{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T23:03:24Z","timestamp":1775430204697,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032057471","type":"print"},{"value":"9783032057488","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05748-8_10","type":"book-chapter","created":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T22:23:09Z","timestamp":1775427789000},"page":"119-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Methodology for the Automatic Categorisation and Classification of Threats and Attacks in IoT Ecosystems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2994-8628","authenticated-orcid":false,"given":"Laura","family":"Grande-P\u00e9rez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2058-6219","authenticated-orcid":false,"given":"Jes\u00fas-\u00c1ngel","family":"Rom\u00e1n-Gallego","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7628-7632","authenticated-orcid":false,"given":"Pablo Plaza","family":"Mart\u00ednez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7316-6026","authenticated-orcid":false,"given":"Manuel L\u00f3pez","family":"P\u00e9rez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0763-6434","authenticated-orcid":false,"given":"Albano","family":"Carrera","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"70528","DOI":"10.1109\/ACCESS.2018.2879615","volume":"6","author":"MO Ojo","year":"2018","unstructured":"Ojo MO, Giordano S, Procissi G, Seitanidis IN (2018) A review of low-end, middle-end, and high-end IoT devices. IEEE Access 6:70528\u201370554. https:\/\/doi.org\/10.1109\/ACCESS.2018.2879615","journal-title":"IEEE Access"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Haroon A, Shah MA, Asim Y, Naeem W, Kamran M, Javaid Q (2016) Constraints in the IoT: the world in 2020 and beyond. Int J Adv Comput Sci Appl, 7(11). https:\/\/doi.org\/10.14569\/IJACSA.2016.071133","DOI":"10.14569\/IJACSA.2016.071133"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Cartuche-Calva JJ, Hern\u00e1ndez-Rojas DL, Morocho-Rom\u00e1n RF, Radicelli-Garc\u00eda CD (2020) Seguridad IoT: Principales amenazas en una taxonom\u00eda de activos. Hamut\u2019ay, 7(1), 51\u201359. https:\/\/doi.org\/10.21503\/hamu.v7i3.2192","DOI":"10.21503\/hamu.v7i3.2192"},{"key":"10_CR4","unstructured":"Domingo Grau A, Corredor Isla AI, Gonz\u00e1lez Almela AJ, Bellido Diego-Madrazo RA, Marzo Lostal\u00e9 EM, Navarro Bernal R (2025) Seguridad en dispositivos m\u00e9dicos conectados: an\u00e1lisis de vulnerabilidades y estrategias de mitigaci\u00f3n. Ocronos, 8(2), 826\u2212839"},{"key":"10_CR5","unstructured":"Roch Moraguez E (2023) Ciberseguridad en dispositivos m\u00e9dicos: riesgos cr\u00edticos y soluciones efectivas. LovTechnology, 6(1), 53\u221267"},{"key":"10_CR6","unstructured":"Khan MZ, Bokhari MU (2023) Comparative study of detection of IoT Attacks using Machine Learning Techniques. In: 2023 10th international conference on computing for sustainable global development (INDIACom) proceedings, pp. 1648\u20131651, IEEE, New Delhi, India"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Munshi A, Alqarni NA, Abdullah Almalki N (2020) DDOS Attack on IOT Devices. In: 2020 3rd international conference on computer applications & information security (ICCAIS) proceedings, pp. 1\u20135, IEEE, Riyadh, Saudi Arabia. https:\/\/doi.org\/10.1109\/ICCAIS48893.2020.9096818","DOI":"10.1109\/ICCAIS48893.2020.9096818"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Luengo Vi\u00f1uela M, Rom\u00e1n Gallego JA (2024) Systematic literature review of machine learning models for detecting DDoS attacks in IoT networks. ADCAIJ: Adv Distrib Comput Artif Intell J, 13(1), e31919. https:\/\/doi.org\/10.14201\/adcaij.31919","DOI":"10.14201\/adcaij.31919"},{"issue":"1","key":"10_CR9","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13505","volume":"42","author":"JA Rom\u00e1n-Gallego","year":"2025","unstructured":"Rom\u00e1n-Gallego JA, P\u00e9rez-Delgado ML, Vi\u00f1uela ML, Vega-Hern\u00e1ndez MC (2025) Artificial intelligence web application firewall for advanced detection of web injection attacks. Expert Syst 42(1):e13505. https:\/\/doi.org\/10.1111\/exsy.13505","journal-title":"Expert Syst"},{"key":"10_CR10","unstructured":"Tenorio Ordo\u00f1ez IJ (2021) Aplicaciones de la inteligencia artificial en la detecci\u00f3n y prevenci\u00f3n de amenazas cibern\u00e9ticas. Technol Rain J, 1(1), 13\u221222"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Figueroa-Donayre EM, Guill\u00e9n-Guevara ML, Humpiri-Flores R, Cabel-Moscoso DJ, Sullon-Macalupu AA, Humpiri-Flores ME (2023) Machine learning en la industria 4.0: An\u00e1lisis de su relevancia y aplicaciones. \u00d1AWPARISUN\u2014Revista de