{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:24:01Z","timestamp":1757543041064,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031451614"},{"type":"electronic","value":"9783031451621"}],"license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-45162-1_7","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:04:44Z","timestamp":1701381884000},"page":"109-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Machine Learning-Based Detection and Prevention Systems for IoE"],"prefix":"10.1007","author":[{"given":"Amna","family":"Khatoon","sequence":"first","affiliation":[]},{"given":"Asad","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Yasir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Miraz MH, Ali M, Excell PS, Picking R (2015) A review on Internet of Things (IoT), Internet of everything (IoE) and Internet of nano things (IoNT). 2015 Internet Technologies and Applications (ITA): 219\u2013224. https:\/\/doi.org\/10.1109\/ITechA.2015.7317398","DOI":"10.1109\/ITechA.2015.7317398"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F (2021) Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies 32 (1):e4150. https:\/\/doi.org\/10.1002\/ett.4150","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"20","key":"7_CR3","doi-asserted-by":"publisher","first-page":"4396","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences 9 (20):4396. https:\/\/doi.org\/10.3390\/app9204396","journal-title":"Applied Sciences"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Kone R, Toutsop O, Thierry KW, Kornegay K, Falaye J Adversarial Machine Learning Attacks in Internet of Things Systems. In: 2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2022. IEEE, pp 1\u20137. https:\/\/doi.org\/10.1109\/AIPR57179.2022.10092216","DOI":"10.1109\/AIPR57179.2022.10092216"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/4141269","volume":"2019","author":"Z Liu","year":"2019","unstructured":"Liu Z, Hao J (2019) Intention recognition in physical human-robot interaction based on radial basis function neural network. Journal of Robotics 2019:1\u20138. https:\/\/doi.org\/10.1155\/2019\/4141269","journal-title":"Journal of Robotics"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Escobedo C, Strong M, West M, Aramburu A, Roncone A Contact anticipation for physical human\u2013robot interaction with robotic manipulators using onboard proximity sensors. In: 2021 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), 2021. IEEE, pp 7255\u20137262. https:\/\/doi.org\/10.1109\/IROS51168.2021.9636130","DOI":"10.1109\/IROS51168.2021.9636130"},{"issue":"17","key":"7_CR7","doi-asserted-by":"publisher","first-page":"2113","DOI":"10.3390\/electronics10172113","volume":"10","author":"QA Al-Haija","year":"2021","unstructured":"Al-Haija QA, Alsulami AA (2021) High performance classification model to identify ransomware payments for heterogeneous Bitcoin networks. Electronics 10 (17):2113. https:\/\/doi.org\/10.3390\/electronics10172113","journal-title":"Electronics"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"568","DOI":"10.3390\/s21020568","volume":"21","author":"VC Farias da Costa","year":"2021","unstructured":"Farias da Costa VC, Oliveira L, de Souza J (2021) Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors 21 (2):568. https:\/\/doi.org\/10.3390\/s21020568","journal-title":"Sensors"},{"key":"7_CR9","unstructured":"Shah J, Malik DL (2013) Impact of DDOS attacks on cloud environment. International Journal of Research in Computer and Communication Technology 2 (7)"},{"issue":"6","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1292","DOI":"10.1109\/TRO.2017.2723903","volume":"33","author":"S Haddadin","year":"2017","unstructured":"Haddadin S, De Luca A, Albu-Sch\u00e4ffer A (2017) Robot collisions: A survey on detection, isolation, and identification. IEEE Transactions on Robotics 33 (6):1292\u20131312. https:\/\/doi.org\/10.1109\/TRO.2017.2723903","journal-title":"IEEE Transactions on Robotics"},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102343","volume":"61","author":"KN Qureshi","year":"2020","unstructured":"Qureshi KN, Rana SS, Ahmed A, Jeon G (2020) A novel and secure attacks detection framework for smart cities industrial internet of things. Sustainable Cities and Society 61:102343","journal-title":"Sustainable Cities and Society"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"26754","DOI":"10.1109\/ACCESS.2017.2773127","volume":"5","author":"S Robla-G\u00f3mez","year":"2017","unstructured":"Robla-G\u00f3mez S, Becerra VM, Llata JR, Gonzalez-Sarabia E, Torre-Ferrero C, Perez-Oria J (2017) Working together: A review on safe human-robot collaboration in industrial environments. IEEE Access 5:26754\u201326773. https:\/\/doi.org\/10.1109\/ACCESS.2017.2773127","journal-title":"IEEE Access"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Zaib MH, Bashir F, Qureshi KN, Kausar S, Rizwan M, Jeon G (2021) Deep learning based cyber bullying early detection using distributed denial of service flow. Multimedia Systems: 1\u201320","DOI":"10.1007\/s00530-021-00771-z"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"AlMasri T, Snober MA, Al-Haija QA IDPS-SDN-ML: An Intrusion Detection and Prevention System Using Software-Defined Networks and Machine Learning. In: 2022 1st International Conference on Smart Technology, Applied Informatics, and Engineering (APICS), 2022. IEEE, pp 133\u2013137. https:\/\/doi.org\/10.1109\/APICS56469.2022.9918804.","DOI":"10.1109\/APICS56469.2022.9918804"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Kanafi FS, Arnarson H, Bremdal BA A new inexpensive