{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:02:10Z","timestamp":1770843730294,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031609930","type":"print"},{"value":"9783031609947","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60994-7_16","type":"book-chapter","created":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T23:04:39Z","timestamp":1716764679000},"page":"194-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Real-Time Anomaly Detection in Network Traffic Using Graph Neural Networks and Random Forest"],"prefix":"10.1007","author":[{"given":"Waseem","family":"Hassan","sequence":"first","affiliation":[]},{"given":"Seyed Ebrahim","family":"Hosseini","sequence":"additional","affiliation":[]},{"given":"Shahbaz","family":"Pervez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,26]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Hosseini, S., Goher, K.: Personal care robots for children: state of the art (2017)","DOI":"10.5539\/ass.v13n1p169"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Hosseini, S., Charters, S., Anthony, P., Alhazmi, A.: Effects of \u201cthe selected smartphone social-messaging applications\u201d training on Iranian elderly\u2019s quality of life: results of a qualitative study (2021)","DOI":"10.3991\/ijim.v15i07.19475"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Hosseini, S.E., Charters, S., Anthony, P.: Effects of smartphone social applications on elderly people\u2019s quality of life. Int. J. Interact. Mob. Technol. 17(2) (2023)","DOI":"10.3991\/ijim.v17i02.35457"},{"issue":"4","key":"16_CR4","first-page":"28","volume":"4","author":"SE Hosseini","year":"2022","unstructured":"Hosseini, S.E., Pervez, S.: Effects of smartphone applications on elderly people\u2019s quality of life. Int. J. Technol. Manag. Inf. Syst. 4(4), 28\u201338 (2022)","journal-title":"Int. J. Technol. Manag. Inf. Syst."},{"key":"16_CR5","unstructured":"Hosseini, S.E.: The effect of technology upskilling on the quality of life of elderly people in Iran: a thesis submitted in partial fulfilment of the requirements for the Degree of Doctor of Philosophy at Lincoln University, Lincoln University (2023)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Wilson, J., Hosseini, S.E., Pervez, S.: Identification of fake news in social media using sentimental analysis. In: 2023 IEEE Industrial Electronics and Applications Conference (IEACon), pp. 220\u2013224. IEEE (2023)","DOI":"10.1109\/IEACon57683.2023.10370300"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Khan, R., Hasan, M.: Network threats, attacks and security measures: a review. Int. J. Adv. Res. Comput. Sci. 8(8) (2017)","DOI":"10.26483\/ijarcs.v8i8.4641"},{"key":"16_CR8","unstructured":"Pervez, S., Abosaq, N., Alandjani, G., Akram, A.: Internet of Things (IoT) as beginning for jail-less community in smart society. In: IEEE International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), pp. 28\u201329 (2018)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Bansal, B., et al.: Big data architecture for network security. In: Cyber Security and Network Security, pp. 233\u2013267 (2022)","DOI":"10.1002\/9781119812555.ch11"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Ali, W.A., Manasa, K., Bendechache, M., Fadhel Aljunaid, M., Sandhya, P.: A review of current machine learning approaches for anomaly detection in network traffic. J. Telecommun. Digit. Econ. 8(4), 64\u201395 (2020)","DOI":"10.18080\/jtde.v8n4.307"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Imran, Zuhairi, M.F.A., Ali, S.M., Shahid, Z., Alam, M.M., Su\u2019ud, M.M.: Improving reliability for detecting anomalies in the MQTT network by applying correlation analysis for feature selection using machine learning techniques. Appl. Sci. 13(11), 6753 (2023)","DOI":"10.3390\/app13116753"},{"issue":"11","key":"16_CR12","doi-asserted-by":"publisher","first-page":"5059","DOI":"10.3390\/s23115059","volume":"23","author":"W Hu","year":"2023","unstructured":"Hu, W., Cao, L., Ruan, Q., Wu, Q.: Research on anomaly network detection based on self-attention mechanism. Sensors 23(11), 5059 (2023)","journal-title":"Sensors"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Imtiaz, S.I., et al.: Efficient approach for anomaly detection in internet of things traffic using deep learning. Wireless Commun. Mob. Comput. (2022)","DOI":"10.1155\/2022\/8266347"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Qu, Y., Ma, H., Jiang, Y.: CRND: an unsupervised learning method to detect network anomaly. Secur. Commun. Netw. 2022 (2022)","DOI":"10.1155\/2022\/9509417"},{"key":"16_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108906","volume":"209","author":"J Pei","year":"2022","unstructured":"Pei, J., Zhong, K., Jan, M.A., Li, J.: Personalized federated learning framework for network traffic anomaly detection. Comput. Netw. 209, 108906 (2022)","journal-title":"Comput. Netw."