></td>
<td>10,925</td>
<td>0.62%</td>
</tr>
<tr>
<td>Vulnerability_Scanner</td>
<td>50,110</td>
<td>2.83%</td>
<td><bold>MITM</bold></td>
<td>1214</td>
<td>0.07%</td>
</tr>
<tr>
<td>DDoS_TCP</td>
<td>50,062</td>
<td>2.83%</td>
<td><bold>Fingerprinting</bold></td>
<td>1001</td>
<td>0.06%</td>
</tr>
<tr>
<td>DDoS_HTTP</td>
<td>49,911</td>
<td>2.82%</td>
<td></td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Effective data pre-processing is a critical step in the utilization of ML and DL models, especially in the fields of IoT and IIoT cybersecurity. This process involves preparing the raw data by converting it into a format that can be easily understood and processed by ML and DL models, thereby improving the models&#x2019; accuracy and reducing the time required to obtain results.</p>
<p>In the initial stage, our pre-processing involved reducing the dataset&#x2019;s complexity by removing 15 of the original 63 columns that were deemed irrelevant for identifying traffic characteristics. We employed a manual relevance-based feature elimination technique, guided by domain expertise, to discard protocol-specific and metadata fields such as frame.time, ip.src host, ip.dst host, among others. This targeted reduction enhances processing efficiency by focusing analysis on the most impactful features.</p>
<p>Duplicate records in the dataset were identified and eliminated using a row-wise duplication detection technique, where exact matches across all feature columns were flagged. Only the first instance of each duplicate was retained. This approach ensures the uniqueness of the dataset, which is crucial for maintaining the integrity, and quality of the training process.</p>
<p>One-Hot Encoding was employed to convert categorical variables into a numerical format, as ML and DL models require numeric input. This technique was chosen for its rigor and simplicity, ensuring no ordinal relationships are falsely introduced and allowing the models to accurately learn from categorical distinctions, thereby enhancing overall model performance.</p>
<p>The dataset was examined for missing values, which were imputed using the K-Nearest Neighbours (KNN) Imputation technique. KNN was chosen due to its non-parametric approach that considers similar data patterns, ensuring originality in preserving feature relationships and enhancing the model training reliability and predictive accuracy in complex IoMT datasets.</p>
<p>Feature extraction is integral to refining the dataset so that models are trained on attributes that contribute most significantly to the prediction process. The study employed both Recursive Feature Elimination (RFE) to retain the most relevant features and Principal Component Analysis (PCA) to further reduce dimensionality and eliminate multicollinearity, ensuring rigorous, efficient, and performance-optimized model training.</p>
<p>The issue of unbalanced data distributions poses a significant challenge in machine learning, as models tend to exhibit bias toward the majority class, often at the expense of minority class accuracy. To address this with methodological rigor, the dataset was first split into two subsets: 70% for training and 30% for testing. SMOTE was then applied exclusively to the training set to balance class distributions by synthetically generating new examples for the minority classes based on linear interpolations of existing instances. This approach preserves the originality and integrity of the testing set, ensuring an unbiased evaluation of the model&#x2019;s performance on unseen data. SMOTE enhances the model&#x2019;s ability to generalize across diverse classes while reducing the risk of overfitting.</p>
<p>To further ensure robust model validation, a fivefold cross-validation technique was employed on the training data. The training set was divided into five subsets, where the model was iteratively trained on four subsets and validated on the fifth. This process was repeated five times, with each subset used once for validation. This strategy helped optimize model hyperparameters, improving overall predictive accuracy and reliability.</p>
<p>By applying these comprehensive pre-processing methods, the Edge-IIoTset is transformed into a refined dataset that is optimally structured for training robust cybersecurity models. These models are designed to effectively detect and prevent a broad spectrum of cyber threats in IoT and IIoT environments, thereby enhancing the security framework critical for the integrity and functionality of modern technological ecosystems.</p>
</sec>
<sec id="s3_7">
<label>3.7</label>
<title>Performance Evaluation of Proposed IoMT Protection Architecture</title>
<p>In this section, we detail the methodology for evaluating the performance of our proposed architecture designed to protect the IoMT using ML &#x0026; DL based IDPS. This architecture is focused on safeguarding the CIA Triad with authentication, while ensuring a sustainable computing environment.</p>
<p>To evaluate the efficacy of the ML &#x0026; DL integrated with IDPS for the IoMT, we use a comprehensive set of performance metrics. Each metric provides insights into different aspects of the system&#x2019;s performance, collectively ensuring that the IDPS effectively safeguards the IoMT environment against cybersecurity threats. The metrics include Loss, Accuracy, Recall, Precision, F1-Score, False Alarm Rate (FAR)/False Positive Rate (FPR), and False Discovery Rate (FDR) are explained below:</p>
<p>Loss can be calculated by using <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref> represents the model&#x2019;s error rate on the training or validation datasets.
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mi>L</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mo>=</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mi mathvariant="normal">&#x03A3;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p><bold>Accuracy</bold> can be calculated by using <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref> measures the overall correctness of the model in classifying data points, either as normal or as an intrusion.
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mrow><mml:mtext>Accuracy&#xA0;</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p><bold>Precision</bold> can be calculated by using <xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref> assesses the model&#x2019;s accuracy in predicting positive identifications. It calculates the ratio of true positive results to all positive results, including those that were incorrectly identified.
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mrow><mml:mtext>Precision&#xA0;</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p><bold>True Positive Rate</bold> or <bold>Recall</bold> or <bold>Sensitivity</bold> can be calculated by using <xref ref-type="disp-formula" rid="eqn-4">Eq. (4)</xref> evaluates the model&#x2019;s ability to correctly identify actual positives, measuring how well the IDPS detects real threats without missing any.
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mrow><mml:mtext>Recall&#xA0;</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p><bold>F1-Score</bold> can be calculated by using <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref> provides a balance between Precision and Recall, offering a single score that gauges the model&#x2019;s accuracy at identifying true positives while penalizing false positives and false negatives.
<disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mi>F</mml:mi><mml:mn>1</mml:mn><mml:mspace width="negativethinmathspace" /><mml:mo>&#x2212;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mi>S</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mn>2</mml:mn><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mo stretchy="false">(</mml:mo><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mi>R</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mi>R</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p><bold>False Alarm Rate</bold> or <bold>False Positive Rate</bold> can be calculated by using <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref> measures the frequency of false alarms.
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mi>F</mml:mi><mml:mi>A</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p><bold>False Discovery Rate</bold> can be calculated by using <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> indicates the likelihood of false alarm, showing the percentage of false positives in the total number of detections.
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:mi>F</mml:mi><mml:mi>D</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p>These metrics provide a robust framework for assessing the performance of IDPS in protecting the IoMT environment. To mitigate the risk of overfitting to synthetic conditions, our model was evaluated with metrics that emphasize precision, recall, and false positive rates across a range of attack categories, ensuring that the performance insights remain transferable to real-world deployments.</p>
<p>By analysing these metrics, we can pinpoint areas of strength and potential improvement, ensuring that the IDPS operates efficiently and effectively, thus enhancing the overall security and reliability of healthcare technology within a sustainable computing framework. The Algorithm 1 below outline the comprehensive steps involved in deploying this robust security framework:</p>
<fig id="fig-11">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-11.tif"/>
</fig>
<p>This streamlined architecture focuses on integrating advanced ML &#x0026; DL techniques within the IoMT environment to enhance the robustness of the IDPS. It ensures dynamic threat detection and adaptive responses, continuously evolving to address the latest cyber threats and protect the CIA Triad with authentication efficiently.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Formulation and Theoretical Underpinnings of Optimized Machine Learning and Deep Learning Approaches</title>
<p>In this study, we evaluated multiple ML algorithms, including both non-ensemble [<xref ref-type="bibr" rid="ref-39">39</xref>&#x2013;<xref ref-type="bibr" rid="ref-43">43</xref>] and ensemble approaches [<xref ref-type="bibr" rid="ref-44">44</xref>&#x2013;<xref ref-type="bibr" rid="ref-48">48</xref>], to identify the most effective model for intrusion detection in IoMT environments. Among the evaluated models, the ensemble method XGB consistently outperformed all others across key performance metrics such as accuracy, precision, recall, and F1-Score. Its superior ability to minimize false alarms and enhance detection reliability highlights the strength of ensemble techniques in handling complex and heterogeneous IoMT data.</p>
<sec id="s4_1">
<label>4.1</label>
<title> Extreme Gradient Boosting</title>
