{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:02:33Z","timestamp":1769922153511,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032027276","type":"print"},{"value":"9783032027283","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02728-3_31","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:09:13Z","timestamp":1759277353000},"page":"392-401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Dimensionality Reduction and\u00a0Outlier Analysis for\u00a0the\u00a0NF-ToN-IoT Cybersecurity Dataset"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1614-9075","authenticated-orcid":false,"given":"\u00c1ngel","family":"Arroyo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9046-7397","authenticated-orcid":false,"given":"Diego","family":"Granados","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9607-110X","authenticated-orcid":false,"given":"F\u00e9lix","family":"De Miguel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2988-757X","authenticated-orcid":false,"given":"Nuria","family":"Velasco","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2444-5384","authenticated-orcid":false,"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,1]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102588","volume":"114","author":"R Ahmad","year":"2022","unstructured":"Ahmad, R., Alsmadi, I., Alhamdani, W., Tawalbeh, L.: A comprehensive deep learning benchmark for iot ids. Comput. Secur. 114, 102588 (2022)","journal-title":"Comput. Secur."},{"key":"31_CR2","unstructured":"Farhat, S., et al.: Netflow version of unsw-ton-iot by the university of queensland (2023). https:\/\/www.kaggle.com\/datasets\/dhoogla\/nftoniot"},{"key":"31_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100631","volume":"52","author":"B Bala","year":"2024","unstructured":"Bala, B., Behal, S.: Ai techniques for iot-based ddos attack detection: taxonomies, comprehensive review and research challenges. Comput. Sci. Rev. 52, 100631 (2024)","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"31_CR4","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","volume":"9","author":"TM Booij","year":"2021","unstructured":"Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., Den Hartog, F.T.: Ton_iot: the role of heterogeneity and the need for standardization of features and attack types in iot network intrusion data sets. IEEE Internet Things J. 9(1), 485\u2013496 (2021)","journal-title":"IEEE Internet Things J."},{"key":"31_CR5","volume-title":"Principal Component Neural Networks: Theory and Applications","author":"KI Diamantaras","year":"1996","unstructured":"Diamantaras, K.I., Kung, S.Y.: Principal Component Neural Networks: Theory and Applications. John Wiley & Sons, Inc., Hoboken (1996)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Greenacre, M., Groenen, P.J., Hastie, T., d\u2019Enza, A.I., Markos, A., Tuzhilina, E.: Principal component analysis. Nat. Rev. Methods Primers 2(1), 100 (2022)","DOI":"10.1038\/s43586-022-00184-w"},{"key":"31_CR7","doi-asserted-by":"publisher","unstructured":"Karie, N.M., Sahri, N.M., Haskell-Dowland, P.: Iot threat detection advances, challenges and future directions. In: 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), pp. 22\u201329 (2020). https:\/\/doi.org\/10.1109\/ETSecIoT50046.2020.00009","DOI":"10.1109\/ETSecIoT50046.2020.00009"},{"key":"31_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127017","volume":"565","author":"C Li","year":"2024","unstructured":"Li, C., Wang, J., Wang, S., Zhang, Y.: A review of iot applications in healthcare. Neurocomputing 565, 127017 (2024)","journal-title":"Neurocomputing"},{"key":"31_CR9","unstructured":"Van\u00a0der Maaten, L., Hinton, G.: Visualizing data using t-sne. J. Mach. Learn. Res. 9(11) (2008)"},{"issue":"5","key":"31_CR10","doi-asserted-by":"publisher","first-page":"164","DOI":"10.4236\/jcc.2015.35021","volume":"3","author":"S Madakam","year":"2015","unstructured":"Madakam, S., Ramaswamy, R., Tripathi, S.: Internet of things (iot): a literature review. J. Comput. Commun. 3(5), 164\u2013173 (2015)","journal-title":"J. Comput. Commun."},{"issue":"13","key":"31_CR11","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: Ciciot 2023: a real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13), 5941 (2023)","journal-title":"Sensors"},{"key":"31_CR12","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-72802-1_9","volume-title":"Big Data Technologies and Applications","author":"M Sarhan","year":"2021","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: NetFlow datasets for machine learning-based network intrusion detection systems. In: Deze, Z., Huang, H., Hou, R., Rho, S., Chilamkurti, N. (eds.) BDTA\/WiCON -2020. LNICST, vol. 371, pp. 117\u2013135. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72802-1_9"},{"key":"31_CR13","unstructured":"Seo, S.: A review and comparison of methods for detecting outliers in univariate data sets. Ph.D. thesis, University of Pittsburgh (2006)"},{"issue":"3","key":"31_CR14","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1080\/00401706.1972.10488948","volume":"14","author":"GL Tietjen","year":"1972","unstructured":"Tietjen, G.L., Moore, R.H.: Some grubbs-type statistics for the detection of several outliers. Technometrics 14(3), 583\u2013597 (1972)","journal-title":"Technometrics"},{"issue":"66\u201371","key":"31_CR15","first-page":"13","volume":"10","author":"L Van Der Maaten","year":"2009","unstructured":"Van Der Maaten, L., Postma, E.O., Van Den Herik, H.J., et al.: Dimensionality reduction: a comparative review. J. Mach. Learn. Res. 10(66\u201371), 13 (2009)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"31_CR16","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/s10618-014-0356-z","volume":"29","author":"F Wang","year":"2015","unstructured":"Wang, F., Sun, J.: Survey on distance metric learning and dimensionality reduction in data mining. Data Min. Knowl. Disc. 29(2), 534\u2013564 (2015)","journal-title":"Data Min. Knowl. Disc."},{"issue":"10","key":"31_CR17","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00002","volume":"1","author":"M Wattenberg","year":"2016","unstructured":"Wattenberg, M., Vi\u00e9gas, F., Johnson, I.: How to use t-sne effectively. Distill 1(10), e2 (2016)","journal-title":"Distill"}],"container-title":["Lecture Notes in Computer Science","Advances in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02728-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:09:17Z","timestamp":1759277357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02728-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,1]]},"ISBN":["9783032027276","9783032027283"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02728-3_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,1]]},"assertion":[{"value":"1 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Work-Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"A Coru\u00f1a","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwann2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iwann.uma.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}