},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985\u2013994 (2015)","DOI":"10.1145\/2783258.2783370"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: FRAUDAR: bounding graph fraud in the face of camouflage. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 895\u2013904 (2016)","DOI":"10.1145\/2939672.2939747"},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29, 626\u2013688 (2015)","journal-title":"Data Min. Knowl. Disc."},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Kumar, S., Hooi, B., Makhija, D., Kumar, M., Faloutsos, C., Subrahmanian, V.: REV2: fraudulent user prediction in rating platforms. In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, pp. 333\u2013341 (2018)","DOI":"10.1145\/3159652.3159729"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Chai, Z., et al.: Can abnormality be detected by graph neural networks. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI), Vienna, Austria, pp. 23\u201329 (2022)","DOI":"10.24963\/ijcai.2022\/270"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Kim, H., Lee, B.S., Shin, W.-Y., Lim, S.: Graph anomaly detection with graph neural networks: current status and challenges. IEEE Access (2022)","DOI":"10.1109\/ACCESS.2022.3211306"},{"key":"16_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbi.2023.102538","volume":"79","author":"P Veli\u010dkovi\u0107","year":"2023","unstructured":"Veli\u010dkovi\u0107, P.: Everything is connected: graph neural networks. Curr. Opin. Struct. Biol. 79, 102538 (2023)","journal-title":"Curr. Opin. Struct. Biol."},{"key":"16_CR23","unstructured":"Ma, X., et al.: A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data Eng. (2021)"},{"key":"16_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou, J., et al.: Graph neural networks: a review of methods and applications. AI Open 1, 57\u201381 (2020)","journal-title":"AI Open"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Anton, S.D.D., Sinha, S., Schotten, H.D.: Anomaly-based intrusion detection in industrial data with SVM and random forests. In: 2019 International Conference on Software, Telecommunications, and Computer Networks (SoftCOM), pp. 1\u20136. IEEE (2019)","DOI":"10.23919\/SOFTCOM.2019.8903672"},{"key":"16_CR26","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/978-3-030-62008-0_35","volume-title":"Web Information Systems Engineering \u2013 WISE 2020","author":"Z Jin","year":"2020","unstructured":"Jin, Z., Shang, J., Zhu, Q., Ling, C., Xie, W., Qiang, B.: RFRSF: employee turnover prediction based on random forests and survival analysis. In: Huang, Z., Beek, W., Wang, H., Zhou, R., Zhang, Y. (eds.) Web Information Systems Engineering \u2013 WISE 2020. LNCS, vol. 12343, pp. 503\u2013515. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62008-0_35"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Primartha, R., Tama, B.A.: Anomaly detection using random forest: a performance revisited. In: 2017 International Conference on Data and Software Engineering (ICoDSE), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICODSE.2017.8285847"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, Q.: Financial data anomaly detection method based on decision tree and random forest algorithm. J. Math. 2022 (2022)","DOI":"10.1109\/ICCBE56101.2022.9888169"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Aslam, N., et al.: Anomaly detection using explainable random forest for the prediction of undesirable events in oil wells. Appl. Comput. Intell. Soft Comput. 2022 (2022)","DOI":"10.1155\/2022\/1558381"},{"issue":"9","key":"16_CR30","volume":"6","author":"B Sanchez-Lengeling","year":"2021","unstructured":"Sanchez-Lengeling, B., Reif, E., Pearce, A., Wiltschko, A.B.: A gentle introduction to graph neural networks. Distill 6(9), e33 (2021)","journal-title":"Distill"},{"key":"16_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2022.107795","volume":"40","author":"V Valeros","year":"2022","unstructured":"Valeros, V., Garcia, S.: Hornet 40: network dataset of geographically placed honeypots. Data Brief 40, 107795 (2022)","journal-title":"Data Brief"},{"key":"16_CR32","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization, arXiv preprint arXiv:1412.6980 (2014)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60994-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T23:10:10Z","timestamp":1716765010000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60994-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031609930","9783031609947"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60994-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}