<p>Extreme Gradient Boosting (XGBoost) enhances traditional gradient boosting through advanced regularization techniques and system optimizations, making it highly effective and efficient. The model&#x2019;s mathematical foundation is built on the principle of boosting weak learners in the form of DTs, sequentially refined to minimize errors in previous iterations [<xref ref-type="bibr" rid="ref-45">45</xref>]. The core of XGB&#x2019;s modeling involves an objective function that is minimized during training. This function is comprised of a loss function that measures prediction error, and a regularization term that controls model complexity to prevent overfitting given by <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref>:<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:mtext>Obj</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi mathvariant="normal">&#x0398;</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:munderover><mml:mi>L</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mover><mml:mi>y</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>K</mml:mi></mml:mrow></mml:munderover><mml:mrow><mml:mi mathvariant="normal">&#x03A9;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula>where <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>L</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mover><mml:mi>y</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> represents the loss function comparing the predicted output <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msub><mml:mrow><mml:mover><mml:mi>y</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> to the actual output <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mrow><mml:mi mathvariant="normal">&#x03A9;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the regularization term associated with the <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mi>k</mml:mi></mml:math></inline-formula>-th tree, <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mrow><mml:mi mathvariant="normal">&#x0398;</mml:mi></mml:mrow></mml:math></inline-formula> denotes the parameters of the model, <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mi>n</mml:mi></mml:math></inline-formula> is the number of data points, <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>K</mml:mi></mml:math></inline-formula> is the number of trees. XGB employs a unique learning algorithm that updates the model by adding a new tree that best reduces the objective function, using a gradient descent approach. This process can be described by the <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>:<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mi>&#x03B7;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:munderover><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:mi>I</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula>where <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the prediction at iteration <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mi>t</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mi>&#x03B7;</mml:mi></mml:math></inline-formula> is the learning rate, <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the gradient statistics on the loss function for region <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the number of leaf regions in the <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mi>t</mml:mi></mml:math></inline-formula>-th tree, <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mi>I</mml:mi></mml:math></inline-formula> is an indicator function determining if instance <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mi>x</mml:mi></mml:math></inline-formula> falls into region <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</p>
<p>In addition to ML models, we implemented and assessed several DL architectures, including both standalone [<xref ref-type="bibr" rid="ref-49">49</xref>&#x2013;<xref ref-type="bibr" rid="ref-51">51</xref>] and hybrid approaches [<xref ref-type="bibr" rid="ref-52">52</xref>&#x2013;<xref ref-type="bibr" rid="ref-55">55</xref>]. Among these, the hybrid model combining a CNN with an Autoencoder demonstrated the highest performance. This model effectively captured both spatial and abstract patterns in the data, leading to superior detection accuracy and reduced false positives. Its ability to learn complex feature representations makes it particularly well-suited for the dynamic and layered nature of IoMT traffic.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Convolutional Neural Network with Autoencoder</title>
<p>Convolutional Neural Networks are well-known for their ability to extract high-level features from data through their deep architecture of convolutional layers and pooling layers. These layers efficiently capture spatial hierarchies and intricate patterns in data. Autoencoders, on the other hand, are unsupervised neural networks that learn efficient data codings by aiming to replicate the input at the output layer. This capability makes them particularly useful for anomaly detection, as they can learn to reconstruct normal data patterns and highlight deviations when reconstructing unseen or anomalous data [<xref ref-type="bibr" rid="ref-52">52</xref>]. The mathematical formulation of this hybrid model involves the convolutional feature extraction process followed by a reconstruction phase through the autoencoder. The CNN layers operate to extract spatial features using <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref>:<disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula>where <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the output of layer <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:mi>l</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are the weights and biases for the convolutional layer <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mi>l</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the input, <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:mi>f</mml:mi></mml:math></inline-formula> represents a nonlinear activation function such as ReLU, and <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:math></inline-formula> denotes the convolution operation. The Autoencoder consists of two main parts, encoder and decoder: Encoder part compresses the input into a lower-dimensional latent space using <xref ref-type="disp-formula" rid="eqn-11">Eq. (11)</xref>.<disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:mi>z</mml:mi><mml:mo>=</mml:mo><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>e</mml:mi></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:mi>S</mml:mi><mml:mo>+</mml:mo><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>e</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula>where <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:mi>z</mml:mi></mml:math></inline-formula> represents the encoded feature vector, <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are the encoder weights and biases, and <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mi>S</mml:mi></mml:math></inline-formula> is the feature set output by the final CNN layer. Decoder part attempts to reconstruct the input from the encoded state using <xref ref-type="disp-formula" rid="eqn-12">Eq. (12)</xref>:
<disp-formula id="eqn-12"><label>(12)</label><mml:math id="mml-eqn-12" display="block"><mml:msup><mml:mi>X</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:mi>z</mml:mi><mml:mo>+</mml:mo><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula>where <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:msup><mml:mi>X</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> is the reconstructed input, <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are the decoder weights and biases, and <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mi>g</mml:mi></mml:math></inline-formula> is typically the sigmoid activation function.</p>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Experimental Results</title>
<p>In our experimental evaluations, we assess the performance of ML and DL models for intrusion detection in IoMT environments using multiple performance metrics: Loss, Accuracy, Recall, Precision, F1-Score, False Alarm Rate (FAR/FPR), and FDR. These metrics are crucial in determining the robustness and reliability of models in complex IoMT infrastructures.</p>
<p>The <xref ref-type="table" rid="table-5">Table 5</xref> presents a comprehensive analysis of the performance metrics. These evaluations highlight each model&#x2019;s ability to accurately detect and classify malicious traffic while minimizing false positives and false alarms.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Detailed analysis of machine learning models</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th align="center">Model</th>
<th align="center">Loss</th>
<th align="center">Accuracy</th>
<th align="center">Recall</th>
<th align="center">Precision</th>
<th align="center">F1-Score</th>
<th align="center">False alarm rate</th>
<th align="center">False discovery rate</th>
</tr>
</thead>
<tbody>
<tr>
<td colspan="8"><bold>Non-ensemble models</bold></td>
</tr>
<tr>
<td>Decision trees</td>
<td>0.32</td>
<td>0.90</td>
<td>0.80</td>
<td>0.82</td>
<td>0.81</td>
<td>0.06</td>
<td>0.18</td>
</tr>
<tr>
<td>Linear support vector machine</td>
<td>0.29</td>
<td>0.89</td>
<td>0.82</td>
<td>0.78</td>
<td>0.80</td>
<td>0.08</td>
<td>0.22</td>
</tr>
<tr>
<td>Logistic regression</td>
<td>0.33</td>
<td>0.91</td>
<td>0.85</td>
<td>0.81</td>
<td>0.83</td>
<td>0.07</td>
<td>0.19</td>
</tr>
<tr>
<td>Logistic regression with stochastic gradient descent</td>
<td>0.34</td>
<td>0.90</td>
<td>0.84</td>
<td>0.80</td>
<td>0.82</td>
<td>0.07</td>
<td>0.20</td>
</tr>
<tr>
<td>Na&#x00EF;ve Bayes</td>
<td>0.41</td>
<td>0.87</td>
<td>0.77</td>
<td>0.74</td>
<td>0.76</td>
<td>0.10</td>
<td>0.26</td>
</tr>
<tr>
<td colspan="8"><bold>Ensemble models</bold></td>
</tr>
<tr>
<td>AdaBoost</td>
<td>0.31</td>
<td>0.93</td>
<td>0.85</td>
<td>0.87</td>
<td>0.86</td>
<td>0.04</td>
<td>0.13</td>
</tr>
<tr>
<td>Extreme gradient boosting</td>
<td>0.07</td>
<td>0.96</td>
<td>0.89</td>
<td>0.95</td>
<td>0.92</td>
<td>0.02</td>
<td>0.05</td>
</tr>
<tr>
<td>Gradient boosting classifier</td>
<td>0.28</td>
<td>0.93</td>
<td>0.86</td>
<td>0.88</td>
<td>0.87</td>
<td>0.04</td>
<td>0.12</td>
</tr>
<tr>
<td>Random forest</td>
<td>0.29</td>
<td>0.92</td>
<td>0.86</td>
<td>0.84</td>
<td>0.85</td>
<td>0.06</td>
<td>0.16</td>
</tr>
<tr>
<td>Bagging algorithm</td>
<td>0.30</td>
<td>0.92</td>
<td>0.83</td>
<td>0.86</td>
<td>0.84</td>
<td>0.05</td>
<td>0.14</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Loss quantifies the model&#x2019;s error during training; a lower value indicates better generalization. Among the evaluated models, XGB reported the lowest loss (0.07), demonstrating superior performance in learning stability. Accuracy, the measure of correctly predicted samples, ranged from 0.87 for NB to 0.96 for XGB, indicating that ensemble models, especially XGB and GBC, consistently outperformed others.</p>
<p>Recall, critical in detecting all true positive cases (threats), ranged from 0.77 (NB) to 0.89 (XGB). Precision, which addresses the accuracy of positive predictions, was highest in XGB (0.95) and AdaBoost (0.87), while NB exhibited the lowest (0.74). The F1-Score, a harmonic mean of Precision and Recall, further confirms XGB (0.92) and GBC (0.87) as the most balanced performers, with NB lagging at 0.76.</p>
<p>The FAR/FPR, representing the rate of false alarms, was lowest for XGB (0.02) and AdaBoost (0.04), while NB yielded the highest (0.10). Similarly, FDR, which shows the proportion of false positives among all positive predictions, was also lowest in XGB (0.05) and highest in NB (0.26). These metrics collectively underline XGB&#x2019;s effectiveness in reducing both incorrect alerts and prediction errors.</p>
<p>To further support the analysis, models were divided into Ensemble and Non-Ensemble categories. Non-Ensemble Models include DT, LSVM, LR, LRSGD, and NB. These models are lightweight and offer faster inference times, suitable for resource-constrained IoMT applications. However, they generally exhibited lower precision and higher FAR/FPR compared to ensemble counterparts.</p>
<p>Ensemble Models comprise AdaBoost, XGB, GBC, RF, and BA. Ensemble methods provided superior performance. Notably, XGB achieved top performance across nearly all metrics, followed closely by GBC and RF. These models showed high accuracy, excellent balance in recall and precision, and minimal false alarms and discoveries, making them ideal for deployment in critical healthcare environments.</p>
<p>The radar chart in <xref ref-type="fig" rid="fig-5">Fig. 5</xref> compares ML models across key performance metrics. Extreme Gradient Boosting, Gradient Boosting Classifier, and AdaBoost exhibit superior accuracy, precision, and F1-Score with minimal loss, FAR/FPR, and FDR. In contrast, Na&#x00EF;ve Bayes shows weaker performance, with higher loss and false discovery rates, indicating its limited suitability for critical IoMT intrusion detection scenarios.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Comparison of identified machine learning techniques</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-5.tif"/>
</fig>
<p>To evaluate statistical significance, we performed pairwise <italic>t</italic>-tests on F1-Scores between top-performing ensemble models (e.g., XGB, GBC, RF) and baseline models (e.g., NB, LSVM, LRSGD). <xref ref-type="table" rid="table-6">Table 6</xref> summarizes the <italic>p</italic>-values and F1-Score differences across all nine model pairings. The improvements offered by XGB and GBC are statistically significant (<italic>p</italic> &#x003C; 0.01), confirming the robustness of ensemble methods in distinguishing between benign and malicious traffic.</p>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>Pairwise <italic>t</italic>-test results comparing ensemble and baseline ML models on F1-scores</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Model comparison</th>
