{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:34:35Z","timestamp":1757540075958,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030491857"},{"type":"electronic","value":"9783030491864"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49186-4_23","type":"book-chapter","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T09:02:48Z","timestamp":1590742968000},"page":"268-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["SDN-Enabled IoT Anomaly Detection Using Ensemble Learning"],"prefix":"10.1007","author":[{"given":"Enkhtur","family":"Tsogbaatar","sequence":"first","affiliation":[]},{"given":"Monowar H.","family":"Bhuyan","sequence":"additional","affiliation":[]},{"given":"Yuzo","family":"Taenaka","sequence":"additional","affiliation":[]},{"given":"Doudou","family":"Fall","sequence":"additional","affiliation":[]},{"given":"Khishigjargal","family":"Gonchigsumlaa","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Elmroth","sequence":"additional","affiliation":[]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,29]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.3390\/info10040122","volume":"10","author":"DS Berman","year":"2019","unstructured":"Berman, D.S., Buczak, A.L., Chavis, J.S., Corbett, C.L.: A survey of deep learning methods for cyber security. Information 10, 122 (2019)","journal-title":"Information"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Bhunia, S.S., Gurusamy, M.: Dynamic attack detection and mitigation in IoT using SDN. In: 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Bhuyan, M.H., Elmroth, E.: Multi-scale low-rate DDoS attack detection using the generalized total variation metric. In: 17th IEEE International Conference on Machine Learning and Applications, Orlando, Florida, USA, 17\u201320 December 2018 pp. 1040\u20131047. IEEE SMC (2018)","DOI":"10.1109\/ICMLA.2018.00170"},{"issue":"15","key":"23_CR4","doi-asserted-by":"publisher","first-page":"3531","DOI":"10.1016\/j.comnet.2012.02.019","volume":"56","author":"A Botta","year":"2012","unstructured":"Botta, A., Dainotti, A., Pescap\u00e8, A.: A tool for the generation of realistic network workload for emerging networking scenarios. Comput. Netw. 56(15), 3531\u20133547 (2012)","journal-title":"Comput. Netw."},{"issue":"1","key":"23_CR5","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","volume":"21","author":"I Farris","year":"2018","unstructured":"Farris, I., Taleb, T., Khettab, Y., Song, J.: A survey on emerging and NFV security mechanisms for IoT systems. IEEE Commun. Surv. Tutor. 21(1), 812\u2013837 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"23_CR6","unstructured":"Foundation, O.N.: OpenFlow switch specification. Report ONF TS-023, Open Networking Foundation (2015)"},{"key":"23_CR7","unstructured":"Frost and Sullivan: IoT Security Market Watch-Key Market Needs and Solution Providers in the IoT Landscape, June 2017. https:\/\/store.frost.com\/iot-security-market-watch-key-market-needs-and-solution-providers-in-the-iot-landscape.html"},{"issue":"1","key":"23_CR8","first-page":"52","volume":"10","author":"A Ghosh","year":"2016","unstructured":"Ghosh, A.: Big data and its utility. Consult. Ahead 10(1), 52\u201368 (2016)","journal-title":"Consult. Ahead"},{"key":"23_CR9","first-page":"493","volume-title":"Deep Learning","author":"I Goodfellow","year":"2017","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning, pp. 493\u2013495. MIT Press, Cambridge (2017)"},{"issue":"3","key":"23_CR10","doi-asserted-by":"publisher","first-page":"2600","DOI":"10.1109\/COMST.2019.2892806","volume":"21","author":"M He","year":"2019","unstructured":"He, M., Alba, A.M., Basta, A., Blenk, A., Kellerer, W.: Flexibility in softwarized networks: classifications and research challenges. IEEE Commun. Surv. Tutor. 21(3), 2600\u20132636 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"23_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"23_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-BaIoT - network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., Sadeghi, A.R.: DIoT: a federated self-learning anomaly detection system for IoT. In: IEEE 39th International Conference on Distributed Computing Systems, Dallas, Texas, USA, 7\u20139 July 2019, pp. 756\u2013767 (2019)","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"23_CR14","doi-asserted-by":"publisher","unstructured":"Zolanvari, M., Teixeira, M.A., Jain, R.: Effect of imbalanced datasets on security of industrial iot using machine learning. In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 112\u2013117, November 2018. https:\/\/doi.org\/10.1109\/ISI.2018.8587389","DOI":"10.1109\/ISI.2018.8587389"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49186-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T23:22:18Z","timestamp":1716938538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49186-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030491857","9783030491864"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49186-4_23","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Neos Marmaras","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.aiai2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easyacademia.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}