{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:25:03Z","timestamp":1763018703832,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031524257"},{"type":"electronic","value":"9783031524264"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-52426-4_2","type":"book-chapter","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:02:28Z","timestamp":1706076148000},"page":"17-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["StrucTemp-GNN: An Intrusion Detection Framework in\u00a0IoT Networks Using Dynamic Heterogeneous Graph Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2596-8969","authenticated-orcid":false,"given":"Imed Eddine","family":"Boukari","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2710-9052","authenticated-orcid":false,"given":"Ihab Abderrahmane","family":"Derdouha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0979-1289","authenticated-orcid":false,"given":"Samia","family":"Bouzefrane","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leila","family":"Hamdad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5695-4923","authenticated-orcid":false,"given":"Safia","family":"Nait-Bahloul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Huraux","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,1,25]]},"reference":[{"key":"2_CR1","unstructured":"Abid, M.: IoT Security Challenges and Mitigations: An Introduction, October 2022"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Alsoufi, M.A., et al.: Anomaly-based intrusion detection systems in IoT using deep learning: a systematic literature review. Appl. Sci. 11(18), 8383 (2021). ISSN 2076-3417. https:\/\/doi.org\/10.3390\/app11188383. https:\/\/www.mdpi.com\/2076-3417\/11\/18\/8383. Accessed 12 Apr 2022","DOI":"10.3390\/app11188383"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Altaf, T., et al.: A new concatenated Multigraph Neural Network for IoT intrusion detection. Internet Things 22, 100818 (2023). ISSN 2542-6605. https:\/\/doi.org\/10.1016\/j.iot.2023.100818. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660523001415. Accessed 20 Oct 2023","DOI":"10.1016\/j.iot.2023.100818"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Bagui, S., Wang, X., Bagui, S.: Machine learning based intrusion detection for IoT Botnet. IJMLC 11(6), 399\u2013406 (2021). ISSN 2010-3700. https:\/\/doi.org\/10.18178\/ijmlc.2021.11.6.1068. https:\/\/www.ijmlc.org\/index.php?m=content &c=index &a=show &catid=117 &id=1256. Accessed 30 Dec 2022","DOI":"10.18178\/ijmlc.2021.11.6.1068"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Caville, E., et al.: Anomal-E: a self-supervised network intrusion detection system based on graph neural networks. Knowl.-Based Syst. 258, 110030 (2022). ISSN 0950-7051. https:\/\/doi.org\/10.1016\/j.knosys.2022.110030. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705122011236. Accessed 24 Jan 2023","DOI":"10.1016\/j.knosys.2022.110030"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey (2019). arXiv Version Number: 2. https:\/\/doi.org\/10.48550\/ARXIV.1901.03407. https:\/\/arxiv.org\/abs\/1901.03407. Accessed 04 Jan 2023","DOI":"10.48550\/ARXIV.1901.03407"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"da Costa, K.A.P., et al.: Internet of Things: a survey on machine learning based intrusion detection approaches. Comput. Netw. 151, 147\u2013157 (2019). ISSN 1389-1286. https:\/\/doi.org\/10.1016\/j.comnet.2019.01.023. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128618308739. Accessed 04 Jan 2023","DOI":"10.1016\/j.comnet.2019.01.023"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Deng, X., et al.: Flow topology-based graph convolutional network for intrusion detection in label-limited IoT networks. IEEE Trans. Netw. Serv. Manage. 1 (2022). ISSN 1932-4537, 2373-7379. https:\/\/doi.org\/10.1109\/TNSM.2022.3213807. https:\/\/ieeexplore.ieee.org\/document\/9919790\/. Accessed 24 Jan 2023","DOI":"10.1109\/TNSM.2022.3213807"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Duan, G., et al.: Application of a dynamic line graph neural network for intrusion detection with semisupervised learning. IEEE Trans. Inform. Forensic Secur. 18, 699\u2013714 (2023). ISSN 1556-6013, 1556-6021. https:\/\/doi.org\/10.1109\/TIFS.2022.3228493. https:\/\/ieeexplore.ieee.org\/document\/9980414\/. Accessed 24 Jan 2023","DOI":"10.1109\/TIFS.2022.3228493"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Gadal, S., et al.: Machine learning-based anomaly detection using K-mean array and sequential minimal optimization. Electronics 11(14), 2158 (2022). ISSN 2079-9292. https:\/\/doi.org\/10.3390\/electronics11142158. https:\/\/www.mdpi.com\/2079-9292\/11\/14\/2158. Accessed 30 Dec 2022","DOI":"10.3390\/electronics11142158"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs (2017). arXiv Version Number: 4. https:\/\/doi.org\/10.48550\/ARXIV.1706.02216. https:\/\/arxiv.org\/abs\/1706.02216. Accessed 24 Jan 2023","DOI":"10.48550\/ARXIV.1706.02216"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Hasan, M., et al.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7, 100059 (2019). ISSN 2542-6605. https:\/\/doi.org\/10.1016\/j.iot.2019.100059. