{"id":"https:\/\/openalex.org\/W4415974601","doi":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.633","title":"Explainable AI-based innovative models for intrusion detection in Big Data WSN","display_name":"Explainable AI-based innovative models for intrusion detection in Big Data WSN","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https:\/\/openalex.org\/W4415974601","doi":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.633"},"language":"en","primary_location":{"id":"doi:10.1016\/j.procs.2025.09.633","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.633","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https:\/\/openalex.org\/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https:\/\/openalex.org\/licenses\/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.633","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5120289755","display_name":"Naima Samout","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I142899784","display_name":"University of Sfax","ror":"https:\/\/ror.org\/04d4sd432","country_code":"TN","type":"education","lineage":["https:\/\/openalex.org\/I142899784"]},{"id":"https:\/\/openalex.org\/I4210086032","display_name":"Institut Sup\u00e9rieur des \u00c9tudes Technologiques de Gafsa","ror":"https:\/\/ror.org\/00cvp0686","country_code":"TN","type":"education","lineage":["https:\/\/openalex.org\/I4210086032"]},{"id":"https:\/\/openalex.org\/I4210106624","display_name":"\u00c9cole Nationale d'Ing\u00e9nieurs de Gab\u00e8s","ror":"https:\/\/ror.org\/01fy5k372","country_code":"TN","type":"education","lineage":["https:\/\/openalex.org\/I4210106624"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Naima Samout","raw_affiliation_strings":["ENIG, Gabes University, Tunisia","ISET Gafsa, DGET, Tunisia","SETIT Laboratory, Sfax University, Tunisia"],"affiliations":[{"raw_affiliation_string":"ENIG, Gabes University, Tunisia","institution_ids":["https:\/\/openalex.org\/I4210106624"]},{"raw_affiliation_string":"ISET Gafsa, DGET, Tunisia","institution_ids":["https:\/\/openalex.org\/I4210086032"]},{"raw_affiliation_string":"SETIT Laboratory, Sfax University, Tunisia","institution_ids":["https:\/\/openalex.org\/I142899784"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5120289756","display_name":"Thouraya Gouasmia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thouraya Gouasmi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5052531211","display_name":"Nejah Nasri","orcid":"https:\/\/orcid.org\/0000-0002-9293-8383"},"institutions":[{"id":"https:\/\/openalex.org\/I142899784","display_name":"University of Sfax","ror":"https:\/\/ror.org\/04d4sd432","country_code":"TN","type":"education","lineage":["https:\/\/openalex.org\/I142899784"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Nejah Nasri","raw_affiliation_strings":["SETIT Laboratory, Sfax University, Tunisia"],"affiliations":[{"raw_affiliation_string":"SETIT Laboratory, Sfax University, Tunisia","institution_ids":["https:\/\/openalex.org\/I142899784"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https:\/\/openalex.org\/A5120289755"],"corresponding_institution_ids":["https:\/\/openalex.org\/I142899784","https:\/\/openalex.org\/I4210086032","https:\/\/openalex.org\/I4210106624"],"apc_list":null,"apc_paid":null,"fwci":0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40664269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"270","issue":null,"first_page":"5065","last_page":"5072"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10400","display_name":"Network Security and Intrusion Detection","score":0.43220001459121704,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10400","display_name":"Network Security and Intrusion Detection","score":0.43220001459121704,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.18690000474452972,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10917","display_name":"Smart Grid Security and Resilience","score":0.042899999767541885,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/intrusion-detection-system","display_name":"Intrusion detection system","score":0.765999972820282},{"id":"https:\/\/openalex.org\/keywords\/scalability","display_name":"Scalability","score":0.5978999733924866},{"id":"https:\/\/openalex.org\/keywords\/dependability","display_name":"Dependability","score":0.5681999921798706},{"id":"https:\/\/openalex.org\/keywords\/big-data","display_name":"Big data","score":0.5052000284194946},{"id":"https:\/\/openalex.org\/keywords\/process","display_name":"Process (computing)","score":0.5033000111579895},{"id":"https:\/\/openalex.org\/keywords\/network-security","display_name":"Network security","score":0.4375999867916107},{"id":"https:\/\/openalex.org\/keywords\/variety","display_name":"Variety (cybernetics)","score":0.42480000853538513},{"id":"https:\/\/openalex.org\/keywords\/support-vector-machine","display_name":"Support vector machine","score":0.3391999900341034}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.8992000222206116},{"id":"https:\/\/openalex.org\/C35525427","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q745881","display_name":"Intrusion detection system","level":2,"score":0.765999972820282},{"id":"https:\/\/openalex.org\/C48044578","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q727490","display_name":"Scalability","level":2,"score":0.5978999733924866},{"id":"https:\/\/openalex.org\/C77019957","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2689057","display_name":"Dependability","level":2,"score":0.5681999921798706},{"id":"https:\/\/openalex.org\/C75684735","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q858810","display_name":"Big data","level":2,"score":0.5052000284194946},{"id":"https:\/\/openalex.org\/C98045186","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q205663","display_name":"Process (computing)","level":2,"score":0.5033000111579895},{"id":"https:\/\/openalex.org\/C119857082","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2539","display_name":"Machine learning","level":1,"score":0.43970000743865967},{"id":"https:\/\/openalex.org\/C182590292","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q989632","display_name":"Network