{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:40:09Z","timestamp":1744605609560,"version":"3.40.4"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877650","type":"print"},{"value":"9783031877667","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87766-7_36","type":"book-chapter","created":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:16Z","timestamp":1744603756000},"page":"417-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly-Based Intrusion Detection System Using ESP32-WROOM-DA"],"prefix":"10.1007","author":[{"given":"Biagio","family":"Boi","sequence":"first","affiliation":[]},{"given":"Franco","family":"Cirillo","sequence":"additional","affiliation":[]},{"given":"Marco","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Esposito","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,15]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Laghari, A.A., Wu, K., Laghari, R.A., Ali, M., Khan, A.A.: A review and state of art of Internet of Things (IoT). Arch. Comput. Methods Eng. 1\u201319 (2021)","DOI":"10.1007\/s11831-021-09622-6"},{"key":"36_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100420","volume":"15","author":"A Karale","year":"2021","unstructured":"Karale, A.: The challenges of IoT addressing security, ethics, privacy, and laws. Internet Things 15, 100420 (2021)","journal-title":"Internet Things"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Nagi, K.: From bits and bytes to big data-an historical overview. Available at SSRN 3622921 (2020)","DOI":"10.2139\/ssrn.3622921"},{"issue":"3","key":"36_CR4","doi-asserted-by":"publisher","first-page":"580","DOI":"10.5937\/vojtehg66-16670","volume":"66","author":"DD Proti\u0107","year":"2018","unstructured":"Proti\u0107, D.D.: Review of KDD Cup \u201899, NSL-KDD and Kyoto 2006+ datasets. Vojnotehni\u010dki glasnik\/Military Technical Courier 66(3), 580\u2013596 (2018)","journal-title":"Vojnotehni\u010dki glasnik\/Military Technical Courier"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Idrissi, I., Mostafa\u00a0Azizi, M., Moussaoui, O.: A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT. Int. J. Comput. Digit. Syst. (2021)","DOI":"10.12785\/ijcds\/110117"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Manocchio, L.D., Layeghy, S., Portmann, M.: Network intrusion detection system in a light bulb. In: 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC), pp.\u00a01\u20138. IEEE (2022)","DOI":"10.1109\/ITNAC55475.2022.9998371"},{"key":"36_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2023.05.001","volume":"179","author":"S Hosseininoorbin","year":"2023","unstructured":"Hosseininoorbin, S., Layeghy, S., Sarhan, M., Jurdak, R., Portmann, M.: Exploring edge TPU for network intrusion detection in IoT. J. Parallel Distrib. Comput. 179, 104712 (2023)","journal-title":"J. Parallel Distrib. Comput."},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Altulaihan, E., Almaiah, M.A., Aljughaiman, A.: Anomaly detection IDS for detecting DoS attacks in IoT networks based on machine learning algorithms. Sensors 24(2) (2024)","DOI":"10.3390\/s24020713"},{"key":"36_CR9","unstructured":"Salehinejad, H., Sankar, S., Barfett, J., Colak, E., Valaee, S.: Recent advances in recurrent neural networks. arXiv preprint arXiv:1801.01078 (2017)"},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"issue":"1","key":"36_CR11","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1049\/iet-ifs.2018.5258","volume":"13","author":"Y Jia","year":"2019","unstructured":"Jia, Y., Wang, M., Wang, Y.: Network intrusion detection algorithm based on deep neural network. IET Inf. Secur. 13(1), 48\u201353 (2019)","journal-title":"IET Inf. Secur."},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Taher, K.A., Jisan, B.M.Y., Rahman, M.M.: Network intrusion detection using supervised machine learning technique with feature selection. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp.\u00a0643\u2013646. IEEE (2019)","DOI":"10.1109\/ICREST.2019.8644161"},{"issue":"4","key":"36_CR13","doi-asserted-by":"publisher","first-page":"515","DOI":"10.3390\/electronics11040515","volume":"11","author":"A Meliboev","year":"2022","unstructured":"Meliboev, A., Alikhanov, J., Kim, W.: Performance evaluation of deep learning based network intrusion detection system across multiple balanced and imbalanced datasets. Electronics 11(4), 515 (2022)","journal-title":"Electronics"},{"key":"36_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo, S.M.: A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput. Commun. 199, 113\u2013125 (2023)","journal-title":"Comput. Commun."},{"issue":"9s","key":"36_CR15","first-page":"621","volume":"11","author":"A Chakrawarti","year":"2023","unstructured":"Chakrawarti, A., Shrivastava, S.S.: Intrusion detection system using long short-term memory and fully connected neural network on Kddcup99 and NSL-KDD dataset. Int. J. Intell. Syst. Appl. Eng. 11(9s), 621\u2013635 (2023)","journal-title":"Int. J. Intell. Syst. Appl. Eng."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87766-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:26Z","timestamp":1744603766000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87766-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877650","9783031877667"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87766-7_36","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}