{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:13:17Z","timestamp":1761664397862,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030996185"},{"type":"electronic","value":"9783030996192"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99619-2_4","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"33-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Proposed Intrusion Detection Method Based on Machine Learning Used for Internet of Things Systems"],"prefix":"10.1007","author":[{"given":"Neder","family":"Karmous","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed Ould-Elhassen","family":"Aoueileyine","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manel","family":"Abdelkader","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Neji","family":"Youssef","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"issue":"7","key":"4_CR1","doi-asserted-by":"publisher","first-page":"4405","DOI":"10.37418\/amsj.9.7.11","volume":"9","author":"VD Gowda","year":"2020","unstructured":"Gowda, V.D., et al.: Internet of Things: Internet revolution, impact, technology road map and features. Adv. Math. Sci. J. 9(7), 4405\u20134414 (2020)","journal-title":"Adv. Math. Sci. J."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Yousefnezhad, N., Avleen, M., Kary, F.: Security in the product lifecycle of IoT devices: a survey. J. Netw. Comput. Appl. 102779 (2020)","DOI":"10.1016\/j.jnca.2020.102779"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"102728","DOI":"10.1016\/j.adhoc.2021.102728","volume":"125","author":"LP Rondon","year":"2022","unstructured":"Rondon, L.P., et al.: Survey on enterprise Internet-of-Things systems (E-IoT): a security perspective. Ad Hoc Netw. 125, 102728 (2022)","journal-title":"Ad Hoc Netw."},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Guo, G.: A Machine learning framework for intrusion detection system in IoT networks using an ensemble feature selection method. In: 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 0593\u201305992021). https:\/\/doi.org\/10.1109\/IEMCON53756.2021.9623082","DOI":"10.1109\/IEMCON53756.2021.9623082"},{"issue":"1","key":"4_CR5","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad, Z., et al.: Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"107840","DOI":"10.1016\/j.comnet.2021.107840","volume":"188","author":"IF Kilincer","year":"2021","unstructured":"Kilincer, I.F., Ertam, F., Sengur, A.: Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Comput. Netw. 188, 107840 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.107840","journal-title":"Comput. Netw."},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"100393","DOI":"10.1016\/j.iot.2021.100393","volume":"14","author":"IH Sarker","year":"2021","unstructured":"Sarker, I.H.: CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet of Things 14, 100393 (2021). https:\/\/doi.org\/10.1016\/j.iot.2021.100393","journal-title":"Internet of Things"},{"issue":"6","key":"4_CR8","first-page":"118","volume":"7","author":"X Ma","year":"2021","unstructured":"Ma, X., Cheng, X.: Detection and analysis of network intrusion data set based on KNN algorithm. World Sci. Res. J. 7(6), 118\u2013123 (2021)","journal-title":"World Sci. Res. J."},{"issue":"8","key":"4_CR9","first-page":"2137","volume":"24","author":"R Kaushik","year":"2021","unstructured":"Kaushik, R., Singh, V., Kumar, R.: Multi-class SVM based network intrusion detection with attribute selection using infinite feature selection technique. J. Discr. Math. Sci. Cryptog. 24(8), 2137\u20132153 (2021)","journal-title":"J. Discr. Math. Sci. Cryptog."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-981-16-5559-3_26","volume-title":"Advances on Smart and Soft Computing: Proceedings of ICACIn 2021","author":"MA Khan","year":"2022","unstructured":"Khan, M.A., et al.: Voting classifier-based intrusion detection for IoT networks. In: Saeed, F., Al-Hadhrami, T., Mohammed, E., Al-Sarem, M. (eds.) Advances on Smart and Soft Computing: Proceedings of ICACIn 2021, pp. 313\u2013328. Springer Singapore, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-5559-3_26"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Wester, P., Fredrik, H., Robert, L.: Anomaly-based intrusion detection using tree augmented naive bayes. In: 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW). IEEE (2021)","DOI":"10.1109\/EDOCW52865.2021.00040"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Alshamy, R., et al.: Intrusion detection model for imbalanced dataset using SMOTE and random forest algorithm. In: International Conference on Advances in Cyber Security. Springer, Singapore (2021)","DOI":"10.1007\/978-981-16-8059-5_22"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Noureen, S.S., et al.: Anomaly detection in the cyber-physical system using logistic regression analysis. In: 2019 IEEE Texas Power and Energy Conference (TPEC). IEEE (2019)","DOI":"10.1109\/TPEC.2019.8662186"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Shen, Z., Yuhao, Z., Weiying, C.: A bayesian classification intrusion detection method based on the fusion of PCA and LDA. Secur. Commun. Netw. 2019 (2019)","DOI":"10.1155\/2019\/6346708"},{"key":"4_CR15","unstructured":"Rhohim, A., Vera, S., Muhammad Arief, N.: Denial of service traffic validation using K-fold cross-validation on software defined network. eProc. Eng. 8(5) (2021)"},{"key":"4_CR16","unstructured":"Moustafa, N.: New generations of Internet of Things datasets for cybersecurity applications based machine learning: TON_IoT datasets. In: Proceedings of the eResearch Australasia Conference, Brisbane, Australia (2019)"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3022862","journal-title":"IEEE Access"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.gltp.2021.08.017","volume":"2","author":"TS Pooja","year":"2021","unstructured":"Pooja, T.S., Purohit, S.: Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security. Glob. Transit. Proc. 2(2), 448\u2013454 (2021)","journal-title":"Glob. Transit. Proc."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., et al.: Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics 10(11), 1257 (2021)","DOI":"10.3390\/electronics10111257"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Khan, A., Chase, C.: Detecting attacks on IoT devices using featureless 1D-CNN. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE (2021)","DOI":"10.1109\/CSR51186.2021.9527910"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Park, S.H., Hyun, J.P., Young-June, C.: RNN-based prediction for network intrusion detection. In: 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE (2020)","DOI":"10.1109\/ICAIIC48513.2020.9065249"},{"issue":"6","key":"4_CR22","doi-asserted-by":"publisher","first-page":"74","DOI":"10.17762\/turcomat.v12i6.1269","volume":"12","author":"G Swarnalatha","year":"2021","unstructured":"Swarnalatha, G.: Detect and classify the unpredictable cyber-attacks by using DNN model. Turkish J. Comput. Math. Educ. (TURCOMAT) 12(6), 74\u201381 (2021)","journal-title":"Turkish J. Comput. Math. Educ. (TURCOMAT)"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-030-33617-2_31","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2019: 20th International Conference, Manchester, UK, November 14\u201316, 2019, Proceedings, Part II","author":"B Gulowaty","year":"2019","unstructured":"Gulowaty, B., Ksieniewicz, P.: SMOTE algorithm variations in balancing data streams. In: Yin, H., Camacho, D., Tino, P., Tall\u00f3n-Ballesteros, A.J., Menezes, R., Allmendinger, R. (eds.) Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2019: 20th International Conference, Manchester, UK, November 14\u201316, 2019, Proceedings, Part II, pp. 305\u2013312. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33617-2_31"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99619-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T11:49:24Z","timestamp":1700394564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99619-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030996185","9783030996192"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99619-2_4","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}