{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:59:40Z","timestamp":1743076780426,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031530845"},{"type":"electronic","value":"9783031530852"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53085-2_18","type":"book-chapter","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T18:02:40Z","timestamp":1706551360000},"page":"209-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["VAIDS: A Hybrid Deep Learning Model to Detect Intrusions in MQTT Protocol Enabled Networks"],"prefix":"10.1007","author":[{"given":"Chetanya","family":"Kunndra","sequence":"first","affiliation":[]},{"given":"Arjun","family":"Choudhary","sequence":"additional","affiliation":[]},{"given":"Jaspreet","family":"Kaur","sequence":"additional","affiliation":[]},{"given":"Prashant","family":"Mathur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,30]]},"reference":[{"issue":"10","key":"18_CR1","doi-asserted-by":"publisher","first-page":"3846","DOI":"10.1109\/JSEN.2013.2263379","volume":"13","author":"SDT Kelly","year":"2013","unstructured":"Kelly, S.D.T., Suryadevara, N.K., Mukhopadhyay, S.C.: Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens. J. 13(10), 3846\u20133853 (2013)","journal-title":"IEEE Sens. J."},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-030-90158-5_3","volume-title":"Internet of Things From Hype to Reality: The Road to Digitization","author":"A Rayes","year":"2022","unstructured":"Rayes, A., Salam, S.: The things in iot: Sensors and actuators. In: Internet of Things From Hype to Reality: The Road to Digitization, pp. 63\u201382. Springer International Publishing, Cham (2022)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Suresh, P., Daniel, J.V., Parthasarathy, V., Aswathy, R.H.: November. A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment. In: 2014 International Conference On Science Engineering and Management Research (ICSEMR) (pp. 1\u20138). IEEE (2014)","DOI":"10.1109\/ICSEMR.2014.7043637"},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/JIOT.2021.3079916","volume":"9","author":"C Xenofontos","year":"2021","unstructured":"Xenofontos, C., Zografopoulos, I., Konstantinou, C., Jolfaei, A., Khan, M.K., Choo, K.K.R.: Consumer, commercial, and industrial iot (in) security: attack taxonomy and case studies. IEEE Internet Things J. 9(1), 199\u2013221 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"18_CR5","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","volume":"14","author":"E Sisinni","year":"2018","unstructured":"Sisinni, E., Saifullah, A., Han, S., Jennehag, U., Gidlund, M.: Industrial internet of things: challenges, opportunities, and directions. IEEE Trans. Industr. Inf. 14(11), 4724\u20134734 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"18_CR6","unstructured":"Sinha, S.: State of IOT 2023: Number of connected IOT devices growing 16% to 16.7 billion globally, IoT Analytics (2023). https:\/\/iot-analytics.com\/number-connected-iot-devices\/. Accessed 27 Aug 2023"},{"key":"18_CR7","unstructured":"Soni, D., Makwana, A.: April. A survey on mqtt: a protocol of internet of things (iot). In: International Conference on Telecommunication, Power Analysis and Computing Techniques (ICTPACT-2017) vol. 20, pp. 173\u2013177 (2017)"},{"key":"18_CR8","unstructured":"Boyd, B., et al.: Building Real-time Mobile Solutions with MQTT and IBM MessageSight. IBM Redbooks (2014)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Hunkeler, U., Truong, H.L., Stanford-Clark, A.: January. MQTT-S\u2014A publish\/subscribe protocol for Wireless Sensor Networks. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE\u201908), pp. 791\u2013798 IEEE (2008)","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Tang, K., Wang, Y., Liu, H., Sheng, Y., Wang, X., Wei, Z.: October. Design and implementation of push notification system based on the MQTT protocol. In 2013 International Conference on Information Science and Computer Applications (ISCA 2013), pp. 116\u2013119. Atlantis Press (2013)","DOI":"10.2991\/isca-13.2013.20"},{"key":"18_CR11","unstructured":"Standard, O.A.S.I.S.: MQTT Version 5.0, vol. 22, p. 2020 (2019)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Nazir, S., Kaleem, M.: March. Reliable image notifications for smart home security with MQTT. In: 2019 International Conference on Information Science and Communication Technology (ICISCT), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/CISCT.2019.8777403"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Profanter, S., Tekat, A., Dorofeev, K., Rickert, M. and Knoll, A., 2019, February. OPC UA versus ROS, DDS, and MQTT: Performance evaluation of industry 4.0 protocols. In 2019 IEEE International Conference on Industrial Technology (ICIT) (pp. 955\u2013962). IEEE","DOI":"10.1109\/ICIT.2019.8755050"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Franceschinis, M., Pastrone, C., Spirito, M.A. and Borean, C.: October. On the performance of ZigBee Pro and ZigBee IP in IEEE 802.15. 4 networks. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 83\u201388. IEEE (2013)","DOI":"10.1109\/WiMOB.2013.6673344"},{"key":"18_CR15","unstructured":"Zalewski, M.: Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, No Starch Press (2005)"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"21881","DOI":"10.1109\/ACCESS.2021.3055577","volume":"9","author":"MF Hyder","year":"2021","unstructured":"Hyder, M.F., Ismail, M.A.: Securing control and data planes from reconnaissance attacks using distributed shadow controllers, reactive and proactive approaches. IEEE Access 9, 21881\u201321894 (2021)","journal-title":"IEEE Access"},{"issue":"3","key":"18_CR17","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.comcom.2010.02.029","volume":"34","author":"JS Cho","year":"2011","unstructured":"Cho, J.S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391\u2013397 (2011)","journal-title":"Comput. Commun."