Retraction

Detection of attacks in IoT sensors networks using machine learning algorithm

Retraction Details

Nature of Retraction:

Retraction

Additional Notes:

html overwrite; retracted article available as PDF

Citations (38)

38
Total Citations
13
Post-Retraction
(34.2%)
25
Pre-Retraction
0
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
6 Within 1 year
0 After 2+ years
503 Days since retraction (latest)
Chaos Game Optimization with stacked LSTM sequence to sequence autoencoder for malware detection in IoT cloud environment
Moneerah Alotaibi, Ghadah Aldehim, Mashael Maashi et al. (8 authors)
Alexandria Engineering Journal Open Access
Published: Nov 2024
503 days after retraction
Paper citing Detection of attacks in IoT sensors networks using...
Unknown Authors
Unknown Journal
Published: Sep 2024
451 days after retraction
Paper citing Detection of attacks in IoT sensors networks using...
Unknown Authors
Unknown Journal
Published: Sep 2024
430 days after retraction
Paper citing Detection of attacks in IoT sensors networks using...
Unknown Authors
Unknown Journal
Published: Aug 2024
425 days after retraction
Paper citing Detection of attacks in IoT sensors networks using...
Unknown Authors
Unknown Journal
Published: Aug 2024
403 days after retraction
Enhanced Solar Tracking System Utilizing IoT for Optimal Energy
Vrince Vimal
Unknown Journal
Published: Jul 2024
2 citations
375 days after retraction
Itinerary Planning for Tourists using Internet of Things
Shweta Arora, Saurabh Pargaien, Farha Khan et al. (5 authors)
Unknown Journal
Published: Jul 2024
368 days after retraction
DDoS Attacks Detection in IoT Networks using Naive Bayes and Random Forest
Animesh Srivastava, Shweta Tiwari, Bhupender Singh Rawat et al. (4 authors)
Unknown Journal
Published: Jun 2024
340 days after retraction
Finding of DDoS Attack in IoT-Based Networks Using Ensemble Technique
Animesh Srivastava, Shweta Tiwari, Deepak Kumar et al. (4 authors)
Unknown Journal
Published: May 2024
307 days after retraction
Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja
Ali Hamid Farea, Kerem Küçük
International Journal of Computer Network and Information Security Open Access
Published: Jan 2024
3 citations
213 days after retraction
Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach
N. Prakash, J. Vignesh, M. Ashwin et al. (8 authors)
Optical and Quantum Electronics
Published: Dec 2023
9 citations
179 days after retraction
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment
Himanshu Nandanwar, Rahul Katarya
International Journal of Information Security
Published: Dec 2023
13 citations
166 days after retraction
A Comprehensive Study on Denial of Service (DoS) Based on Feature Selection of a Given Set Datasets in Internet of Things (IoT)
Kota Ravi Kumar, R. Nakkeeran
Unknown Journal
Published: May 2023
1 citation
37 days before retraction
Attack detection in industrial IoT using novel ensemble techniques
Kushagra Keserwani, Apoorva Aggarwal, Anamika Chauhan
Unknown Journal
Published: May 2023
5 citations
57 days before retraction
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges
Princy Victor, Arash Habibi Lashkari, Rongxing Lu et al. (6 authors)
Peer-to-Peer Networking and Applications Open Access
Published: May 2023
33 citations
61 days before retraction
A Security Model for Perceptive 5G-Powered BC IoT Associated Deep Learning
Sandeep Kumar Davuluri, Syed Ahad Murtaza Alvi, Manisha Aeri et al. (6 authors)
2022 International Conference on Inventive Computation Technologies (ICICT)
Published: Apr 2023
25 citations
66 days before retraction
IoT and Data Mining Techniques to Detect and Regulating of Solar Power System
K. Sunil Ratna Kumar, Ravindra R. Solanke, G. Laxmaiah et al. (5 authors)
2022 International Conference on Inventive Computation Technologies (ICICT)
Published: Apr 2023
13 citations
66 days before retraction
A Comprehensive Analysis of the Effectiveness of Machine Learning Algorithms for Predicting Water Quality
Priyanshu Rawat, Madhvan Bajaj, Vikrant Sharma et al. (4 authors)
Unknown Journal
Published: Mar 2023
26 citations
109 days before retraction
Cyber Attack Detection in IoT using Deep Learning Techniques
Kartik Tomar, Krishi Bisht, Kshitiz Joshi et al. (4 authors)
2021 5th International Conference on Information Systems and Computer Networks (ISCON)
Published: Mar 2023
11 citations
120 days before retraction
Controller Cyber-Attack Detection and Isolation
Anna Sztyber, Michał Syfert, Jan Maciej Kościelny et al. (4 authors)
