{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:19:52Z","timestamp":1743088792443,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030199449"},{"type":"electronic","value":"9783030199456"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19945-6_26","type":"book-chapter","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T11:36:02Z","timestamp":1557488162000},"page":"364-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Suspicious Transactions in IoT Blockchains for Smart Living Spaces"],"prefix":"10.1007","author":[{"given":"Mayra","family":"Samaniego","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralph","family":"Deters","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,5,10]]},"reference":[{"key":"26_CR1","unstructured":"NSF: Cyber-physical systems (CPS) (2010). https:\/\/www.nsf.gov\/pubs\/2010\/nsf10515\/nsf10515.htm"},{"issue":"7","key":"26_CR2","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"26_CR3","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00779-011-0399-8","volume":"16","author":"T Sanchez","year":"2012","unstructured":"Sanchez, T., Ranasinghe, D.C., Harrison, M., McFarlane, D.: Adding sense to the Internet of Things\u2014an architecture framework for smart object systems. Pers. Ubiquit. Comput. 16(3), 291\u2013308 (2012)","journal-title":"Pers. Ubiquit. Comput."},{"key":"26_CR4","volume-title":"Enchanted Objects: Design, Human Desire, and the Internet of Things","author":"D Rose","year":"2014","unstructured":"Rose, D.: Enchanted Objects: Design, Human Desire, and the Internet of Things. Simon and Schuster, New York (2014)"},{"key":"26_CR5","unstructured":"Panikkar, S., Nair, S., Brody, P., Pureswaran, V.: ADEPT: An IoT Practitioner Perspective (2015). http:\/\/static1.squarespace.com\/static\/55f73743e4b051cfcc0b02cf\/55f73e5ee4b09b2bff5b2eca\/55f73e72e4b09b2bff5b3267\/1442266738638\/IBM-ADEPT-Practictioner-Perspective-Pre-Publication-Draft-7-Jan-2015.pdf?format=original"},{"key":"26_CR6","unstructured":"Fielding, R.: Architectural Styles and the Design of Network-based Software Architectures. Dissertation University of Irvine, vol. 7 (2000)"},{"key":"26_CR7","unstructured":"Robinson, L.: Richardson Maturity Model. https:\/\/martinfowler.com\/articles\/richardsonMaturityModel.html"},{"key":"26_CR8","unstructured":"CRUD: \u201cCreate Read, Update and Delete\u201d. http:\/\/en.wikipedia.org\/wiki\/Create,_read,_update_and_delete"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Samaniego, M., Deters, R.: Blockchain as a Service for IoT. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 433\u2013436. IEEE (2016)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Samaniego, M., Deters, R.: Using blockchain to push software-defined IoT components onto edge hosts. In: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, p. 58. ACM (2016)","DOI":"10.1145\/3010089.3016027"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.procs.2016.08.022","volume":"94","author":"M Samaniego","year":"2016","unstructured":"Samaniego, M., Deters, R.: Management and Internet of Things. Procedia Comput. Sci. 94, 137\u2013143 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Samaniego, M., Deters, R.: Internet of Smart Things-IoST: using Blockchain and CLIPS to make things autonomous. In: 2017 IEEE International Conference on Cognitive Computing (ICCC), pp. 9\u201316. IEEE (2017)","DOI":"10.1109\/IEEE.ICCC.2017.9"},{"issue":"2","key":"26_CR13","doi-asserted-by":"crossref","first-page":"01","DOI":"10.5383\/JUSPN.09.02.001","volume":"9","author":"M Samaniego","year":"2017","unstructured":"Samaniego, M., Deters, R.: Virtual resources & blockchain for configuration management in IoT. J. Ubiquit. Syst. Pervasive Netw. 9(2), 01\u201313 (2017)","journal-title":"J. Ubiquit. Syst. Pervasive Netw."},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Samaniego, M., Deters, R.: Zero-trust hierarchical management in IoT. In: 2018 IEEE International Congress on Internet of Things (ICIOT), pp. 88\u201395. IEEE (2018)","DOI":"10.1109\/ICIOT.2018.00019"},{"issue":"3","key":"26_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"26_CR16","unstructured":"Chainalysis. https:\/\/www.chainalysis.com\/"},{"key":"26_CR17","unstructured":"A Next-Generation Smart Contract and Decentralized Application Platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"26_CR18","unstructured":"Forth. https:\/\/www.forth.com\/forth\/"},{"key":"26_CR19","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf"},{"issue":"3","key":"26_CR20","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.accinf.2010.08.001","volume":"11","author":"RS Debreceny","year":"2010","unstructured":"Debreceny, R.S., Gray, G.L.: Data mining journal entries for fraud detection: an exploratory study. Int. J. Account. Inf. Syst. 11(3), 157\u2013181 (2010)","journal-title":"Int. J. Account. Inf. Syst."},{"key":"26_CR21","unstructured":"Lane, T., Brodley, C.E.: An application of machine learning to anomaly detection. In: Proceedings of the 20th National Information Systems Security Conference, Baltimore, USA, vol. 377, pp. 366\u2013380 (1997)"},{"key":"26_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-39945-3_6","volume-title":"Recent Advances in Intrusion Detection","author":"A Valdes","year":"2000","unstructured":"Valdes, A., Skinner, K.: Adaptive, model-based monitoring for cyber attack detection. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 80\u201393. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-39945-3_6"},{"key":"26_CR23","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"issue":"18","key":"26_CR24","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943\u20135964 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"26_CR25","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-319-46568-5_53","volume-title":"Europe and MENA Cooperation Advances in Information and Communication Technologies","author":"A Ouaddah","year":"2017","unstructured":"Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Rocha, \u00c1., Serrhini, M., Felgueiras, M.C. (eds.) Europe and MENA Cooperation Advances in Information and Communication Technologies, pp. 523\u2013533. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-46568-5_53"},{"key":"26_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-030-05764-0_16","volume-title":"Smart Blockchain","author":"R Deters","year":"2018","unstructured":"Deters, R.: How to detect and contain suspicious transactions in distributed ledgers. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 149\u2013158. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05764-0_16"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Rouhani, S., Deters, R.: Performance analysis of Ethereum transactions in private blockchain. In: 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 70\u201374 (2017)","DOI":"10.1109\/ICSESS.2017.8342866"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Rouhani, S., Butterworth, L., Dimmond, A.D., Humphery, D.G., Deters, R.: MediChainTM: a secure decentralized medical data asset management system. In: 2018 IEEE Conference on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics, pp. 1533\u20131538 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00258"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Rouhani, S., Pourheidari, V., Deters, R.: Physical access control management system based on permissioned blockchain. In: 2018 IEEE Conference on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics, pp. 1078\u20131083 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00198"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Pourheidari, V., Rouhani, S., Deters, R.: A case study of execution of untrusted business process on permissioned blockchain. In: 2018 IEEE Conference on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics, pp. 1588\u20131594 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00266"},{"key":"26_CR31","unstructured":"Compute Engine. https:\/\/cloud.google.com\/compute\/"},{"issue":"7","key":"26_CR32","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61(7), 95\u2013102 (2018)","journal-title":"Commun. ACM"},{"key":"26_CR33","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on Bitcoin\u2019s peer-to-peer network. In: USENIX Security Symposium, pp. 129\u2013144 (2015)"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618\u2013623. IEEE (2017)","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"26_CR35","unstructured":"Man-in-the-middle attacks on wallets. http:\/\/news.bitcoin.com\/ledger-addresses-man-in-the-middle-attack-that-threatens-millions-of-hardware-wallets\/"},{"issue":"3","key":"26_CR36","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1380584.1380585","volume":"40","author":"MC Huebscher","year":"2008","unstructured":"Huebscher, M.C., McCann, J.A.: A survey of autonomic computing\u2014degrees, models, and applications. ACM Comput. Surv. (CSUR) 40(3), 7 (2008)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"26_CR37","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-0-387-34890-2_25","volume-title":"International Symposium on Integrated Network Management IV","author":"YA Nygate","year":"1995","unstructured":"Nygate, Y.A.: Event correlation using rule and object based techniques. In: Sethi, A.S., Raynaud, Y., Faure-Vincent, F. (eds.) International Symposium on Integrated Network Management IV. ITIFIP, pp. 278\u2013289. Springer, Boston, MA (1995). https:\/\/doi.org\/10.1007\/978-0-387-34890-2_25"},{"issue":"5","key":"26_CR38","first-page":"241","volume":"51","author":"A Buchmann","year":"2009","unstructured":"Buchmann, A., Koldehofe, B.: Complex event processing. IT-Information Technology Methoden und innovative Anwendungen der Informatik und Informationstechnik 51(5), 241\u2013242 (2009)","journal-title":"IT-Information Technology Methoden und innovative Anwendungen der Informatik und Informationstechnik"},{"key":"26_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/3-540-60598-3_37","volume-title":"Case-based reasoning research and development","author":"R Deters","year":"1995","unstructured":"Deters, R.: Case-based diagnosis of multiple faults. In: Veloso, M., Aamodt, A. (eds.) ICCBR 1995. LNCS, vol. 1010, pp. 411\u2013420. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60598-3_37"},{"key":"26_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"issue":"4","key":"26_CR41","first-page":"309","volume":"1","author":"PN Mahalle","year":"2013","unstructured":"Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability-based access control (IACAC) for the Internet of Things. J. Cyber Secur. Mobility 1(4), 309\u2013348 (2013)","journal-title":"J. Cyber Secur. Mobility"},{"key":"26_CR42","unstructured":"https:\/\/www.samsung.com\/sg\/smarthome\/"},{"key":"26_CR43","unstructured":"https:\/\/cdn.mos.cms.futurecdn.net\/exdTX6QGDyg8hDausRwzhJ-970-80.jpg"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19945-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:32:38Z","timestamp":1709818358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-19945-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030199449","9783030199456"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19945-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln\/Home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}