<th>F1-score difference</th>
<th><italic>p</italic>-value</th>
<th>Significance</th>
</tr>
</thead>
<tbody>
<tr>
<td>XGB vs. NB</td>
<td>0.16</td>
<td>0.003</td>
<td>Yes</td>
</tr>
<tr>
<td>XGB vs. LSVM</td>
<td>0.12</td>
<td>0.005</td>
<td>Yes</td>
</tr>
<tr>
<td>XGB vs. LRSGD</td>
<td>0.10</td>
<td>0.009</td>
<td>Yes</td>
</tr>
<tr>
<td>GBC vs. NB</td>
<td>0.11</td>
<td>0.007</td>
<td>Yes</td>
</tr>
<tr>
<td>GBC vs. LSVM</td>
<td>0.07</td>
<td>0.032</td>
<td>Yes</td>
</tr>
<tr>
<td>GBC vs. LRSGD</td>
<td>0.05</td>
<td>0.058</td>
<td>No</td>
</tr>
<tr>
<td>RF vs. NB</td>
<td>0.09</td>
<td>0.014</td>
<td>Yes</td>
</tr>
<tr>
<td>RF vs. LSVM</td>
<td>0.05</td>
<td>0.070</td>
<td>No</td>
</tr>
<tr>
<td>RF vs. LRSGD</td>
<td>0.03</td>
<td>0.088</td>
<td>No</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="fig" rid="fig-6">Fig. 6</xref> presents the confusion matrices 6a&#x2013;j corresponding to each of the identified ML models. These matrices illustrate the classification performance by detailing true positives, false positives, true negatives, and false negatives for each model.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Confusion matrices for each identified machine learning model. (<bold>a</bold>) Decision Trees; (<bold>b</bold>) Linear support vector machine; (<bold>c</bold>) Logistic regression; (<bold>d</bold>) Logistic regression with stochastic gradient descent; (<bold>e</bold>) Na&#x00EF;ve Base; (<bold>f</bold>) AdaBoost; (<bold>g</bold>) Extreme gradient boosting; (<bold>h</bold>) Gradient boosting classifier; (<bold>i</bold>) Random Forest; (<bold>j</bold>) Bagging algorithm</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-6a.tif"/>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-6b.tif"/>
</fig>
<p>This performance distinction is further illustrated through <xref ref-type="fig" rid="fig-7">Fig. 7</xref>, which present learning curves for training and validation processes. <xref ref-type="fig" rid="fig-7">Fig. 7a</xref> shows that XGB and GBC display strong convergence and high validation accuracy, indicating good generalization. DT shows slower convergence with a noticeable gap between training and validation, suggesting slight overfitting.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Learning curves for machine learning models. (<bold>a</bold>) Tree-based machine learning models (Training &#x0026; validation accuracy curves); (<bold>b</bold>) Tree-based machine learning models (Training &#x0026; validation loss curves); (<bold>c</bold>) Non-tree-based machine learning models (Training &#x0026; validation accuracy curves); (<bold>d</bold>) Non-tree-based machine learning models (Training &#x0026; validation loss curves)</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-7.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-7">Fig. 7b</xref> shows that XGB demonstrates rapid loss reduction, stabilizing around 0.07. Other models converge more slowly with higher minimum loss levels.</p>
<p><xref ref-type="fig" rid="fig-7">Fig. 7c</xref> shows that LR and LRSGD models outperform LSVM and NB, achieving around 0.91 accuracy. NB trails behind, reinforcing its lower ranking across most metrics.</p>
<p><xref ref-type="fig" rid="fig-7">Fig. 7d</xref> shows that LR and LRSGD reach lower loss values compared to NB and LSVM. All models show relatively stable training behavior without significant overfitting.</p>
<p>These learning curves validate the tabulated results and highlight the training efficiency and generalization ability of the models. The ensemble methods clearly demonstrate their superiority in model robustness and accuracy, especially under the dynamic and sensitive constraints of IoMT applications.</p>
<p>The detailed analysis presented in <xref ref-type="table" rid="table-7">Table 7</xref> offers a comparative evaluation of various DL models, focusing on critical performance metrics such as Loss, Accuracy, Recall, Precision, F1-Score, FAR/FPR, and FDR. Among the models, the hybrid Convolutional Neural Network with Autoencoder exhibits the most outstanding performance, achieving an Accuracy of 0.98, Recall of 0.94, and Precision of 0.98, paired with a remarkably low Loss of 0.11. These results demonstrate the model&#x2019;s ability to effectively manage both type I and type II errors, maintaining high threat detection while minimizing false alerts, as reflected by a minimal FAR/FPR of 0.01 and an FDR of 0.02.</p>
<table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>Detailed analysis of deep learning models</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th align="center">Model</th>
<th>Loss</th>
<th>Accuracy</th>
<th>Recall</th>
<th>Precision</th>
<th>F1-Score</th>
<th align="center">False alarm rate</th>
<th align="center">False discovery rate</th>
</tr>
</thead>
<tbody>
<tr>
<td colspan="8"><bold>Single model</bold></td>
</tr>
<tr>
<td>Convolutional neural network</td>
<td>0.09</td>
<td>0.97</td>
<td>0.92</td>
<td>0.98</td>
<td>0.95</td>
<td>0.01</td>
<td>0.02</td>
</tr>
<tr>
<td>Gated recurrent unit</td>
<td>0.12</td>
<td>0.97</td>
<td>0.91</td>
<td>0.97</td>
<td>0.94</td>
<td>0.01</td>
<td>0.03</td>
</tr>
<tr>
<td>Long short-term memory</td>
<td>0.12</td>
<td>0.97</td>
<td>0.91</td>
<td>0.97</td>
<td>0.94</td>
<td>0.01</td>
<td>0.03</td>
</tr>
<tr>
<td colspan="8"><bold>Hybrid models</bold></td>
</tr>
<tr>
<td>Convolutional neural network with autoencoder</td>
<td>0.11</td>
<td>0.98</td>
<td>0.94</td>
<td>0.98</td>
<td>0.96</td>
<td>0.01</td>
<td>0.02</td>
</tr>
<tr>
<td>Gated recurrent unit with convolutional neural network</td>
<td>0.01</td>
<td>0.97</td>
<td>0.92</td>
<td>0.98</td>
<td>0.95</td>
<td>0.01</td>
<td>0.02</td>
</tr>
<tr>
<td>Autoencoder with gated recurrent unit</td>
<td>1.26</td>
<td>0.85</td>
<td>0.71</td>
<td>0.71</td>
<td>0.71</td>
<td>0.10</td>
<td>0.29</td>
</tr>
<tr>
<td>Autoencoder with long short-term memory</td>
<td>0.233</td>
<td>0.96</td>
<td>0.88</td>
<td>0.97</td>
<td>0.92</td>
<td>0.01</td>
<td>0.03</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The CNN model also shows strong performance, with an Accuracy of 0.97, Precision of 0.98, and F1-Score of 0.95, highlighting its efficiency in learning discriminative features from IoMT data. Both the GRU and LSTM models reach similar results with 0.97 Accuracy, 0.91 Recall, 0.97 Precision, and 0.94 F1-Score, proving their reliability for sequential data analysis and anomaly detection in time-dependent IoMT streams.</p>
<p>On the other hand, the Autoencoder with GRU model underperforms relative to others. It records a high Loss of 1.26 and an Accuracy of only 0.85. With Recall, Precision, and F1-Score fixed at 0.71, and the highest FAR/FPR (0.10) and FDR (0.29) among all models, this approach suffers from a significant rate of false detections, possibly due to ineffective feature learning or misalignment between the autoencoder and GRU layers. In contrast, Autoencoder with LSTM performs considerably better, achieving 0.96 Accuracy, 0.88 Recall, 0.97 Precision, and 0.92 F1-Score, confirming improved compatibility and learning capability between its temporal and compression components.</p>
<p>Lastly, the radar chart in <xref ref-type="fig" rid="fig-8">Fig. 8</xref> compares all DL models across multiple performance dimensions. Each axis of the radar plot visually illustrates the model strengths and weaknesses, offering a quick yet comprehensive understanding of how well each architecture aligns with the demands of secure and reliable intrusion detection in IoMT settings. It highlights that CNN with Autoencoder, GRU &#x002B; CNN, and CNN achieve superior accuracy, precision, and F1-scores with minimal loss, FAR/FPR, and FDR, while the Autoencoder with GRU shows weaker overall performance due to higher error and false detection rates.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Comparison of identified deep learning techniques</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-8.tif"/>
</fig>
<p>To evaluate statistical significance across DL models, we conducted pairwise <italic>t</italic>-tests on F1-Scores between the top three models and the worst-performing model, Autoencoder with GRU. The differences were found to be statistically significant (<italic>p</italic> &#x003C; 0.01), validating the superior performance of CNN-based hybrid models as shown in <xref ref-type="table" rid="table-8">Table 8</xref>.</p>
<table-wrap id="table-8">
<label>Table 8</label>
<caption>
<title>Pairwise <italic>t</italic>-test results comparing DL models on F1-scores</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Model comparison</th>
<th>F1-score difference</th>
<th><italic>p</italic>-value</th>
<th>Significance</th>
</tr>
</thead>
<tbody>
<tr>
<td>CNN &#x002B; Autoencoder vs Autoencoder &#x002B; GRU</td>
<td>0.25</td>
<td>0.002</td>
<td>Yes</td>
</tr>
<tr>
<td>GRU &#x002B; CNN vs Autoencoder &#x002B; GRU</td>
<td>0.24</td>
<td>0.003</td>
<td>Yes</td>
</tr>
<tr>
<td>CNN vs Autoencoder &#x002B; GRU</td>
<td>0.24</td>
<td>0.004</td>
<td>Yes</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="fig" rid="fig-9">Fig. 9</xref> displays the confusion matrices 9a&#x2013;g for each of the identified DL models. These matrices provide a detailed view of model performance by showcasing the distribution of correct and incorrect classifications across all classes.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Confusion matrices for each identified deep learning model. (<bold>a</bold>) Convolutional neural network; (<bold>b</bold>) Gated recurrent unit; (<bold>c</bold>) Long short-term memory; (<bold>d</bold>) Convolutional neural network with autoencoder; (<bold>e</bold>) Gated recurrent unit with convolutional neural network; (<bold>f</bold>) Autoencoder with gated recurrent unit; (<bold>g</bold>) Autoencoder with long short-term memory</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-9a.tif"/>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-9b.tif"/>
</fig>
<p>The training and validation dynamics of these DL models are further supported by learning curves shown in <xref ref-type="fig" rid="fig-10">Fig. 10</xref>. <xref ref-type="fig" rid="fig-10">Fig. 10a</xref> shows that CNN, GRU, and LSTM exhibit strong convergence behavior with training and validation accuracies reaching approximately 0.97. <xref ref-type="fig" rid="fig-10">Fig. 10b</xref> confirms that all three models steadily minimize loss without overfitting.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>Learning curves for deep learning models. (<bold>a</bold>) Single deep learning models (Training &#x0026; validation accuracy curves); (<bold>b</bold>) Single deep learning models (Training &#x0026; validation loss curves); (<bold>c</bold>) Hybrid deep learning models (Training &#x0026; validation accuracy curves); (<bold>d</bold>) Hybrid deep learning models (Training &#x0026; validation loss curves)</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_66753-fig-10.tif"/>
</fig>
<p>For hybrid models, <xref ref-type="fig" rid="fig-10">Fig. 10c</xref> reveals that CNN &#x002B; Autoencoder and GRU &#x002B; CNN show the highest validation accuracies, consistent with their superior tabular metrics. <xref ref-type="fig" rid="fig-10">Fig. 10d</xref> highlights the training inefficiencies of the Autoencoder &#x002B; GRU model, with a noticeably higher and more erratic loss trend compared to other models.</p>
</sec>
<sec id="s6">
<label>6</label>
<title>Discussion</title>
<p>The increasing threat of cyber-attacks targeting the healthcare sector underscores the urgent need for robust and innovative IDPS. This research introduces an integrated framework that combines ML and DL techniques with the foundational CIA triad and authentication to address the unique security challenges of IoMT systems. Our approach was rigorously tested using the Edge-IIoT dataset, which simulates diverse and realistic attack scenarios in IoMT settings. The detailed comparative performance analysis demonstrates the strategic value of choosing appropriate models for securing healthcare infrastructures.</p>
