{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T04:24:22Z","timestamp":1743567862908,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031861482","type":"print"},{"value":"9783031861499","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-86149-9_8","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T22:15:13Z","timestamp":1743545713000},"page":"77-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IoT Attack Detection Based on Continuous Learning Across Multiple Regions"],"prefix":"10.1007","author":[{"given":"Wei","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Eiichiro","family":"Kodama","sequence":"additional","affiliation":[]},{"given":"Jiahong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bhed Bahadur","family":"Bista","sequence":"additional","affiliation":[]},{"given":"Toyoo","family":"Takata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Geraldi, R.T., Reinehr, S., Malucelli, A.: Softwareproduct line applied to the Internet of Things: a systematic literature review, Inf. Softw. Technol. 124 (2020). Art. no. 106293","DOI":"10.1016\/j.infsof.2020.106293"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Baucas, M.J., Spachos, P.: Using cloud and fog computing for large scale IoT-based urban sound classification. Simul. Model. Pract. Theory 101 (2020). Art. no. 102013","DOI":"10.1016\/j.simpat.2019.102013"},{"issue":"3","key":"8_CR3","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1109\/TCE.2012.6311346","volume":"58","author":"D Rodriguez","year":"2012","unstructured":"Rodriguez, D., Abrahao, J., Begazo, D., Rosa, R., Bressan, G.: Quality metric to assess video streaming service over TCP considering temporal location of pauses. IEEE Trans. Consum. Electron. 58(3), 985\u2013992 (2012)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"3","key":"8_CR4","first-page":"1017","volume":"29","author":"P Nandhini","year":"2020","unstructured":"Nandhini, P., Senthil, M., Darsniya, S.: A network intrusion detection system for IoT using machine learning and deep learning approaches. Int. J. Adv. Sci. Technol. 29(3), 1017\u20131023 (2020)","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"8_CR5","unstructured":"Bolzoni, D., Etalle, S., Hartel, P., Zambon, E.: POSEIDON: a 2-tier anomaly-based network intrusion detection system. In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA), p. 10, April 2006"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Saxena, A.K., Sinha, S., Shukla, P.: General study of intrusion detection system and survey of agent based intrusion detection system. In: Proceedings of the International Conference on Computing, Communication and Automation (ICCCA), pp. 421\u2013471, May 2017","DOI":"10.1109\/CCAA.2017.8229866"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136, July 2009","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"4","key":"8_CR8","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262\u2013294 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"10805","DOI":"10.1109\/ACCESS.2017.2706674","volume":"5","author":"RG Guimaraes","year":"2017","unstructured":"Guimaraes, R.G., Rosa, R.L., De Gaetano, D., Rodriguez, D.Z., Bressan, G.: Age groups classification in social network using deep learning. IEEE Access 5, 10805\u201310816 (2017)","journal-title":"IEEE Access"},{"key":"8_CR10","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkat-raman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525\u201341550 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"8_CR11","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 20 (2019)","journal-title":"Cybersecurity"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Kodys, M., Lu, Z., Fok, K.W.: Intrusion detection in internet of things using convolution-al neural networks. In: Proceedings of the 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 13\u201315December 2021, pp. 1\u201310 (2021)","DOI":"10.1109\/PST52912.2021.9647828"},{"key":"8_CR13","unstructured":"Goodfellow, I.J., Mirza, M., Xiao, D., Courville, A., Bengio, Y.: An empirical investigation of catastrophic forgetting in gradient-based neural networks"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Roy, D., Panda, P., Roy, K.: Tree-CNN: a hierarchical deep convolutional neural network for incremental learning. Neural Netw. 121, 148\u2013160","DOI":"10.1016\/j.neunet.2019.09.010"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Bezerra, V.H., da Costa, V.G.T., Junior, S.B., Miani, R.S., Zarpelao, B.B.: One-class classification to detect Botnets in IoT devices. In: Proceedings of the SBSeg, pp. 43\u201356 (2018)","DOI":"10.5753\/sbseg.2018.4242"},{"key":"8_CR16","doi-asserted-by":"crossref","first-page":"2152","DOI":"10.3390\/electronics9122152","volume":"9","author":"Q Abu Al-Haija","year":"2020","unstructured":"Abu Al-Haija, Q., Zein-Sabatto, S.: An efficient deep-learning-based detection and classification system for cyber-attacks in IoT Communication networks. Electronics 9, 2152 (2020)","journal-title":"Electronics"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Roy, B., Cheung, H.: A deep learning approach for intrusion detection in internet of things using bi-directional long short-term memory recurrent neural network. In: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ATNAC.2018.8615294"},{"key":"8_CR18","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.ins.2019.10.069","volume":"513","author":"MM Hassan","year":"2020","unstructured":"Hassan, M.M., Gumaei, A., Alsanad, A., Alrubaian, M., Fortino, G.: A hybrid deep learning model for efficient intrusion detection in big data environment. Inf. Sci. 513, 386\u2013396 (2020)","journal-title":"Inf. Sci."},{"key":"8_CR19","doi-asserted-by":"crossref","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data and Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-86149-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T22:16:04Z","timestamp":1743545764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-86149-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031861482","9783031861499"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-86149-9_8","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}