},{"issue":"1","key":"18_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11235-019-00599-z","volume":"73","author":"R Vishwakarma","year":"2020","unstructured":"Vishwakarma, R., Jain, A.K.: A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 73(1), 3\u201325 (2020)","journal-title":"Telecommun. Syst."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Ullah, I., Mahmoud, Q.H.: January. An anomaly detection model for IoT networks based on flow and flag features using a feed-forward neural network. In: 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), pp. 363\u2013368. IEEE (2022)","DOI":"10.1109\/CCNC49033.2022.9700597"},{"issue":"22","key":"18_CR20","doi-asserted-by":"publisher","first-page":"3837","DOI":"10.3390\/electronics11223837","volume":"11","author":"A Alzahrani","year":"2022","unstructured":"Alzahrani, A., Aldhyani, T.H.: Artificial intelligence algorithms for detecting and classifying MQTT protocol internet of things attacks. Electronics 11(22), 3837 (2022)","journal-title":"Electronics"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah, I., Mahmoud, Q.H.: Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9, 103906\u2013103926 (2021)","journal-title":"IEEE Access"},{"issue":"21","key":"18_CR22","doi-asserted-by":"publisher","first-page":"7016","DOI":"10.3390\/s21217016","volume":"21","author":"MA Khan","year":"2021","unstructured":"Khan, M.A., et al.: A deep learning-based intrusion detection system for MQTT enabled IoT. Sensors 21(21), 7016 (2021)","journal-title":"Sensors"},{"key":"18_CR23","unstructured":"Shajan, A.A.: Intrusion Detection in IoT devices using Zero Bias DNN (Doctoral dissertation, Dublin, National College of Ireland) (2021)"},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-64758-2_6","volume-title":"Selected Papers from the 12th International Networking Conference: INC 2020","author":"H Hindy","year":"2021","unstructured":"Hindy, H., Bayne, E., Bures, M., Atkinson, R., Tachtatzis, C., Bellekens, X.: Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset). In: Ghita, B., Shiaeles, S. (eds.) Selected Papers from the 12th International Networking Conference: INC 2020, pp. 73\u201384. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-64758-2_6"},{"key":"18_CR25","unstructured":"Quina, A. and Jones, M.C.: SECFORCE\/Sparta: network infrastructure penetration testing tool, GitHub (2020). https:\/\/github.com\/SECFORCE\/sparta. Accessed 27 Aug 2023"},{"key":"18_CR26","unstructured":"Seger, C.: An investigation of categorical variable encoding techniques in machine learning: binary versus one-hot and feature hashing (2018)"},{"issue":"8","key":"18_CR27","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s10462-020-09825-6","volume":"53","author":"A Khan","year":"2020","unstructured":"Khan, A., Sohail, A., Zahoora, U., Qureshi, A.S.: A survey of the recent architectures of deep convolutional neural networks. Artif. Intell. Rev. 53(8), 5455\u20135516 (2020)","journal-title":"Artif. Intell. Rev."},{"key":"18_CR28","unstructured":"Gholamalinezhad, H., Khosravi, H.: Pooling methods in deep neural networks, a review. arXiv preprint arXiv:2009.07485 (2020)"},{"issue":"2","key":"18_CR29","doi-asserted-by":"publisher","first-page":"99","DOI":"10.3390\/rs8020099","volume":"8","author":"H Liang","year":"2016","unstructured":"Liang, H., Li, Q.: Hyperspectral imagery classification using sparse representations of convolutional neural network features. Remote Sensing 8(2), 99 (2016)","journal-title":"Remote Sensing"},{"issue":"8","key":"18_CR30","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"10","key":"18_CR31","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1162\/089976600300015015","volume":"12","author":"FA Gers","year":"2000","unstructured":"Gers, F.A., Schmidhuber, J., Cummins, F.: Learning to forget: continual prediction with LSTM. Neural Comput. 12(10), 2451\u20132471 (2000)","journal-title":"Neural Comput."},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Zou, X., Hu, Y., Tian, Z., Shen, K.: October. Logistic regression model optimization and case analysis. In: 2019 IEEE 7th international conference on computer science and network technology (ICCSNT), pp. 135\u2013139. IEEE (2019)","DOI":"10.1109\/ICCSNT47585.2019.8962457"},{"key":"18_CR33","unstructured":"Gao, B. and Pavel, L.: On the properties of the softmax function with application in game theory and reinforcement learning. arXiv preprint arXiv:1704.00805 (2017)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Image Processing and Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53085-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T08:06:52Z","timestamp":1712304412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53085-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031530845","9783031530852"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53085-2_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RTIP2R","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Recent Trends in Image Processing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Derby","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rtip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rtip2r-conference.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT, Microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.39","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}