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660519300241. Accessed 30 Dec 2022","DOI":"10.1016\/j.iot.2019.100059"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Heidari, A., Jamali, M.A.J.: Internet of Things intrusion detection systems: a comprehensive review and future directions. Cluster Comput., October 2022. ISSN 1386-7857, 1573-7543. https:\/\/doi.org\/10.1007\/s10586-022-03776-z. Accessed 04 Dec 2022","DOI":"10.1007\/s10586-022-03776-z"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Lo, W.W., et al.: E-GraphSAGE: a graph neural network based intrusion detection system for IoT. In: 2022 IEEE\/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, pp. 1\u20139. IEEE, April 2022. ISBN 978-1-66540-601-7. https:\/\/doi.org\/10.1109\/NOMS54207.2022.9789878. https:\/\/ieeexplore.ieee.org\/document\/9789878\/. Accessed 12 Jan 2023","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Ma, Y., Tang, J.: Deep Learning on Graphs, 1st edn. Cambridge University Press, September 2021. ISBN 978-1-108-92418-4 978-1-108-83174-1. https:\/\/doi.org\/10.1017\/9781108924184. https:\/\/www.cambridge.org\/core\/product\/identifier\/9781108924184\/type\/book. Accessed 08 Jan 2023","DOI":"10.1017\/9781108924184"},{"key":"2_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/9781108924184","volume-title":"Deep Learning on Graphs","author":"Y Ma","year":"2021","unstructured":"Ma, Y., Tang, J.: Deep Learning on Graphs. Cambridge University Press, Cambridge (2021)"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Mahalingam, A., et al.: ROAST-IoT: a novel range-optimized attention convolutional scattered technique for intrusion detection in IoT networks. Sensors 23(19), (2023). ISSN 1424-8220. https:\/\/doi.org\/10.3390\/s23198044. https:\/\/www.mdpi.com\/1424-8220\/23\/19\/8044","DOI":"10.3390\/s23198044"},{"key":"2_CR18","unstructured":"Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. arXiv:2010.16061 [cs, stat], October 2020. https:\/\/arxiv.org\/abs\/2010.16061. Accessed 11 Sept 2023"},{"key":"2_CR19","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-72802-1_9","volume-title":"Big Data Technologies and Applications","author":"M Sarhan","year":"2021","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: NetFlow datasets for machine learning-based network intrusion detection systems. In: Deze, Z., Huang, H., Hou, R., Rho, S., Chilamkurti, N. (eds.) BDTA\/WiCON -2020. LNICST, vol. 371, pp. 117\u2013135. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72802-1_9"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manage. 45(4), 427\u2013437 (2009). ISSN 0306-4573. https:\/\/doi.org\/10.1016\/j.ipm.2009.03.002. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306457309000259. Accessed 11 Sept 2023","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Veli\u010dkovi\u0107, P., et al.: Graph Attention Networks (2017). arXiv Version Number: 3. https:\/\/doi.org\/10.48550\/ARXIV.1710.10903. https:\/\/arxiv.org\/abs\/1710.10903. Accessed 09 Feb 2023","DOI":"10.48550\/ARXIV.1710.10903"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Xiao, J., et al.: Robust anomaly-based intrusion detection system for in vehicle network by graph neural network framework. Appl. Intell. 53(3), 3183\u20133206 (2023). ISSN 0924-669X, 1573-7497. https:\/\/doi.org\/10.1007\/s10489-022-03412-8. Accessed 24 Jan 2023","DOI":"10.1007\/s10489-022-03412-8"},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Zhang, S., et al.: Graph convolutional networks: a comprehensive review. Comput. Soc. Netw. 6(1), 11 (2019). ISSN 2197-4314. https:\/\/doi.org\/10.1186\/s40649-019-0069-y. https:\/\/computationalsocialnetworks.springeropen.com\/articles\/10.1186\/s40649-019-0069-y. Accessed 11 Sept 2023","DOI":"10.1186\/s40649-019-0069-y"},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Zhang, Y., et al.: Intrusion detection of industrial Internet-of-Things based on reconstructed graph neural networks. IEEE Trans. Netw. Sci. Eng. 1\u201312 (2022). ISSN 2327-4697, 2334-329X. https:\/\/doi.org\/10.1109\/TNSE.2022.3184975. https:\/\/ieeexplore.ieee.org\/document\/9802721\/. Accessed 24 Jan 2023","DOI":"10.1109\/TNSE.2022.3184975"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/TNET.2010.2065237","volume":"19","author":"Y Zhou","year":"2011","unstructured":"Zhou, Y., Chiu, D.M., Lui, J.C.S.: A simple model for chunk-scheduling strategies in P2P streaming. IEEE\/ACM Trans. Netw. 19, 42\u201354 (2011). https:\/\/doi.org\/10.1109\/TNET.2010.2065237","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-52426-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:02:52Z","timestamp":1706076172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-52426-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031524257","9783031524264"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-52426-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MSPN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile, Secure, and Programmable Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mspn2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mspn2023.roc.cnam.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}