approach for securing cyber-physical systems. In: 2022 IEEE\/SICE International Symposium on System Integration (SII), 2022. IEEE, pp 790\u2013796. https:\/\/doi.org\/10.1109\/SII52469.2022.9708861","DOI":"10.1109\/SII52469.2022.9708861"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Masoud M, Jaradat Y, Manasrah A, Jannoud I (2019) Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts. Journal of Sensors 2019. https:\/\/doi.org\/10.1155\/2019\/6514520","DOI":"10.1155\/2019\/6514520"},{"issue":"1","key":"7_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-018-0145-4","volume":"5","author":"S Othman","year":"2018","unstructured":"Othman S, Ba-Alwi F, Alsohybe N, Al-Hashida A Intrusion detection model using machine learning algorithm on Big Data environment. J. Big Data 5 (1), 1\u201312 (2018). https:\/\/doi.org\/10.1186\/s40537-018-0145-4","journal-title":"J. Big Data"},{"key":"7_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2022.100446","volume":"14","author":"L Yang","year":"2022","unstructured":"Yang L, Shami A (2022) IDS-ML: An open source code for Intrusion Detection System development using Machine Learning. Software Impacts 14:100446. https:\/\/doi.org\/10.1016\/j.simpa.2022.100446","journal-title":"Software Impacts"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Sianaki OA, Yousefi A, Tabesh AR, Mahdavi M Internet of everything and machine learning applications: issues and challenges. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2018. IEEE, pp 704\u2013708. https:\/\/doi.org\/10.1109\/WAINA.2018.00171","DOI":"10.1109\/WAINA.2018.00171"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TNSM.2022.3141942","volume":"19","author":"P Illy","year":"2022","unstructured":"Illy P, Kaddoum G, Kaur K, Garg S (2022) ML-based IDPS enhancement with complementary features for home IoT networks. IEEE Transactions on Network and Service Management 19 (2):772\u2013783. https:\/\/doi.org\/10.1109\/TNSM.2022.3141942.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jnca.2019.03.005","volume":"136","author":"C Birkinshaw","year":"2019","unstructured":"Birkinshaw C, Rouka E, Vassilakis VG (2019) Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks. Journal of Network and Computer Applications 136:71\u201385. https:\/\/doi.org\/10.1016\/j.jnca.2019.03.005","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"7_CR22","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.3390\/app13042131","volume":"13","author":"M Ali","year":"2023","unstructured":"Ali M, Qureshi KN, Newe T, Aman K, Ibrahim AO, Almujaly M, Nagmeldin W (2023) Decision-Based Routing for Unmanned Aerial Vehicles and Internet of Things Networks. Applied Sciences 13 (4):2131","journal-title":"Applied Sciences"},{"issue":"4","key":"7_CR23","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s00607-022-01057-6","volume":"105","author":"MO Arowolo","year":"2023","unstructured":"Arowolo MO, Ogundokun RO, Misra S, Agboola BD, Gupta B (2023) Machine learning-based IoT system for COVID-19 epidemics. Computing 105 (4):831\u2013847. https:\/\/doi.org\/10.1007\/s00607-022-01057-6","journal-title":"Computing"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk M, Rindos A Sdsecurity: A software defined security experimental framework. In: 2015 IEEE international conference on communication workshop (ICCW), 2015. IEEE, pp 1871\u20131876. https:\/\/doi.org\/10.1109\/ICCW.2015.7247453","DOI":"10.1109\/ICCW.2015.7247453"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s42979-022-01020-4","volume":"3","author":"V Wylde","year":"2022","unstructured":"Wylde V, Rawindaran N, Lawrence J, Balasubramanian R, Prakash E, Jayal A, Khan I, Hewage C, Platts J (2022) Cybersecurity, data privacy and blockchain: A review. SN Computer Science 3 (2):127. https:\/\/doi.org\/10.1007\/s42979-022-01020-4","journal-title":"SN Computer Science"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Kone R, Toutsop O, Thierry KW, Kornegay K, Falaye J Adversarial Machine Learning Attacks in Internet of Things Systems. In: 2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2022. IEEE, pp 1\u20137. https:\/\/doi.org\/10.1109\/AIPR57179.2022.10092216","DOI":"10.1109\/AIPR57179.2022.10092216"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Sahani N, Zhu R, Cho J-H, Liu C-C (2023) Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey. ACM Transactions on Cyber-Physical Systems. https:\/\/doi.org\/10.1145\/3578366","DOI":"10.1145\/3578366"},{"issue":"2","key":"7_CR28","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1177\/00208523211002605","volume":"87","author":"MS Haque","year":"2021","unstructured":"Haque MS, Ramesh M, Oliveira J P; & Gomide, ADA (2021). Building administrative capacity for development: limits and prospects. International Review of Administrative Sciences 87 (2):211\u2013219. https:\/\/doi.org\/10.1177\/00208523211002605","journal-title":"International Review of Administrative Sciences"}],"container-title":["Internet of Things","Cybersecurity Vigilance and Security Engineering of Internet of Everything"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45162-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:05:18Z","timestamp":1701381918000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45162-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"ISBN":["9783031451614","9783031451621"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45162-1_7","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"type":"print","value":"2199-1073"},{"type":"electronic","value":"2199-1081"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}