{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:10:28Z","timestamp":1742962228589,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630829"},{"type":"electronic","value":"9783030630836"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63083-6_23","type":"book-chapter","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T16:18:09Z","timestamp":1605889089000},"page":"301-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Optimal Packet Assignment Algorithm for Multi-level Network Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Dao","family":"Thi-Nga","sequence":"first","affiliation":[]},{"given":"Chi Hieu","family":"Ta","sequence":"additional","affiliation":[]},{"given":"Van Son","family":"Vu","sequence":"additional","affiliation":[]},{"given":"Duc Van","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,21]]},"reference":[{"issue":"8","key":"23_CR1","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1109\/TCYB.2018.2838668","volume":"49","author":"VL Cao","year":"2019","unstructured":"Cao, V.L., Nicolau, M., McDermott, J.: Learning neural representations for network anomaly detection. IEEE Trans. Cybern. 49(8), 3074\u20133087 (2019)","journal-title":"IEEE Trans. Cybern."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Clark, M., Dutta, P.: The haunted house: Networking smart homes to enable casual long-distance social interactions. In: IoT-App 2015 (2015)","DOI":"10.1145\/2820975.2820976"},{"key":"23_CR3","unstructured":"Doffman, Z.: Cyberattacks on IOT devices surge 300% in 2019, \u2018measured in billions\u2019, report claims (2019). https:\/\/bit.ly\/35uPCI7. Accessed 04 May 2020"},{"key":"23_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.comnet.2019.04.027","volume":"158","author":"S Hosseini","year":"2019","unstructured":"Hosseini, S., Azizi, M.: The hybrid technique for DDoS detection with supervised learning algorithms. Comput. Netw. 158, 35\u201345 (2019)","journal-title":"Comput. Netw."},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"30373","DOI":"10.1109\/ACCESS.2019.2899721","volume":"7","author":"FA Khan","year":"2019","unstructured":"Khan, F.A., Gumaei, A., Derhab, A., Hussain, A.: A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7, 30373\u201330385 (2019)","journal-title":"IEEE Access"},{"key":"23_CR6","unstructured":"Lapolli, A.C., Marques, J.A., Gaspary, L.P.: Offloading real-time DDoS attack detection to programmable data planes. In: 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 19\u201327 (2019)"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s13173-019-0085-7","volume":"25","author":"C Morais","year":"2019","unstructured":"Morais, C., Sadok, D., Kelner, J.: An IoT sensor and scenario survey for data researchers. J. Braz. Comput. Soc. 25, 4 (2019)","journal-title":"J. Braz. Comput. Soc."},{"issue":"3","key":"23_CR8","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"6","author":"N Moustafa","year":"2019","unstructured":"Moustafa, N., Turnbull, B., Choo, K.R.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. 6(3), 4815\u20134830 (2019)","journal-title":"IEEE Internet Things J."},{"key":"23_CR9","unstructured":"Carvalho, R.N., Bordim, J.L., Alchieri, E.A.P: Entropy-based dos attack identification in SDN. In: 2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), pp. 627\u2013634 (2019)"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"107678","DOI":"10.1109\/ACCESS.2019.2932438","volume":"7","author":"TG Nguyen","year":"2019","unstructured":"Nguyen, T.G., Phan, T.V., Nguyen, B.T., So-In, C., Baig, Z.A., Sanguanpong, S.: Search: a collaborative and intelligent NIDS architecture for SDN-based cloud IoT networks. IEEE Access 7, 107678\u2013107694 (2019)","journal-title":"IEEE Access"},{"key":"23_CR11","unstructured":"Systems, C.: Cisco Annual Internet Report (2018\u20132023) White Paper. Technical Report Cisco Systems (2020)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Vu, L., Cao, V.L., Uy, N.Q., Nguyen, D.N., Hoang, D.T., Dutkiewicz, E.: Learning latent distribution for distinguishing network traffic in intrusion detection system, pp. 1\u20136 (2019)","DOI":"10.1109\/ICC.2019.8762015"},{"key":"23_CR13","unstructured":"Xilinx: Xilinx Virtex-7 FPGA VC707 Evaluation Kit. Tech. rep., Xilinx"},{"issue":"2","key":"23_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.2018.1700621","volume":"56","author":"Q Yan","year":"2018","unstructured":"Yan, Q., Huang, W., Luo, X., Gong, Q., Yu, F.R.: A multi-level DDos mitigation framework for the industrial internet of things. IEEE Commun. Mag. 56(2), 30\u201336 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"11","key":"23_CR15","doi-asserted-by":"publisher","first-page":"2528","DOI":"10.3390\/s19112528","volume":"19","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Zheng, K., Wu, C., Yang, Y.: Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network. Sensors 19(11), 2528 (2019)","journal-title":"Sensors"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63083-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T12:03:46Z","timestamp":1619265826000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63083-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630829","9783030630836"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63083-6_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INISCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Industrial Networks and Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iniscom2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iniscom.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID-19 pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}