  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Intelligent Systems and Internet of Things</full_title>
  <abbrev_title>JISIoT</abbrev_title>
  <issn media_type="print">2690-6791</issn>
  <issn media_type="electronic">2769-786X</issn>
  <doi_data>
   <doi>10.54216/JISIoT</doi>
   <resource>https://www.americaspg.com/journals/show/3585</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Computer Science, Taibah University, Madinah, Saudi Arabia </organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Nawaf</given_name>
    <surname>Nawaf</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Nawaf</given_name>
    <surname>Alhebaishi</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Computer Science Department, School of Engineering, Computing and Design, Dar Al-Hekma University, Jeddah, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Turki</given_name>
    <surname>Althaqafi</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>The Internet of Things (IoT) aims to provide connectivity between all computing entities. However, this facilitates cyberthreats, which exploits the existence of vulnerability over a period. The zero-day threat is one of the vulnerabilities that can result in zero-day attacks that are destructive to the network security and an enterprise. This attack may have potentially compromised critical infrastructure, far-reaching consequences, national security, and even personal privacy. To alleviate the risks, organizations and manufacturers should prioritize proactive security measures, involving robust authentication mechanisms, ongoing monitoring, and timely software updates, to defend the IoT ecosystem from emerging threats. In present scenario, deep learning (DL)-based models have improved robustness in learning data giving it an improved capability to identify unknown information, since it can able to extract knowledge of non-linear data to identify unknown information. The study presents a Robust Zero-Day Attack Detection with Optimal Deep Learning (RZDAD-ODL) technique for the IoT framework. The primary intention of the RZDAD-ODL model lies in the automatic and effectual detection of zero-day attacks in the IoT framework. In the presented RZDAD-ODL technique, the honey badger algorithm (HBA) can be used for the optimum range of the features. Besides, the RZDAD-ODL technique exploits the conditional variational autoencoder (CVAE) model for attack detection and its parameter tuning process can be performed by using a rider optimization algorithm (ROA). The experimentation results of the RZDAD-ODL system can be validated on a benchmark dataset. Extensive comparison studies reported the better attack detection performance of the RZDAD-ODL model over other current techniques.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>118</first_page>
   <last_page>131</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JISIoT.160110</doi>
   <resource>https://www.americaspg.com/articleinfo/18/show/3585</resource>
  </doi_data>
 </journal_article>
</journal>