Investigaci\u00f3n Cient\u00edfica de Ingenier\u00edas, 4(3), 93\u201398 (2023). https:\/\/doi.org\/10.47190\/nric.v4i3.272.","DOI":"10.47190\/nric.v4i3.272"},{"key":"10_CR12","first-page":"275","volume-title":"World conference on smart trends in systems, security and sustainability (WS4 2024), intelligent sustainable systems","author":"JET Akinsola","year":"2025","unstructured":"Akinsola JET, Efiong JE, Abdulazeez AO, Lawal AO, Olajubu EA, Aderounmu GA (2025) Network Monitoring System for Sniffing Attack Prevention in Wireless Communication Networks Using Secure Socket. In: Nagar A, Dharm SJ, Mishra D, Joshi A (eds) World conference on smart trends in systems, security and sustainability (WS4 2024), intelligent sustainable systems, vol 1179. Springer, Heidelberg, pp 275\u2013287"},{"issue":"4","key":"10_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-025-11108-x","volume":"58","author":"E Edozie","year":"2025","unstructured":"Edozie E, Shuaibu AN, Sadiq BO, John UK (2025) Artificial intelligence advances in anomaly detection for telecom networks. Artif Intell Rev 58(4):1\u201340. https:\/\/doi.org\/10.1007\/s10462-025-11108-x","journal-title":"Artif Intell Rev"},{"issue":"9","key":"10_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5120\/ijca2018917667","volume":"182","author":"HB Said","year":"2018","unstructured":"Said HB, Khaleel TA (2018) An improved strategy for detection and prevention IP spoofing attack. Int J Comput Appl 182(9):28\u201331. https:\/\/doi.org\/10.5120\/ijca2018917667","journal-title":"Int J Comput Appl"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Liu X, Huang Y, Wang T, Li S, Niu W, Shen J, Zhou Q, Zhou X (2024) SQLStateGuard: Statement-Level SQL injection defense based on learning-driven middleware. In: Proceedings of the 2024 ACM symposium on cloud computing (SoCC \u201924), pp. 69\u201382, The ACM Digital Library, New York, USA. https:\/\/doi.org\/10.1145\/3698038.3698569","DOI":"10.1145\/3698038.3698569"},{"issue":"4","key":"10_CR16","first-page":"l881","volume":"12","author":"S Nagendrudu","year":"2023","unstructured":"Nagendrudu S, Moen SJ, Kumar Reddy KR, Yugandhar Reddy AV, Basha MY (2023) Privilege escalation attack detection and mitigation in cloud using machine learning. Int J Creat Res Thoughts 12(4):l881\u2013l894","journal-title":"Int J Creat Res Thoughts"},{"issue":"17","key":"10_CR17","doi-asserted-by":"publisher","first-page":"3674","DOI":"10.3390\/electronics12173674","volume":"12","author":"M Peng","year":"2023","unstructured":"Peng M, Wei Q, Ma R, Geng Y, Yang Y, Zhang S, Zhang Y (2023) Unauthorized access detection for network device firmware web pages. Electronics 12(17):3674. https:\/\/doi.org\/10.3390\/electronics12173674","journal-title":"Electronics"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Chen X, Li M, Jiang Y, Sun Y (2019) A comparison of machine learning algorithms for detecting XSS Attacks. In: Sun X, Pan Z, Bertino E (eds.) In: 5th international conference on artificial intelligence and security (ICAIS 2019) proceedings, lecture notes in computer science, 11635, pp 214\u2013224. Springer, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-030-24268-8_20","DOI":"10.1007\/978-3-030-24268-8_20"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/s10462-024-11055-z","volume":"58","author":"S Kavya","year":"2024","unstructured":"Kavya S, Sumathi D (2024) Staying ahead of phishers: a review of recent advances and emerging methodologies in phishing detection. Artif Intell Rev 58:50. https:\/\/doi.org\/10.1007\/s10462-024-11055-z","journal-title":"Artif Intell Rev"},{"issue":"19","key":"10_CR20","doi-asserted-by":"publisher","first-page":"6179","DOI":"10.3390\/s24196179","volume":"24","author":"D Han","year":"2024","unstructured":"Han D, Li H, Fu X (2024) Reflective distributed denial of service detection: a novel model utilizing binary particle swarm optimization\u2014simulated annealing for feature selection and gray wolf optimization-optimized LightGBM algorithm. Sensors 24(19):6179. https:\/\/doi.org\/10.3390\/s24196179","journal-title":"Sensors"}],"container-title":["Lecture Notes in Networks and Systems","Distributed Computing and Artificial Intelligence, Special Sessions II, 22nd International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05748-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T22:23:11Z","timestamp":1775427791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05748-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032057471","9783032057488"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05748-8_10","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lille","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}