{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:15:04Z","timestamp":1743142504774,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031700101"},{"type":"electronic","value":"9783031700118"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70011-8_41","type":"book-chapter","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:03:06Z","timestamp":1725519786000},"page":"432-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Navigating IoT Complexity: Developing Datasets for\u00a0Smart-Home Device Interactions"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Rak","sequence":"first","affiliation":[]},{"given":"Daniele","family":"Granata","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Esposito","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Ferretti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,6]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Alrawi, O., Lever, C., Antonakakis, M., Monrose, F.: SoK: security evaluation of home-based IoT deployments. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1362\u20131380. IEEE (2019)","DOI":"10.1109\/SP.2019.00013"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., den Hartog, F.T.H.: Ton IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet of Things J. 9(1), 485\u2013496 (2022)","DOI":"10.1109\/JIOT.2021.3085194"},{"key":"41_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102341","volume":"108","author":"M Catillo","year":"2021","unstructured":"Catillo, M., Pecchia, A., Rak, M., Villano, U.: Demystifying the role of public intrusion datasets: a replication study of dos network traffic data. Comput. Secur 108, 102341 (2021)","journal-title":"Comput. Secur"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Conti, M., Mancini, L.V., Spolaor, R., Verde, N.V.: Can\u2019t you hear me knocking: identification of user actions on android apps via traffic analysis. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015), pp. 297\u2013304. Association for Computing Machinery, New York (2015)","DOI":"10.1145\/2699026.2699119"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications: centralized and federated learning (2022)","DOI":"10.36227\/techrxiv.18857336.v1"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Ficco, M., Granata, D., Palmieri, F., Rak, M.: A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles. Internet of Things (Netherlands) 26, 101180 (2024)","DOI":"10.1016\/j.iot.2024.101180"},{"issue":"1","key":"41_CR7","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/COMST.2017.2748278","volume":"20","author":"M Fomichev","year":"2017","unstructured":"Fomichev, M., \u00c1lvarez, F., Steinmetzer, D., Gardner-Stephen, P., Hollick, M.: Survey and systematization of secure device pairing. IEEE Commun. Surv. Tutor. 20(1), 517\u2013550 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"41_CR8","unstructured":"Garcia, S., Parmisano, A., Erquiaga, M.J.: IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic (Version 1.0.0) (2020)"},{"key":"41_CR9","unstructured":"Granata, D., Rak, M., Salzillo, G., Barbato, U.: Security in IoT Pairing and Authentication Protocols, a Threat Model and a Case Study Analysis, vol. 2940, pp. 207\u2013218. CEUR-WS (2021)"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Guerra-Manzanares, A., Medina-Galindo, J., Bahsi, H., N\u00f5mm, S.: Medbiot: generation of an IoT botnet dataset in a medium-sized IoT network. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP), vol. 1, pp. 207\u2013218 (2020)","DOI":"10.5220\/0009187802070218"},{"key":"41_CR11","unstructured":"Hindy, H., Tachtatzis, C., Atkinson, R., Bayne, E., Bellekens, X.: Mqtt-iot-ids2020: Mqtt internet of things intrusion detection dataset (2020)"},{"key":"41_CR12","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: bot-iot dataset. Futur. Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Z., Thapa, N., Shaver, A., Roy, K., Yuan, X., Khorsandroo, S.: Anomaly detection on IoT network intrusion using machine learning. In: 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), pp. 1\u20135 (2020)","DOI":"10.1109\/icABCD49160.2020.9183842"},{"key":"41_CR14","unstructured":"Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Breitenbacher, D., Shabtai, A.: N-baiot. UCI Machine Learning Repository, Detection of iot Botnet Attacks (2018)"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089 (2018)","DOI":"10.14722\/ndss.2018.23204"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Neto, E.C.P., et al.: Ghorbani. Ciciot2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors, 23(13) (2023)","DOI":"10.3390\/s23135941"},{"key":"41_CR17","doi-asserted-by":"crossref","unstructured":"Rak, M., Salzillo, G., Granata, D.: Esseca: an automated expert system for threat modelling and penetration testing for IoT ecosystems. Comput. Electric. Eng. 99, 107721 (2022)","DOI":"10.1016\/j.compeleceng.2022.107721"},{"key":"41_CR18","doi-asserted-by":"crossref","unstructured":"Salzillo, G., Rak, M., Moretta, F.: Threat modeling based penetration testing: the open energy monitor case study. In: 13th International Conference on Security of Information and Networks (SIN 2020). Association for Computing Machinery, New York (2021)","DOI":"10.1145\/3433174.3433181"},{"key":"41_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2022.100359","volume":"30","author":"M Sarhan","year":"2022","unstructured":"Sarhan, M., Layeghy, S., Portmann, M.: Evaluating standard feature sets towards increased generalisability and explainability of ml-based network intrusion detection. Big Data Res. 30, 100359 (2022)","journal-title":"Big Data Res."},{"key":"41_CR20","doi-asserted-by":"crossref","unstructured":"Sivanathan, A., et al.: Classifying IoT devices in smart environments using network traffic characteristics. IEEE Trans. Mobile Comput. (2018)","DOI":"10.1109\/TMC.2018.2866249"},{"key":"41_CR21","doi-asserted-by":"publisher","first-page":"76","DOI":"10.3390\/fi10080076","volume":"10","author":"MA Teixeira","year":"2018","unstructured":"Teixeira, M.A., Salman, T., Zolanvari, M., Jain, R., Meskin, N., Samaka, M.: Scada system testbed for cybersecurity research using machine learning approach. Future Internet 10, 76 (2018)","journal-title":"Future Internet"},{"key":"41_CR22","doi-asserted-by":"crossref","unstructured":"Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: MQTTSET, a new dataset for machine learning techniques on MQTT. Sensors 20(22), 6578 (2020)","DOI":"10.3390\/s20226578"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Complex, Intelligent and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70011-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T17:33:01Z","timestamp":1736789581000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70011-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031700101","9783031700118"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70011-8_41","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"6 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}