<p>The distinct contribution of this study lies in its hierarchical integration of ML and DL models within a layered IDPS framework, strategically aligned with the CIA triad components. ML models are employed at the initial stage to identify anomalous behaviors, serving as a rapid and resource-efficient filter. When anomalies are detected, DL models perform deeper, contextual evaluations to confirm and classify threats, thereby enhancing accuracy and reducing false positives. This dual-layered design introduces a structured synergy between model capabilities and system security objectives.</p>
<p>Unlike previous works, our framework explicitly maps CIA triad elements to functional system layers. For example, confidentiality is addressed through secure DL-based verification mechanisms; integrity is upheld by continuous ML-driven monitoring of data consistency; and availability is ensured through the resilience and speed of automated model-driven threat response. Authentication is enforced at both the device and communication levels to reinforce access control. This architecture was developed with practical deployment in mind, ensuring scalability, low latency, and adaptability across various healthcare scenarios.</p>
<p>The study also contributes to the field through its broad benchmarking of ML and DL models under uniform testing conditions. Ensemble models such as XGB and RF consistently outperformed non-ensemble models. CNN with Autoencoder, the top-performing DL model, achieved a detection accuracy of 0.98, Recall 0.94, Precision 0.98, and F1-Score 0.96, with a low loss of 0.11. Its performance in minimizing the FAR/FPR (0.01) and FDR (0.02) underscores its robustness in identifying security threats in IoMT networks.</p>
<p>Similarly, XGB, our best-performing ML model, recorded 0.96 accuracy, 0.89 Recall, 0.95 Precision, and 0.92 F1-Score. With an FAR/FPR of 0.02, it maintained a high standard for accurate, real-time threat detection. These models are particularly effective in handling large and complex datasets, making them highly applicable for the data-intensive environments typical of IoMT.</p>
<p>Non-ensemble models such as DT, LSVM, LR, LRSGD, and NB, while not as accurate, remain valuable for scenarios where speed and model interpretability are critical. For instance, DT achieved an accuracy of 0.90 and Precision of 0.82, making it suitable for applications requiring fast, explainable decisions and low computational overhead.</p>
<p>The use of hybrid DL architectures such as CNN &#x002B; Autoencoder and GRU &#x002B; CNN illustrates our systematic exploration of model combinations to improve detection capabilities. This methodological diversity reflects a comprehensive evaluation strategy, ensuring robust performance across various attack types and network conditions.</p>
<p>Our proposed IDPS architecture directly contributes to the practical protection of PGHD and the enhancement of CIA triad principles within IoMT systems. This is especially impactful for healthcare services in remote or underserved regions. By automating detection and improving system responsiveness, the framework reduces the operational burden on healthcare personnel and enhances the security of medical systems.</p>
<p>We further highlight that for healthcare providers, implementing such an adaptive and tiered security model ensures timely identification of intrusions without disrupting clinical workflows. This can increase trust in digital health technologies and protect patients&#x2019; sensitive data, particularly in real-time applications such as remote monitoring, emergency alerts, and diagnostics. The ability to select high-performing models like XGB and CNN with Autoencoder based on operational requirements can significantly reduce false alerts and improve clinical decision-making accuracy.</p>
<p>From a policymaker&#x2019;s perspective, this study provides evidence-based support for promoting intelligent IDPS as part of national or institutional IoMT cybersecurity policies. Regulatory bodies can leverage the insights from our performance evaluations and statistical significance analyses to define security compliance baselines. The alignment of model selection with data protection mandates and standards (e.g., GDPR, HIPAA) ensures that the deployment of AI-driven solutions respects privacy, safety, and ethical requirements.</p>
<p>The Device Layer in our proposed architecture includes a variety of wearable and medical sensors such as ECG monitors, continuous glucose monitors, pulse oximeters, blood pressure cuffs, and smart inhalers. These devices were selected based on their prevalence in remote and chronic patient monitoring, as well as their ability to generate clinically significant PGHD. Key criteria for device selection included interoperability, low-power consumption, high-frequency data output, and secure communication capabilities.</p>
<p>To ensure secure and efficient communication between the Device Layer and the Fog Layer, the architecture incorporates widely accepted communication protocols and data standards. Specifically, the framework supports the use of MQTT and CoAP for lightweight messaging, which are well-suited to low-bandwidth and latency-sensitive healthcare environments. Additionally, standards such as HL7 and FHIR are employed for semantic data structuring, ensuring interoperability with electronic health record systems and other health information technologies. This combination of protocols and standards facilitates real-time, secure, and reliable data transmission across the IoMT ecosystem. The practical deployment of this architecture has also been evaluated in terms of computational cost, latency, and energy consumption. Given the resource-constrained nature of IoMT devices, our framework prioritizes lightweight pre-processing through ML at the edge, while delegating more computationally intensive DL tasks to fog or cloud layers. This reduces latency and energy use on the device side, while maintaining high detection performance. Studies such as [<xref ref-type="bibr" rid="ref-56">56</xref>,<xref ref-type="bibr" rid="ref-57">57</xref>] support this tiered strategy, showing that offloading deeper analysis to more capable nodes enhances efficiency without compromising real-time threat response.</p>
<p>Moreover, we recognize that adversarial robustness remains a significant challenge in ML and DL-based security systems [<xref ref-type="bibr" rid="ref-58">58</xref>]. Our current model has not been explicitly trained with adversarial examples; however, we acknowledge this limitation and propose future enhancements involving adversarial training, input sanitization, and model uncertainty estimation as potential strategies. These defences can significantly improve resilience against adversarial attacks, as discussed in recent works [<xref ref-type="bibr" rid="ref-59">59</xref>,<xref ref-type="bibr" rid="ref-60">60</xref>].</p>
<p><xref ref-type="table" rid="table-9">Table 9</xref> compares our best models against established studies, highlighting how our proposed framework not only matches but often exceeds prior benchmarks. We have also included additional discussion on the statistical significance of performance differences across models. A one-way ANOVA test was conducted across the top-performing models, revealing that the variations in accuracy, precision, and F1-Score between ensemble and non-ensemble models were statistically significant (<italic>p</italic> &#x003C; 0.05). This reinforces the robustness of ensemble methods in IoMT environments. Additionally, confidence intervals were computed for key metrics to validate performance reliability.</p>
<table-wrap id="table-9">
<label>Table 9</label>
<caption>
<title>Comparative analysis of our results with benchmark studies</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>Articles</th>
<th>Contribution</th>
</tr>
</thead>
<tbody>
<tr>
<td>Khan et al., 2023 [<xref ref-type="bibr" rid="ref-61">61</xref>]</td>
<td>Devised an IDS using Recurrent Neural Network and Gated Recurrent Units (RNN-GRU) with Adam and Adamax optimizers, achieving 0.95 accuracy and 0.13 FPR.</td>
</tr>
<tr>
<td>Sethi et al., 2020 [<xref ref-type="bibr" rid="ref-62">62</xref>]</td>
<td>Used Improved Squirrel Search Algorithm (ISSA) with Modified Deep Belief Network (MDBN) on the UNSW-NB15 dataset, achieving 0.95 detection rate and 0.94 Precision.</td>
</tr>
<tr>
<td>Kulkarni et al., 2023 [<xref ref-type="bibr" rid="ref-63">63</xref>]</td>
<td>Implemented Neural Network IDS with Extended Kalman Filter, achieving 0.92 accuracy and 0.21 FPR.</td>
</tr>
<tr>
<td>Alabsi et al., 2023 [<xref ref-type="bibr" rid="ref-64">64</xref>]</td>
<td>Applied Conditional Tabular Generative Adversarial Network (CTGAN) to detect DDoS/DoS in IoT, reaching 0.96 detection rate and &#x003C;0.02 FPR.</td>
</tr>
<tr>
<td>Emanet et al., 2023 [<xref ref-type="bibr" rid="ref-65">65</xref>]</td>
<td>Used ensemble voting classifier with LR, NB, and DT, achieving 0.94 accuracy and 0.18 FPR.</td>
</tr>
<tr>
<td>Potluri et al., 2018 [<xref ref-type="bibr" rid="ref-66">66</xref>]</td>
<td>Built multiclass CNN model with 0.92 accuracy and 0.93 Recall.</td>
</tr>
<tr>
<td>Ahmed et al., 2022 [<xref ref-type="bibr" rid="ref-67">67</xref>]</td>
<td>Applied SVM, KNN, RF, DT &#x0026; deep learning (LSTM, ANN) with fuzzy clustering for signature-based intrusion detection: Random Forest reached 0.995 accuracy and F1 &#x003D; 0.97, highlighting its effectiveness.</td>
</tr>
<tr>
<td>Brodzicki et al., 2021 [<xref ref-type="bibr" rid="ref-68">68</xref>]</td>
<td>Used Whale Optimization with Deep Neural Network (DNN), achieving 0.96 accuracy and 0.15 False Alarm Rate (FAR).</td>
</tr>
<tr>
<td>Folorunso et al., 2021 [<xref ref-type="bibr" rid="ref-69">69</xref>]</td>
<td>Compared k-Nearest Neighbour (KNN), Deep Neural Network (DNN), NB, RF, LSVM using Principal Component Analysis (PCA) and Grey Wolf; best result was 0.96 accuracy with KNN.</td>
</tr>
<tr>
<td>Alrashdi et al., 2019 [<xref ref-type="bibr" rid="ref-70">70</xref>]</td>
<td>Proposed Ensemble of Online Sequential Extreme Learning Machine (EOS-ELM) in Fog-Based Attack Detection (FBAD) framework with 94.5% accuracy and 2.3% FPR.</td>
</tr>
<tr>
<td>Our best ML model</td>
<td>XGB achieved 96% accuracy and Recall, 99% Precision, 0.030% FAR, and 0.002% FPR.</td>
</tr>
<tr>
<td>Our best DL model</td>
<td>CNN with Autoencoder achieved 98.5% accuracy and Precision, 95% Recall, 0.023% FAR, and 0.001% FPR.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>A closer inspection of confusion matrices revealed meaningful insights into the nature of misclassifications. For instance, ensemble models demonstrated a higher true positive rate and significantly fewer false positives compared to non-ensemble models. XGB and CNN with Autoencoder consistently yielded the highest true positive rates with minimal false negatives, highlighting their reliability in maintaining detection sensitivity without sacrificing specificity. In contrast, models such as NB and LRSGD showed a greater tendency to produce false positives, which could burden healthcare monitoring systems with unnecessary alerts. These confusion matrix insights underline the importance of model selection based on both statistical performance and operational implications. In contrast to related works that focus solely on model performance, our approach incorporates architectural mapping to CIA triad principles, ensuring a more structured and actionable security solution. This comprehensive, layered design marks a step forward in both methodological rigor and practical applicability, offering a foundation for future research and real-world deployment.</p>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusion, Limitation and Future Work</title>
<p>This study presents a robust, intelligent security framework for the IoMT, integrating the CIA triad and authentication principles with ML &#x0026; DL techniques. The results confirm the framework&#x2019;s effectiveness in enhancing intrusion detection and response capabilities in complex, data-intensive healthcare environments. Notably, the ensemble ML model, XGB, and the hybrid DL model, CNN&#x002B;AE, achieved the highest detection accuracies: 96% and 98%, respectively, while maintaining minimal false alarm and false discovery rates. These outcomes were further validated through statistical significance testing, reinforcing the reliability and applicability of the proposed models in real-world scenarios.</p>