Sensors Open Access
Published: Mar 2023
5 citations
120 days before retraction
Emotional wellbeing in intercity travel: Factors affecting passengers' long-distance travel moods
Xiaowei Li, Yuting Wang, Junqing Tang et al. (6 authors)
Frontiers in Public Health Open Access
Published: Dec 2022
7 citations
198 days before retraction
Hybrid MQTTNet: An Intrusion Detection System Using Heuristic-Based Optimal Feature Integration and Hybrid Fuzzy with 1DCNN
P. M. Vijayan, S. Sundar
Cybernetics & Systems
Published: Nov 2022
4 citations
226 days before retraction
Exploration of Research Challenges and Potential Applications in IoT
Shivlal Mewada
IGI Global eBooks
Published: Oct 2022
1 citation
260 days before retraction
Cryptic Algorithms
Shivlal Mewada
IGI Global eBooks
Published: Oct 2022
1 citation
260 days before retraction
Ensemble Learning Approach to the Prediction of Gas Turbine Trip
Enzo Losi, Mauro Venturini, Lucrezia Manservigi et al. (4 authors)
Journal of Engineering for Gas Turbines and Power
Published: Oct 2022
3 citations
267 days before retraction
Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective
Amit Kumar Mishra, Shweta Paliwal
Cluster Computing
Published: Sep 2022
57 citations
289 days before retraction
Detections of IoT Attacks via Machine Learning-Based Approaches with Cooja
Ali Hamid Farea, Kerem Küçük
EAI Endorsed Transactions on Internet of Things Open Access
Published: Apr 2022
11 citations
450 days before retraction
Optimal Classifier to Detect Unit of Measure Inconsistency in Gas Turbine Sensors
Lucrezia Manservigi, Mauro Venturini, Enzo Losi et al. (5 authors)
Machines Open Access
Published: Mar 2022
5 citations
464 days before retraction
SUKRY: Suricata IDS with Enhanced kNN Algorithm on Raspberry Pi for Classifying IoT Botnet Attacks
Irfan Syamsuddin, Omar Barukab
Electronics Open Access
Published: Feb 2022
21 citations
489 days before retraction
Predicting Malicious Software in IoT Environment Based on Machine Learning and Data Mining Techniques
Abdulmohsen Alharbi, Abdul Hamid, Husam Lahza
International Journal of Advanced Computer Science and Applications Open Access
Published: Jan 2022
2 citations
546 days before retraction
Smart Anomaly Detection Using Data-Driven Techniques in IoT Edge: A Survey
J. Manokaran, G. Vairavel
Lecture notes in electrical engineering
Published: Jan 2022
9 citations
546 days before retraction
Role of internet of things in protecting different wearable gadgets and materials
P. Prasant, Shashank Bhardwaj, Monisha Gupta et al. (6 authors)
Materials Today Proceedings
Published: Nov 2021
1 citation
587 days before retraction
A New Depth Classification Method based on Underwater Acoustics for Naval Defense Applications
Orhan Yaman, Emrah Aydemir
European Journal of Science and Technology Open Access
Published: Nov 2021
605 days before retraction
Automated book location and classification method using RFID tags for smart libraries
Orhan Yaman, Türker Tuncer, Fatih Ertam
Microprocessors and Microsystems
Published: Nov 2021
4 citations
607 days before retraction
Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)
Shafiqul Abidin, Amit Swami, Edwin Ramírez-Asís et al. (6 authors)
Materials Today Proceedings
Published: Jul 2021
27 citations
723 days before retraction
Detection of Unit of Measure Inconsistency in gas turbine sensors by means of Support Vector Machine classifier
Lucrezia Manservigi, D. Wayne Murray, Javier Artal de la Iglesia et al. (7 authors)
ISA Transactions
Published: May 2021
9 citations
763 days before retraction
Medi-Block record: Secure data sharing using block chain technology
Chaitanya Singh, Deepika Chauhan, Sushama A. Deshmukh et al. (5 authors)
Informatics in Medicine Unlocked Open Access
Published: Jan 2021
35 citations
911 days before retraction
Quick Stats
Total Citations: 38
Years Since Retraction: 2.4 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
A new neural network based on smooth function for SOCCVI pr…
Journal of Intelligent & Fuzzy Systems • 2 citations
UIFSS: An aid for univariate data with large missing gap in…
Journal of Intelligent & Fuzzy Systems • 0 citations
Combination of linguistic Z-numbers and IF-THEN rules based…
Journal of Intelligent & Fuzzy Systems • 1 citations
A novel MADM technique based on projection methods under q-…
Journal of Intelligent & Fuzzy Systems • 4 citations
Zero trust access authorization and control of network boun…
Journal of Intelligent & Fuzzy Systems • 13 citations