security","level":2,"score":0.4375999867916107},{"id":"https:\/\/openalex.org\/C136197465","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.42480000853538513},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4131999909877777},{"id":"https:\/\/openalex.org\/C124101348","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q172491","display_name":"Data mining","level":1,"score":0.35429999232292175},{"id":"https:\/\/openalex.org\/C12267149","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q282453","display_name":"Support vector machine","level":2,"score":0.3391999900341034},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.3382999897003174},{"id":"https:\/\/openalex.org\/C2780233690","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.3330000042915344},{"id":"https:\/\/openalex.org\/C24590314","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q336038","display_name":"Wireless sensor network","level":2,"score":0.33239999413490295},{"id":"https:\/\/openalex.org\/C45942800","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q245652","display_name":"Ensemble learning","level":2,"score":0.32839998602867126},{"id":"https:\/\/openalex.org\/C49937458","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.3050000071525574},{"id":"https:\/\/openalex.org\/C50644808","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q192776","display_name":"Artificial neural network","level":2,"score":0.2930000126361847},{"id":"https:\/\/openalex.org\/C182306322","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1779371","display_name":"Order (exchange)","level":2,"score":0.2768999934196472},{"id":"https:\/\/openalex.org\/C2778464652","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q309849","display_name":"Open research","level":2,"score":0.27459999918937683},{"id":"https:\/\/openalex.org\/C75291252","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.26440000534057617},{"id":"https:\/\/openalex.org\/C136389625","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q334384","display_name":"Supervised learning","level":3,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016\/j.procs.2025.09.633","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.633","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https:\/\/openalex.org\/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https:\/\/openalex.org\/licenses\/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016\/j.procs.2025.09.633","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.633","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https:\/\/openalex.org\/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https:\/\/openalex.org\/licenses\/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https:\/\/openalex.org\/W2910197492","https:\/\/openalex.org\/W2981731882","https:\/\/openalex.org\/W3070762654","https:\/\/openalex.org\/W3120131065","https:\/\/openalex.org\/W3159936276","https:\/\/openalex.org\/W3182546273","https:\/\/openalex.org\/W3204348757","https:\/\/openalex.org\/W4223920744","https:\/\/openalex.org\/W4362610096","https:\/\/openalex.org\/W4398236661"],"related_works":[],"abstract_inverted_index":{"Strong":[0],"security":[1,184,245],"measures":[2],"are":[3,39],"now":[4],"more":[5],"important":[6,148],"than":[7],"ever":[8],"due":[9,53],"to":[10,28,47,54,85,99,110,187,234],"the":[11,49,55,137,159,164,189,199,202,232,238],"quick":[12],"growth":[13],"of":[14,57,81,114,122,191,201],"wireless":[15],"sensor":[16],"networks":[17,31],"in":[18,59,97,105,152,176,180,207,243],"sectors":[19],"like":[20,93],"smart":[21],"cities,":[22],"healthcare,":[23],"and":[24,95,102,118,133,155,167,213,236],"agriculture.":[25],"In":[26,108],"order":[27,98,109],"protect":[29],"these":[30],"from":[32],"malevolent":[33],"assaults,":[34],"intrusion":[35,73,204,224],"detection":[36,74,154,205,225],"systems":[37],"(IDS)":[38],"essential.":[40],"However,":[41],"network":[42,106,183,229],"operators":[43],"find":[44],"it":[45,170],"challenging":[46],"comprehend":[48],"system\u2019s":[50,239],"decision-making":[51,161,217],"process":[52],"lack":[56],"transparency":[58],"traditional":[60],"IDS.":[61],"To":[62],"address":[63],"this":[64,82],"issue,":[65],"we":[66,116],"propose":[67],"an":[68],"explainable":[69],"artificial":[70],"intelligence":[71],"based":[72],"method":[75,220],"for":[76,174],"large-scale":[77],"WSNs.":[78],"The":[79,143,195],"goal":[80],"research":[83],"is":[84,185],"combine":[86],"machine":[87,123],"learning":[88,124],"models":[89],"with":[90,231],"explain-ability":[91],"frameworks":[92],"SHAP":[94],"LIME":[96],"efficiently":[100],"identify":[101],"clarify":[103],"anomalies":[104],"data.":[107],"detect":[111],"different":[112],"kinds":[113],"attacks,":[115],"train":[117],"assess":[119],"a":[120,171],"variety":[121],"classifiers,":[125],"such":[126],"as":[127],"decision":[128],"trees,":[129],"support":[130],"vector":[131],"machines,":[132],"ensemble":[134],"approaches,":[135],"using":[136],"popular":[138],"KDD":[139],"Cup":[140],"99":[141],"dataset.":[142],"XIA":[144],"frameworkS":[145],"assist":[146],"discover":[147],"aspects":[149],"that":[150],"aid":[151],"attack":[153],"offer":[156],"insights":[157],"into":[158],"model\u2019s":[160,165],"process.":[162],"Additionally,":[163],"durability":[166],"scalability":[168],"make":[169],"feasible":[172],"option":[173],"implementation":[175],"extensive":[177],"WSNs,":[178],"particularly":[179],"agriculture,":[181],"where":[182],"essential":[186],"guaranteeing":[188],"dependability":[190],"IoT-based":[192],"monitoring":[193],"systems.":[194,246],"results":[196],"have":[197],"demonstrate":[198],"efficacy":[200],"XAI-based":[203],"system":[206],"attaining":[208],"high":[209],"accuracy,":[210],"precision,":[211],"recall,":[212],"F1-score":[214],"while":[215],"maintaining":[216],"transparency.":[218],"This":[219],"not":[221],"only":[222],"enhances":[223],"but":[226],"also":[227],"provides":[228],"administrators":[230],"means":[233],"decipher":[235],"verify":[237],"predictions,":[240],"increasing":[241],"confidence":[242],"automated":[244]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-06T00:00:00"}