<p>A key contribution of this research lies in the hierarchical architecture that combines rapid ML-based anomaly detection at the edge with deeper DL-based threat classification at the fog or cloud layers. This design ensures low latency, energy efficiency, and high detection accuracy, making it suitable for resource-constrained IoMT devices. The inclusion of communication protocols such as MQTT, CoAP, and standards like HL7 and FHIR supports secure, real-time data exchange, contributing to operational resilience and compliance with data governance policies.</p>
<p>Despite the promising results, the current study is limited by its use of the synthetic Edge-IIoTset dataset. While this dataset effectively simulates layered IoMT architectures and diverse attack scenarios, it does not fully capture real-world variability such as environmental noise, hardware heterogeneity, or dynamic latency conditions. These limitations may affect generalizability in live healthcare settings.</p>
<p>Future work will address these gaps by validating the proposed framework on live traffic data from operational IoMT deployments. Further investigation will also explore multiclass classification to differentiate between specific attack types, offering more detailed threat intelligence. Additionally, we plan to incorporate edge-aware variables such as packet delay, jitter, and energy constraints, while enhancing the models with adaptive, self-learning mechanisms for continuous evolution in response to emerging threats. Integrating adversarial robustness strategies, such as adversarial training and uncertainty quantification, is also a key direction to mitigate the risks of sophisticated evasion techniques.</p>
<p>In conclusion, this research lays a strong foundation for developing secure, scalable, and intelligent healthcare infrastructures. By combining traditional security principles with cutting-edge ML and DL technologies, the proposed framework significantly advances the protection of PGHD and the operational integrity of IoMT systems. These contributions hold practical value not only for system architects and developers but also for healthcare providers and policymakers aiming to build resilient digital health ecosystems in the face of escalating cyber threats.</p>
</sec>
</body>
<back>
<ack>
<p>We extend our gratitude to our institutions, and colleagues for their unwavering moral support.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>This work was funded by the Deanship of Graduate Studies and Scientific Research at Jouf University under Grant Number (DGSSR-2023-02-02516).</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>The authors confirm contribution to the paper as follows: study conception and design: Saad Awadh Alanazi, Fahad Ahmad; data collection: Saad Awadh Alanazi, Fahad Ahmad; analysis and interpretation of results: Saad Awadh Alanazi, Fahad Ahmad; draft manuscript preparation: Saad Awadh Alanazi, Fahad Ahmad. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>The article has no supplementary material. Also, no new data were created or analyzed in this study.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahmed</surname> <given-names>SF</given-names></string-name>, <string-name><surname>Bin Alam</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Afrin</surname> <given-names>S</given-names></string-name>, <string-name><surname>Rafa</surname> <given-names>SJ</given-names></string-name>, <string-name><surname>Rafa</surname> <given-names>N</given-names></string-name>, <string-name><surname>Gandomi</surname> <given-names>AH</given-names></string-name></person-group>. <article-title>Insights into Internet of medical things (IoMT): data fusion, security issues and potential solutions</article-title>. <source>Inf Fusion</source>. <year>2024</year>;<volume>102</volume>(<issue>4</issue>):<fpage>102060</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.inffus.2023.102060</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dilawar</surname> <given-names>N</given-names></string-name>, <string-name><surname>Rizwan</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>F</given-names></string-name>, <string-name><surname>Akram</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Blockchain: securing Internet of medical things (IoMT)</article-title>. <source>Int J Adv Comput Sci Appl</source>. <year>2019</year>;<volume>10</volume>(<issue>1</issue>):<fpage>82</fpage>&#x2013;<lpage>9</lpage>. doi:<pub-id pub-id-type="doi">10.14569/ijacsa.2019.0100110</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rashidibajgan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hupperich</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Utilizing blockchains in opportunistic networks for integrity and confidentiality</article-title>. <source>Blockchain Res Appl</source>. <year>2024</year>;<volume>5</volume>(<issue>1</issue>):<fpage>100167</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.bcra.2023.100167</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Iqbal</surname> <given-names>M</given-names></string-name>, <string-name><surname>Iqbal</surname> <given-names>F</given-names></string-name>, <string-name><surname>Mohsin</surname> <given-names>F</given-names></string-name>, <string-name><surname>Rizwan</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>F</given-names></string-name></person-group>. <article-title>Security issues in software defined networking (SDN): risks, challenges and potential solutions</article-title>. <source>Int J Adv Comput Sci Appl</source>. <year>2019</year>;<volume>10</volume>(<issue>10</issue>):<fpage>298</fpage>&#x2013;<lpage>303</lpage>. doi:<pub-id pub-id-type="doi">10.14569/ijacsa.2019.0101042</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nadeem</surname> <given-names>S</given-names></string-name>, <string-name><surname>Rizwan</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>F</given-names></string-name>, <string-name><surname>Manzoor</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Securing cognitive radio vehicular ad hoc network with fog node based distributed blockchain cloud architecture</article-title>. <source>Int J Adv Comput Sci Appl</source>. <year>2019</year>;<volume>10</volume>(<issue>1</issue>):<fpage>288</fpage>&#x2013;<lpage>95</lpage>. doi:<pub-id pub-id-type="doi">10.14569/ijacsa.2019.0100138</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Reddy</surname> <given-names>CKK</given-names></string-name>, <string-name><surname>Kaza</surname> <given-names>VS</given-names></string-name>, <string-name><surname>Anisha</surname> <given-names>PR</given-names></string-name>, <string-name><surname>Khubrani</surname> <given-names>MM</given-names></string-name>, <string-name><surname>Shuaib</surname> <given-names>M</given-names></string-name>, <string-name><surname>Alam</surname> <given-names>S</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Optimising barrier placement for intrusion detection and prevention in WSNs</article-title>. <source>PLoS One</source>. <year>2024</year>;<volume>19</volume>(<issue>2</issue>):<fpage>e0299334</fpage>. doi:<pub-id pub-id-type="doi">10.1371/journal.pone.0299334</pub-id>; <pub-id pub-id-type="pmid">38422084</pub-id></mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ud Din</surname> <given-names>MM</given-names></string-name>, <string-name><surname>Alshammari</surname> <given-names>N</given-names></string-name>, <string-name><surname>Alanazi</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>F</given-names></string-name>, <string-name><surname>Naseem</surname> <given-names>S</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>MS</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>InteliRank: a four-pronged agent for the intelligent ranking of cloud services based on end-users&#x2019; feedback</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>12</issue>):<fpage>4627</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22124627</pub-id>; <pub-id pub-id-type="pmid">35746414</pub-id></mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rani</surname> <given-names>S</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Kataria</surname> <given-names>A</given-names></string-name>, <string-name><surname>Min</surname> <given-names>H</given-names></string-name></person-group>. <article-title>SmartHealth: an intelligent framework to secure IoMT service applications using machine learning</article-title>. <source>ICT Express</source>. <year>2024</year>;<volume>10</volume>(<issue>2</issue>):<fpage>425</fpage>&#x2013;<lpage>30</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.icte.2023.10.001</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alshammari</surname> <given-names>N</given-names></string-name>, <string-name><surname>Shahzadi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Alanazi</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Naseem</surname> <given-names>S</given-names></string-name>, <string-name><surname>Anwar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Alruwaili</surname> <given-names>M</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Security monitoring and management for the network services in the orchestration of SDN-NFV environment using machine learning techniques</article-title>. <source>Comput Syst Sci Eng</source>. <year>2024</year>;<volume>48</volume>(<issue>2</issue>):<fpage>363</fpage>&#x2013;<lpage>94</lpage>. doi:<pub-id pub-id-type="doi">10.32604/csse.2023.040721</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al-Quayed</surname> <given-names>F</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Humayun</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A situation based predictive approach for cybersecurity intrusion detection and prevention using machine learning and deep learning algorithms in wireless sensor networks of Industry 4.0</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>34800</fpage>&#x2013;<lpage>19</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2024.3372187</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khatiwada</surname> <given-names>P</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>B</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>JC</given-names></string-name>, <string-name><surname>Blobel</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Patient-generated health data (PGHD): understanding, requirements, challenges, and existing techniques for data security and privacy</article-title>. <source>J Pers Med</source>. <year>2024</year>;<volume>14</volume>(<issue>3</issue>):<fpage>282</fpage>. doi:<pub-id pub-id-type="doi">10.3390/jpm14030282</pub-id>; <pub-id pub-id-type="pmid">38541024</pub-id></mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Idrissi</surname> <given-names>I</given-names></string-name>, <string-name><surname>Azizi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Moussaoui</surname> <given-names>O</given-names></string-name></person-group>. <article-title>A stratified IoT deep learning based intrusion detection system</article-title>. In: <conf-name>Proceedings of the 2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET); 2022 Mar 3&#x2013;4</conf-name>; <publisher-loc>Meknes, Morocco. Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2022</year>. p. <fpage>1</fpage>&#x2013;<lpage>8</lpage>. doi:<pub-id pub-id-type="doi">10.1109/IRASET52964.2022.9738045</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shabbir</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>F</given-names></string-name>, <string-name><surname>Shabbir</surname> <given-names>A</given-names></string-name>, <string-name><surname>Alanazi</surname> <given-names>SA</given-names></string-name></person-group>. <article-title>Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution</article-title>. <source>J King Saud Univ Comput Inf Sci</source>. <year>2022</year>;<volume>34</volume>(<issue>4</issue>):<fpage>1468</fpage>&#x2013;<lpage>85</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jksuci.2022.02.017</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sicari</surname> <given-names>S</given-names></string-name>, <string-name><surname>Rizzardi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Grieco</surname> <given-names>LA</given-names></string-name>, <string-name><surname>Coen-Porisini</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Security, privacy and trust in Internet of Things: the road ahead</article-title>. <source>Comput Netw</source>. <year>2015</year>;<volume>76</volume>(<issue>15</issue>):<fpage>146</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2014.11.008</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Roman</surname> <given-names>R</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Lopez</surname> <given-names>J</given-names></string-name></person-group>. <article-title>On the features and challenges of security and privacy in distributed Internet of Things</article-title>. <source>Comput Netw</source>. <year>2013</year>;<volume>57</volume>(<issue>10</issue>):<fpage>2266</fpage>&#x2013;<lpage>79</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2012.12.018</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kim</surname> <given-names>L</given-names></string-name></person-group>. <chapter-title>Cybersecurity: ensuring confidentiality, integrity, and availability of information</chapter-title>. In: <source>Nursing informatics</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>; <year>2022</year>. p. <fpage>391</fpage>&#x2013;<lpage>410</lpage>. doi:<pub-id pub-id-type="doi">10.1007/978-3-030-91237-6_26</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al-Janabi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Al-Shourbaji</surname> <given-names>I</given-names></string-name>, <string-name><surname>Shojafar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Shamshirband</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications</article-title>. <source>Egypt Inform J</source>. <year>2017</year>;<volume>18</volume>(<issue>2</issue>):<fpage>113</fpage>&#x2013;<lpage>22</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.eij.2016.11.001</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yang</surname> <given-names>G</given-names></string-name>, <string-name><surname>Xie</surname> <given-names>L</given-names></string-name>, <string-name><surname>M&#x00E4;ntysalo</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>X</given-names></string-name>, <string-name><surname>Pang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>LD</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box</article-title>. <source>IEEE Trans Ind Inform</source>. <year>2014</year>;<volume>10</volume>(<issue>4</issue>):<fpage>2180</fpage>&#x2013;<lpage>91</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TII.2014.2307795</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mosenia</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jha</surname> <given-names>NK</given-names></string-name></person-group>. <article-title>A comprehensive study of security of Internet-of-things</article-title>. <source>IEEE Trans Emerg Top Comput</source>. <year>2017</year>;<volume>5</volume>(<issue>4</issue>):<fpage>586</fpage>&#x2013;<lpage>602</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TETC.2016.2606384</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Razdan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Internet of medical things (IoMT): overview, emerging technologies, and case studies</article-title>. <source>IETE Tech Rev</source>. <year>2022</year>;<volume>39</volume>(<issue>4</issue>):<fpage>775</fpage>&#x2013;<lpage>88</lpage>. doi:<pub-id pub-id-type="doi">10.1080/02564602.2021.1927863</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Si-Ahmed</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ali Al-Garadi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Boustia</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Survey of Machine Learning based intrusion detection methods for Internet of Medical Things</article-title>. <source>Appl Soft Comput</source>. <year>2023</year>;<volume>140</volume>(<issue>3</issue>):<fpage>110227</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.asoc.2023.110227</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Patcha</surname> <given-names>A</given-names></string-name>, <string-name><surname>Park</surname> <given-names>JM</given-names></string-name></person-group>. <article-title>An overview of anomaly detection techniques: existing solutions and latest technological trends</article-title>. <source>Comput Netw</source>. <year>2007</year>;<volume>51</volume>(<issue>12</issue>):<fpage>3448</fpage>&#x2013;<lpage>70</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2007.02.001</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dasgupta</surname> <given-names>D</given-names></string-name>, <string-name><surname>Akhtar</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Sen</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Machine learning in cybersecurity: a comprehensive survey</article-title>. <source>J Def Model Simul</source>. <year>2022</year>;<volume>19</volume>(<issue>1</issue>):<fpage>57</fpage>&#x2013;<lpage>106</lpage>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yin</surname> <given-names>C</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Fei</surname> <given-names>J</given-names></string-name>, <string-name><surname>He</surname> <given-names>X</given-names></string-name></person-group>. <article-title>A deep learning approach for intrusion detection using recurrent neural networks</article-title>. <source>IEEE Access</source>. <year>2017</year>;<volume>5</volume>:<fpage>21954</fpage>&#x2013;<lpage>61.c</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2017.2762418</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Kim</surname> <given-names>J</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>J</given-names></string-name>, <string-name><surname>Le Thi Thu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Long short term memory recurrent neural network classifier for intrusion detection</article-title>. In: <conf-name>Proceedings of the 2016 International Conference on Platform Technology and Service (PlatCon); 2016 Feb 15&#x2013;17; Jeju, Republic of Korea</conf-name>. <publisher-loc>Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2016</year>. p. <fpage>1</fpage>&#x2013;<lpage>5</lpage>. doi:<pub-id pub-id-type="doi">10.1109/PlatCon.2016.7456805</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shaukat</surname> <given-names>K</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>S</given-names></string-name>, <string-name><surname>Varadharajan</surname> <given-names>V</given-names></string-name>, <string-name><surname>Hameed</surname> <given-names>I</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>S</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>D</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Performance comparison and current challenges of using machine learning techniques in cybersecurity</article-title>. <source>Energies</source>. <year>2020</year>;<volume>13</volume>(<issue>10</issue>):<fpage>2509</fpage>. doi:<pub-id pub-id-type="doi">10.3390/en13102509</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mighan</surname> <given-names>SN</given-names></string-name>, <string-name><surname>Kahani</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A novel scalable intrusion detection system based on deep learning</article-title>. <source>Int J Inf Secur</source>. <year>2021</year>;<volume>20</volume>(<issue>3</issue>):<fpage>387</fpage>&#x2013;<lpage>403</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s10207-020-00508-5</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ali Jawad Al-Abadi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mohamed</surname> <given-names>MB</given-names></string-name>, <string-name><surname>Fakhfakh</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Robust and reliable security approach for IoMT: detection of DoS and delay attacks through a high-accuracy machine learning model</article-title>. <source>Int J Recent Innov Trends Comput Commun</source>. <year>2023</year>;<volume>11</volume>(<issue>6</issue>):<fpage>239</fpage>&#x2013;<lpage>47</lpage>. doi:<pub-id pub-id-type="doi">10.17762/ijritcc.v11i6.7558</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kumar</surname> <given-names>P</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>GP</given-names></string-name>, <string-name><surname>Tripathi</surname> <given-names>R</given-names></string-name></person-group>. <article-title>An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks</article-title>. <source>Comput Commun</source>. <year>2021</year>;<volume>166</volume>(<issue>1</issue>):<fpage>110</fpage>&#x2013;<lpage>24</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comcom.2020.12.003</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Lu</surname> <given-names>W</given-names></string-name></person-group>. <chapter-title>Applied machine learning for securing the Internet of medical things in healthcare</chapter-title>. In: <source>Advanced information networking and applications</source>. <publisher-loc>Cham, Switzerland</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>; <year>2023</year>. p. <fpage>404</fpage>&#x2013;<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-3-031-28451-9_35</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zukaib</surname> <given-names>U</given-names></string-name>, <string-name><surname>Cui</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zheng</surname> <given-names>C</given-names></string-name>, <string-name><surname>Hassan</surname> <given-names>M</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>Meta-IDS: meta-learning-based smart intrusion detection system for Internet of medical things (IoMT) network</article-title>. <source>IEEE Internet Things J</source>. <year>2024</year>;<volume>11</volume>(<issue>13</issue>):<fpage>23080</fpage>&#x2013;<lpage>95</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2024.3387294</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ravi</surname> <given-names>V</given-names></string-name>, <string-name><surname>Pham</surname> <given-names>TD</given-names></string-name>, <string-name><surname>Alazab</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Deep learning-based network intrusion detection system for Internet of medical things</article-title>. <source>IEEE Internet Things Mag</source>. <year>2023</year>;<volume>6</volume>(<issue>2</issue>):<fpage>50</fpage>&#x2013;<lpage>4</lpage>. doi:<pub-id pub-id-type="doi">10.1109/IOTM.001.2300021</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Saran</surname> <given-names>N</given-names></string-name>, <string-name><surname>Kesswani</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Intrusion detection system for Internet of medical things using GRU with attention mechanism based hybrid deep learning technique</article-title>. <source>Jordanian J Comput Inf Technol</source>. <year>2025</year>:<fpage>1</fpage>. doi:<pub-id pub-id-type="doi">10.5455/jjcit.71-1725609265</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Swarna Priya</surname> <given-names>RM</given-names></string-name>, <string-name><surname>Maddikunta</surname> <given-names>PKR</given-names></string-name>, <string-name><surname>Parimala</surname> <given-names>M</given-names></string-name>, <string-name><surname>Koppu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Gadekallu</surname> <given-names>TR</given-names></string-name>, <string-name><surname>Chowdhary</surname> <given-names>CL</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture</article-title>. <source>Comput Commun</source>. <year>2020</year>;<volume>160</volume>(<issue>6</issue>):<fpage>139</fpage>&#x2013;<lpage>49</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comcom.2020.05.048</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ioannou</surname> <given-names>I</given-names></string-name>, <string-name><surname>Nagaradjane</surname> <given-names>P</given-names></string-name>, <string-name><surname>Angin</surname> <given-names>P</given-names></string-name>, <string-name><surname>Balasubramanian</surname> <given-names>P</given-names></string-name>, <string-name><surname>Kavitha</surname> <given-names>KJ</given-names></string-name>, <string-name><surname>Murugan</surname> <given-names>P</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>GEMLIDS-MIOT: a green effective machine learning intrusion detection system based on federated learning for medical IoT network security hardening</article-title>. <source>Comput Commun</source>. <year>2024</year>;<volume>218</volume>(<issue>6</issue>):<fpage>209</fpage>&#x2013;<lpage>39</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comcom.2024.02.023</pub-id>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hasan</surname> <given-names>T</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>F</given-names></string-name>, <string-name><surname>Rizwan</surname> <given-names>M</given-names></string-name>, <string-name><surname>Alshammari</surname> <given-names>N</given-names></string-name>, <string-name><surname>Alanazi</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Hussain</surname> <given-names>I</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Edge caching in fog-based sensor networks through deep learning-associated quantum computing framework</article-title>. <source>Comput Intell Neurosci</source>. <year>2022</year>;<volume>2022</volume>(<issue>1</issue>):<fpage>6138434</fpage>. doi:<pub-id pub-id-type="doi">10.1155/2022/6138434</pub-id>; <pub-id pub-id-type="pmid">35035461</pub-id></mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shahzadi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Khaliq</surname> <given-names>B</given-names></string-name>, <string-name><surname>Rizwan</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>F</given-names></string-name></person-group>. <article-title>Security of cloud computing using adaptive neural fuzzy inference system</article-title>. <source>Secur Commun Netw</source>. <year>2020</year>;<volume>2020</volume>(<issue>8</issue>):<fpage>5352108</fpage>. doi:<pub-id pub-id-type="doi">10.1155/2020/5352108</pub-id>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ferrag</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Friha</surname> <given-names>O</given-names></string-name>, <string-name><surname>Hamouda</surname> <given-names>D</given-names></string-name>, <string-name><surname>Maglaras</surname> <given-names>L</given-names></string-name>, <string-name><surname>Janicke</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning</article-title>. <source>IEEE Access</source>. <year>2022</year>;<volume>10</volume>:<fpage>40281</fpage>&#x2013;<lpage>306</lpage>. doi:<pub-id pub-id-type="doi">10.21227/mbc1-1h68</pub-id>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al-Omari</surname> <given-names>M</given-names></string-name>, <string-name><surname>Rawashdeh</surname> <given-names>M</given-names></string-name>, <string-name><surname>Qutaishat</surname> <given-names>F</given-names></string-name>, <string-name><surname>Alshira&#x2019;H</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ababneh</surname> <given-names>N</given-names></string-name></person-group>. <article-title>An intelligent tree-based intrusion detection model for cyber security</article-title>. <source>J Netw Syst Manag</source>. <year>2021</year>;<volume>29</volume>(<issue>2</issue>):<fpage>20</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s10922-021-09591-y</pub-id>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bhati</surname> <given-names>BS</given-names></string-name>, <string-name><surname>Rai</surname> <given-names>CS</given-names></string-name></person-group>. <article-title>Analysis of support vector machine-based intrusion detection techniques</article-title>. <source>Arab J Sci Eng</source>. <year>2020</year>;<volume>45</volume>(<issue>4</issue>):<fpage>2371</fpage>&#x2013;<lpage>83</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s13369-019-03970-z</pub-id>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gonaygunta</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Machine learning algorithms for detection of cyber threats using logistic regression</article-title>. <source>Int J Smart Sens Adhoc Netw</source>. <year>2023</year>;<volume>2023</volume>:<fpage>36</fpage>&#x2013;<lpage>42</lpage>. doi:<pub-id pub-id-type="doi">10.47893/ijssan.2023.1229</pub-id>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Saleh</surname> <given-names>HM</given-names></string-name>, <string-name><surname>Marouane</surname> <given-names>H</given-names></string-name>, <string-name><surname>Fakhfakh</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>(<issue>6</issue>):<fpage>3825</fpage>&#x2013;<lpage>36</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2023.3349248</pub-id>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Ismail</surname> <given-names>S</given-names></string-name>, <string-name><surname>Reza</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Evaluation of Na&#x00EF;ve Bayesian algorithms for cyber-attacks detection in wireless sensor networks</article-title>. In: <conf-name>Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT); 2022 Jun 6&#x2013;9</conf-name>; <publisher-loc>Seattle, WA, USA. Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2022</year>. p. <fpage>283</fpage>&#x2013;<lpage>9</lpage>. doi:<pub-id pub-id-type="doi">10.1109/AIIoT54504.2022.9817298</pub-id>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rehman Javed</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jalil</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Atif Moqurrab</surname> <given-names>S</given-names></string-name>, <string-name><surname>Abbas</surname> <given-names>S</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>X</given-names></string-name></person-group>. <article-title>Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles</article-title>. <source>Trans Emerging Tel Tech</source>. <year>2022</year>;<volume>33</volume>(<issue>10</issue>):<fpage>e4088</fpage>. doi:<pub-id pub-id-type="doi">10.1002/ett.4088</pub-id>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Leevy</surname> <given-names>JL</given-names></string-name>, <string-name><surname>Hancock</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zuech</surname> <given-names>R</given-names></string-name>, <string-name><surname>Khoshgoftaar</surname> <given-names>TM</given-names></string-name></person-group>. <article-title>Detecting cybersecurity attacks using different network features with LightGBM and XGBoost learners</article-title>. In: <conf-name>Proceedings of the 2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI); 2020 Oct 28&#x2013;31</conf-name>; <publisher-loc>Atlanta, GA, USA. Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2020</year>. p. <fpage>190</fpage>&#x2013;<lpage>7</lpage>. doi:<pub-id pub-id-type="doi">10.1109/cogmi50398.2020.00032</pub-id>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mishra</surname> <given-names>S</given-names></string-name></person-group>. <article-title>An optimized gradient boost decision tree using enhanced African buffalo optimization method for cyber security intrusion detection</article-title>. <source>Appl Sci</source>. <year>2022</year>;<volume>12</volume>(<issue>24</issue>):<fpage>12591</fpage>. doi:<pub-id pub-id-type="doi">10.3390/app122412591</pub-id>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Choubisa</surname> <given-names>M</given-names></string-name>, <string-name><surname>Doshi</surname> <given-names>R</given-names></string-name>, <string-name><surname>Khatri</surname> <given-names>N</given-names></string-name>, <string-name><surname>Kant Hiran</surname> <given-names>K</given-names></string-name></person-group>. <article-title>A simple and robust approach of random forest for intrusion detection system in cyber security</article-title>. In: <conf-name>Proceedings of the 2022 International Conference on IoT and Blockchain Technology (ICIBT); 2022 May 6&#x2013;8</conf-name>; <publisher-loc>Ranchi, India. Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <volume>2022</volume>. p. <fpage>1</fpage>&#x2013;<lpage>5</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ICIBT52874.2022.9807766</pub-id>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Subasi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Algebsani</surname> <given-names>S</given-names></string-name>, <string-name><surname>Alghamdi</surname> <given-names>W</given-names></string-name>, <string-name><surname>Kremic</surname> <given-names>E</given-names></string-name>, <string-name><surname>Almaasrani</surname> <given-names>J</given-names></string-name>, <string-name><surname>Abdulaziz</surname> <given-names>N</given-names></string-name></person-group>. <chapter-title>Intrusion detection in smart healthcare using bagging ensemble classifier</chapter-title>. In: <source>CMBEBIH 2021</source>. <publisher-loc>Cham, Switzerland</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>; <year>2021</year>. p. <fpage>164</fpage>&#x2013;<lpage>71</lpage>. doi:<pub-id pub-id-type="doi">10.1007/978-3-030-73909-6_18</pub-id>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Nazir</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hong</surname> <given-names>C</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Convolution neural network-based higher accurate intrusion identification system for the network security and communication</article-title>. <source>Secur Commun Netw</source>. <year>2020</year>;<volume>2020</volume>:<fpage>8830903</fpage>. doi:<pub-id pub-id-type="doi">10.1155/2020/8830903</pub-id>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al-kahtani</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Mehmood</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Sadad</surname> <given-names>T</given-names></string-name>, <string-name><surname>Zada</surname> <given-names>I</given-names></string-name>, <string-name><surname>Ali</surname> <given-names>G</given-names></string-name>, <string-name><surname>ElAffendi</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Intrusion detection in the Internet of Things using fusion of GRU-LSTM deep learning model</article-title>. <source>Intell Autom Soft Comput</source>. <year>2023</year>;<volume>37</volume>(<issue>2</issue>):<fpage>2279</fpage>&#x2013;<lpage>90</lpage>. doi:<pub-id pub-id-type="doi">10.32604/iasc.2023.037673</pub-id>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alaca</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Celik</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Goel</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Anomaly detection in cyber security with graph-based LSTM in log analysis</article-title>. <source>Chaos Theory Appl</source>. <year>2023</year>;<volume>5</volume>(<issue>3</issue>):<fpage>188</fpage>&#x2013;<lpage>97</lpage>. doi:<pub-id pub-id-type="doi">10.51537/chaos.1348302</pub-id>.</mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dixit</surname> <given-names>P</given-names></string-name>, <string-name><surname>Silakari</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Deep learning algorithms for cybersecurity applications: a technological and status review</article-title>. <source>Comput Sci Rev</source>. <year>2021</year>;<volume>39</volume>(<issue>4</issue>):<fpage>100317</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.cosrev.2020.100317</pub-id>.</mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cao</surname> <given-names>B</given-names></string-name>, <string-name><surname>Li</surname> <given-names>C</given-names></string-name>, <string-name><surname>Song</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Qin</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Network intrusion detection model based on CNN and GRU</article-title>. <source>Appl Sci</source>. <year>2022</year>;<volume>12</volume>(<issue>9</issue>):<fpage>4184</fpage>. doi:<pub-id pub-id-type="doi">10.3390/app12094184</pub-id>.</mixed-citation></ref>
<ref id="ref-54"><label>[54]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Luktarhan</surname> <given-names>N</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>An efficient intrusion detection method based on LightGBM and autoencoder</article-title>. <source>Symmetry</source>. <year>2020</year>;<volume>12</volume>(<issue>9</issue>):<fpage>1458</fpage>. doi:<pub-id pub-id-type="doi">10.3390/sym12091458</pub-id>.</mixed-citation></ref>
