{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:13:21Z","timestamp":1774541601625,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030529871","type":"print"},{"value":"9783030529888","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52988-8_7","type":"book-chapter","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T15:37:10Z","timestamp":1596123430000},"page":"73-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things"],"prefix":"10.1007","author":[{"given":"Hafsa","family":"Benaddi","sequence":"first","affiliation":[]},{"given":"Khalil","family":"Ibrahimi","sequence":"additional","affiliation":[]},{"given":"Abderrahim","family":"Benslimane","sequence":"additional","affiliation":[]},{"given":"Junaid","family":"Qadir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,31]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1186\/s13638-019-1358-8","volume":"2019","author":"A Ghosh","year":"2019","unstructured":"Ghosh, A., Khalid, O., Rais, R.N.B., Rehman, A., Malik, S.U.R., Khan, I.A.: Data offloading in IoT environment: modeling, analysis, and verification. EURASIP J. Wireless Commun. Networking 2019, 53 (2019)","journal-title":"EURASIP J. Wireless Commun. Networking"},{"key":"7_CR2","unstructured":"Mandayam, P., Liu, L., Saha, S., Tan, P., Nucci, A.: Combining supervised and unsupervised learning for zero-day malware detection. In: Proceedings of IEEE INFOCOM, pp. 2070\u20132078 (2013)"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Network Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Network Comput. Appl."},{"key":"7_CR4","unstructured":"Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Chalmers University of Technology, pp. 1\u201327 (2000)"},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.9734\/BJAST\/2016\/23668","volume":"15","author":"Y Hamid","year":"2016","unstructured":"Hamid, Y., Sugumaran, M., Balasaraswathi, V.: IDS using machine learning - current state of art and future directions. Br. J. Appl. Sci. Technol. 15(3), 1\u201322 (2016)","journal-title":"Br. J. Appl. Sci. Technol."},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2542049","volume":"46","author":"R Mitchell","year":"2014","unstructured":"Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 1\u201329 (2014). 55","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Ibrahimi, K., Ouaddane, M.: Management of intrusion detection systems based-KDD99: analysis with LDA and PCA. In: International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1\u20136 (2017)","DOI":"10.1109\/WINCOM.2017.8238171"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: Proceedings of the First International Conference on Availability Reliability and Security (ARES 2006), pp. 270\u2013279 (2006)","DOI":"10.1109\/ARES.2006.73"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Benaddi, H., Ibrahimi, K., Benslimane, A.: Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN. In: Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1\u20136 (2018)","DOI":"10.1109\/WINCOM.2018.8629718"},{"issue":"5","key":"7_CR10","doi-asserted-by":"publisher","first-page":"23","DOI":"10.14257\/ijdta.2013.6.5.03","volume":"6","author":"MK Siddiqui","year":"2013","unstructured":"Siddiqui, M.K., Naahid, S.: Analysis of KDD CUP 99 dataset using clustering based data mining. Int. J. Database Theory Appl. 6(5), 23\u201334 (2013)","journal-title":"Int. J. Database Theory Appl."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Chen, W., Liu, Y., Guan, Y.: Cardinality change-based early detection of large-scale cyber-attacks. In: Proceedings of IEEE INFOCOM, pp. 1836\u20131844 (2013)","DOI":"10.1109\/INFCOM.2013.6566977"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Han, M., Liu, L., He, J., Wang, Y.: Deep learning approach for cyber-attack detection. In: Conference on Computer Communications Workshops (INFOCOM WKSHPS): IEEE Infocom MiseNet Workshop, pp. 262\u2013267 (2018)","DOI":"10.1109\/INFCOMW.2018.8407032"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-018-1128-z","volume":"2018","author":"L Liu","year":"2018","unstructured":"Liu, L., Xu, B., Zhang, X., Wu, X.: An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J. Wireless Commun. Networking 2018(1), 1\u20137 (2018). \nhttps:\/\/doi.org\/10.1186\/s13638-018-1128-z","journal-title":"EURASIP J. Wireless Commun. Networking"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Al-Zewairi, M., Almajali, S., Awajan, A.: Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: International Conference on New Trends in Computing Sciences (ICTCS), pp. 167\u2013172 (2017)","DOI":"10.1109\/ICTCS.2017.29"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Otoum, S., Kantarci, B., Mouftah, H.: Empowering reinforcement learning on big sensed data for intrusion detection. In: International Conference on Communications (2019)","DOI":"10.1109\/ICC.2019.8761575"},{"key":"7_CR16","series-title":"SpringerBriefs in Electrical and Computer Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10546-4","volume-title":"Deep Reinforcement Learning for Wireless Networks","author":"FR Yu","year":"2019","unstructured":"Yu, F.R., He, Y.: Deep Reinforcement Learning for Wireless Networks. SECE. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-10546-4"},{"issue":"99","key":"7_CR17","first-page":"1","volume":"PP","author":"M Mohammadi","year":"2017","unstructured":"Mohammadi, M., Al-Fuqaha, A., Guizani, M., Oh, J.-S.: Semi supervised deep reinforcement learning in support of IoT and smart city services. IEEE Internet Things J. PP(99), 1\u201312 (2017)","journal-title":"IEEE Internet Things J."},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/11538059_103","volume-title":"Advances in Intelligent Computing","author":"X Xu","year":"2005","unstructured":"Xu, X., Xie, T.: A reinforcement learning approach for host-based intrusion detection using sequences of system calls. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3644, pp. 995\u20131003. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11538059_103"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-540-77949-0_15","volume-title":"Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning","author":"A Servin","year":"2008","unstructured":"Servin, A., Kudenko, D.: Multi-agent reinforcement learning for intrusion detection. In: Tuyls, K., Nowe, A., Guessoum, Z., Kudenko, D. (eds.) AAMAS\/ALAMAS 2005-2007. LNCS (LNAI), vol. 4865, pp. 211\u2013223. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-77949-0_15"},{"key":"7_CR20","unstructured":"Alpcan, T., Basar, T.: An intrusion detection game with limited observations. In: Proceedings of the 12th International Symposium on Dynamic Games and Applications. Citeseer (2006)"},{"issue":"5","key":"7_CR21","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1016\/j.asoc.2012.01.009","volume":"12","author":"S Shen","year":"2012","unstructured":"Shen, S., Han, R., Guo, L., Li, W., Cao, Q.: Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain. Appl. Soft Comput. 12(5), 1467\u20131476 (2012)","journal-title":"Appl. Soft Comput."},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Liu, J., Yue, G., Shen, S., Shang, H., Li, H.: A game-theoretic response strategy for coordinator attack in wireless sensor networks. Sci. World J. 2014, Article ID 950618, 10 pages (2014). \nhttps:\/\/doi.org\/10.1155\/2014\/950618","DOI":"10.1155\/2014\/950618"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52988-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T15:45:36Z","timestamp":1596123936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52988-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030529871","9783030529888"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52988-8_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WiCON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Wireless Internet Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"TaiChung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wicon2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wicon2019.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}