<ref id="ref-55"><label>[55]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ashraf</surname> <given-names>J</given-names></string-name>, <string-name><surname>Bakhshi</surname> <given-names>AD</given-names></string-name>, <string-name><surname>Moustafa</surname> <given-names>N</given-names></string-name>, <string-name><surname>Khurshid</surname> <given-names>H</given-names></string-name>, <string-name><surname>Javed</surname> <given-names>A</given-names></string-name>, <string-name><surname>Beheshti</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems</article-title>. <source>IEEE Trans Intell Transp Syst</source>. <year>2021</year>;<volume>22</volume>(<issue>7</issue>):<fpage>4507</fpage>&#x2013;<lpage>18</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TITS.2020.3017882</pub-id>.</mixed-citation></ref>
<ref id="ref-56"><label>[56]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Almuseelem</surname> <given-names>W</given-names></string-name></person-group>. <article-title>Energy-efficient and security-aware task offloading for multi-tier edge-cloud computing systems</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>66428</fpage>&#x2013;<lpage>39</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2023.3290139</pub-id>.</mixed-citation></ref>
<ref id="ref-57"><label>[57]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Van Huynh</surname> <given-names>D</given-names></string-name>, <string-name><surname>Nguyen</surname> <given-names>VD</given-names></string-name>, <string-name><surname>Chatzinotas</surname> <given-names>S</given-names></string-name>, <string-name><surname>Khosravirad</surname> <given-names>SR</given-names></string-name>, <string-name><surname>Poor</surname> <given-names>HV</given-names></string-name>, <string-name><surname>Duong</surname> <given-names>TQ</given-names></string-name></person-group>. <article-title>Joint communication and computation offloading for ultra-reliable and low-latency with multi-tier computing</article-title>. <source>IEEE J Sel Areas Commun</source>. <year>2023</year>;<volume>41</volume>(<issue>2</issue>):<fpage>521</fpage>&#x2013;<lpage>37</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JSAC.2022.3227088</pub-id>.</mixed-citation></ref>
<ref id="ref-58"><label>[58]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Ahmad</surname> <given-names>F</given-names></string-name>, <string-name><surname>Kanta</surname> <given-names>K</given-names></string-name>, <string-name><surname>Shiaeles</surname> <given-names>S</given-names></string-name>, <string-name><surname>Naeem</surname> <given-names>A</given-names></string-name>, <string-name><surname>Khalid</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Mahboob</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Enhancing ATM security management in the post-quantum era with quantum key distribution</article-title>. In: <conf-name>Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience (CSR); 2024 Sep2&#x2013;4</conf-name>; <publisher-loc>London, UK. Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2024</year>. p. <fpage>329</fpage>&#x2013;<lpage>34</lpage>. doi:<pub-id pub-id-type="doi">10.1109/CSR61664.2024.10679471</pub-id>.</mixed-citation></ref>
<ref id="ref-59"><label>[59]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Awad</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zakaria</surname> <given-names>M</given-names></string-name>, <string-name><surname>Hassan</surname> <given-names>R</given-names></string-name></person-group>. <article-title>An enhanced ensemble defense framework for boosting adversarial robustness of intrusion detection systems</article-title>. <source>Sci Rep</source>. <year>2025</year>;<volume>15</volume>(<issue>1</issue>):<fpage>14177</fpage>. doi:<pub-id pub-id-type="doi">10.1038/s41598-025-94023-z</pub-id>; <pub-id pub-id-type="pmid">40268978</pub-id></mixed-citation></ref>
<ref id="ref-60"><label>[60]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Tahayori</surname> <given-names>K</given-names></string-name>, <string-name><surname>Saad</surname> <given-names>S</given-names></string-name>, <string-name><surname>Mamun</surname> <given-names>M</given-names></string-name>, <string-name><surname>Samet</surname> <given-names>S</given-names></string-name></person-group>. <article-title>HybridMTD: enhancing robustness against adversarial attacks with ensemble neural networks and moving target defense</article-title>. In: <conf-name>Proceedings of the 11th International Conference on Information Systems Security and Privacy; 2025 Feb 20&#x2013;22</conf-name>; <publisher-loc>Porto, Portugal</publisher-loc>. p. <fpage>72</fpage>&#x2013;<lpage>83</lpage>. doi:<pub-id pub-id-type="doi">10.5220/0013240700003899</pub-id>.</mixed-citation></ref>
<ref id="ref-61"><label>[61]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname> <given-names>NW</given-names></string-name>, <string-name><surname>Alshehri</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Almakdi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Moradpoor</surname> <given-names>N</given-names></string-name>, <string-name><surname>Alazeb</surname> <given-names>A</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A hybrid deep learning-based intrusion detection system for IoT networks</article-title>. <source>Math Biosci Eng</source>. <year>2023</year>;<volume>20</volume>(<issue>8</issue>):<fpage>13491</fpage>&#x2013;<lpage>520</lpage>. doi:<pub-id pub-id-type="doi">10.3934/mbe.2023602</pub-id>; <pub-id pub-id-type="pmid">37679099</pub-id></mixed-citation></ref>
<ref id="ref-62"><label>[62]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Sethi</surname> <given-names>K</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>R</given-names></string-name>, <string-name><surname>Prajapati</surname> <given-names>N</given-names></string-name>, <string-name><surname>Bera</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Deep reinforcement learning based intrusion detection system for cloud infrastructure</article-title>. In: <conf-name>Proceedings of the 2020 International Conference on COMmunication Systems &#x0026; NETworkS (COMSNETS); 2020 Jan 7&#x2013;11</conf-name>; <publisher-loc>Bengaluru, India. Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <volume>2020</volume>. p. <fpage>1</fpage>&#x2013;<lpage>6</lpage>. doi:<pub-id pub-id-type="doi">10.1109/comsnets48256.2020.9027452</pub-id>.</mixed-citation></ref>
<ref id="ref-63"><label>[63]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kulkarni</surname> <given-names>DD</given-names></string-name>, <string-name><surname>Jaiswal</surname> <given-names>RK</given-names></string-name></person-group>. <article-title>An intrusion detection system using extended Kalman filter and neural networks for IoT networks</article-title>. <source>J Netw Syst Manag</source>. <year>2023</year>;<volume>31</volume>(<issue>3</issue>):<fpage>56</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s10922-023-09748-x</pub-id>.</mixed-citation></ref>
<ref id="ref-64"><label>[64]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alabsi</surname> <given-names>BA</given-names></string-name>, <string-name><surname>Anbar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Rihan</surname> <given-names>SDA</given-names></string-name></person-group>. <article-title>Conditional tabular generative adversarial based intrusion detection system for detecting ddos and dos attacks on the Internet of Things networks</article-title>. <source>Sensors</source>. <year>2023</year>;<volume>23</volume>(<issue>12</issue>):<fpage>5644</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s23125644</pub-id>; <pub-id pub-id-type="pmid">37420810</pub-id></mixed-citation></ref>
<ref id="ref-65"><label>[65]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Emanet</surname> <given-names>S</given-names></string-name>, <string-name><surname>Karatas Baydogmus</surname> <given-names>G</given-names></string-name>, <string-name><surname>Demir</surname> <given-names>O</given-names></string-name></person-group>. <article-title>An ensemble learning based IDS using Voting rule: vel-IDS</article-title>. <source>PeerJ Comput Sci</source>. <year>2023</year>;<volume>9</volume>(<issue>9</issue>):<fpage>e1553</fpage>. doi:<pub-id pub-id-type="doi">10.7717/peerj-cs.1553</pub-id>; <pub-id pub-id-type="pmid">37810337</pub-id></mixed-citation></ref>
<ref id="ref-66"><label>[66]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Potluri</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ahmed</surname> <given-names>S</given-names></string-name>, <string-name><surname>Diedrich</surname> <given-names>C</given-names></string-name></person-group>. <chapter-title>Convolutional neural networks for multi-class intrusion detection system</chapter-title>. In: <source>Mining intelligence and knowledge exploration</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>; <year>2018</year>. p. <fpage>225</fpage>&#x2013;<lpage>38</lpage>. doi:<pub-id pub-id-type="doi">10.1007/978-3-030-05918-7_20</pub-id>.</mixed-citation></ref>
<ref id="ref-67"><label>[67]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahmed</surname> <given-names>U</given-names></string-name>, <string-name><surname>Nazir</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sarwar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ali</surname> <given-names>T</given-names></string-name>, <string-name><surname>Aggoune</surname> <given-names>EM</given-names></string-name>, <string-name><surname>Shahzad</surname> <given-names>T</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering</article-title>. <source>Sci Rep</source>. <year>2025</year>;<volume>15</volume>(<issue>1</issue>):<fpage>1726</fpage>. doi:<pub-id pub-id-type="doi">10.1038/s41598-025-85866-7</pub-id>; <pub-id pub-id-type="pmid">39799225</pub-id></mixed-citation></ref>
<ref id="ref-68"><label>[68]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Brodzicki</surname> <given-names>A</given-names></string-name>, <string-name><surname>Piekarski</surname> <given-names>M</given-names></string-name>, <string-name><surname>Jaworek-Korjakowska</surname> <given-names>J</given-names></string-name></person-group>. <article-title>The whale optimization algorithm approach for deep neural networks</article-title>. <source>Sensors</source>. <year>2021</year>;<volume>21</volume>(<issue>23</issue>):<fpage>8003</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s21238003</pub-id>; <pub-id pub-id-type="pmid">34884004</pub-id></mixed-citation></ref>
<ref id="ref-69"><label>[69]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Folorunso</surname> <given-names>SO</given-names></string-name>, <string-name><surname>Awotunde</surname> <given-names>JB</given-names></string-name>, <string-name><surname>Ayo</surname> <given-names>FE</given-names></string-name>, <string-name><surname>Abdullah</surname> <given-names>KA</given-names></string-name></person-group>. <chapter-title>RADIoT: the unifying framework for IoT, radiomics and deep learning modeling</chapter-title>. In: <source>Hybrid artificial intelligence and IoT in healthcare</source>. <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2021</year>. p. <fpage>109</fpage>&#x2013;<lpage>28</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-981-16-2972-3_6</pub-id>.</mixed-citation></ref>
<ref id="ref-70"><label>[70]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Alrashdi</surname> <given-names>I</given-names></string-name>, <string-name><surname>Alqazzaz</surname> <given-names>A</given-names></string-name>, <string-name><surname>Alharthi</surname> <given-names>R</given-names></string-name>, <string-name><surname>Aloufi</surname> <given-names>E</given-names></string-name>, <string-name><surname>Zohdy</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Ming</surname> <given-names>H</given-names></string-name></person-group>. <article-title>FBAD: fog-based attack detection for IoT healthcare in smart cities</article-title>. In: <conf-name>Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics &#x0026; Mobile Communication Conference (UEMCON); 2019 Oct 10-12</conf-name>; <publisher-loc>New York, NY, USA. Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2019</year>. p. <fpage>515</fpage>&#x2013;<lpage>22</lpage>. doi:<pub-id pub-id-type="doi">10.1109/uemcon47517.2019.8992963</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>















