{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T23:25:49Z","timestamp":1770420349850,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811668890","type":"print"},{"value":"9789811668906","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_35","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"473-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An Opportunistic Ensemble Learning Framework for Network Traffic Classification in IoT Environments"],"prefix":"10.1007","author":[{"given":"Sujit","family":"Bebortta","sequence":"first","affiliation":[]},{"given":"Sumanta Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Salman O, Elhajj IH, Chehab A, Kayssi A (2019) A machine learning based framework for IoT device identification and abnormal traffic detection. Transactions on emerging telecommunications technologies, e3743","DOI":"10.1002\/ett.3743"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Panda S, Panda G (2020) Intelligent classification of IoT traffic in healthcare using machine learning techniques. In: 2020 6th international conference on control, automation and robotics (ICCAR). IEEE, pp 581\u2013585","DOI":"10.1109\/ICCAR49639.2020.9107979"},{"key":"35_CR3","unstructured":"Singh SK, Mishra AK, Rain fall prediction using bigdata analytics"},{"issue":"5","key":"35_CR4","doi-asserted-by":"publisher","first-page":"7515","DOI":"10.1109\/JIOT.2019.2901348","volume":"6","author":"H Yao","year":"2019","unstructured":"Yao H, Gao P, Wang J, Zhang P, Jiang C, Han Z (2019) Capsule network assisted IoT traffic classification mechanism for smart cities. IEEE Int Things J 6(5):7515\u20137525","journal-title":"IEEE Int Things J"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Tahaei H, Afifi F, Asemi A, Zaki F, Anuar NB (2020) The rise of traffic classification in IoT networks: A survey. J Network Comput Appl 154:102538","DOI":"10.1016\/j.jnca.2020.102538"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Bebortta S, Singh AK, Mohanty S, Senapati D (2020) Characterization of range for smart home sensors using Tsallis\u2019 entropy framework. In: Advanced computing and intelligent engineering. Springer, Singapore, pp 265\u2013276","DOI":"10.1007\/978-981-15-1483-8_23"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Bebortta S, Panda M, Panda S (2020) Classification of pathological disorders in children using random forest algorithm. In: 2020 international conference on emerging trends in information technology and engineering (ic-ETITE). IEEE, pp 1\u20136","DOI":"10.1109\/ic-ETITE47903.2020.253"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Bebortta S, Senapati D, Rajput NK, Singh AK, Rathi VK, Pandey HM, ... Tiwari P (2020) Evidence of power-law behavior in cognitive IoT applications. Neural Comput Appl 1\u201313","DOI":"10.1007\/s00521-020-04705-0"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Kumar A, Lim TJ (2019) EDIMA: early detection of IoT malware network activity using machine learning techniques. In: 2019 IEEE 5th world forum on internet of things (WF-IoT). IEEE, pp 289\u2013294","DOI":"10.1109\/WF-IoT.2019.8767194"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Glennan T, Leckie C, Erfani SM (2016) Improved classification of known and unknown network traffic flows using semi-supervised machine learning. In: Australasian conference on information security and privacy. Springer, Cham, pp 493\u2013501","DOI":"10.1007\/978-3-319-40367-0_33"},{"issue":"3","key":"35_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.4018\/IJCINI.2014070104","volume":"8","author":"MS Khan","year":"2014","unstructured":"Khan MS, Ferens K, Kinsner W (2014) A chaotic complexity measure for cognitive machine classification of cyber-attacks on computer networks. Int J Cogn Inf Natural Intell (IJCINI) 8(3):45\u201369","journal-title":"Int J Cogn Inf Natural Intell (IJCINI)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Perera P, Tian YC, Fidge C, Kelly W (2017) A comparison of supervised machine learning algorithms for classification of communications network traffic. In: International conference on neural information processing. Springer, Cham, pp 445\u2013454","DOI":"10.1007\/978-3-319-70087-8_47"},{"issue":"2","key":"35_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJESMA.2019040101","volume":"11","author":"K Sharma","year":"2019","unstructured":"Sharma K, Gupta BB (2019) Towards privacy risk analysis in Android applications using machine learning approaches. Int J E-Services Mobile Appl (IJESMA) 11(2):1\u201321","journal-title":"Int J E-Services Mobile Appl (IJESMA)"},{"key":"35_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79\u201389","journal-title":"Appl Soft Comput"},{"key":"35_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jpdc.2018.03.006","volume":"119","author":"R Kozik","year":"2018","unstructured":"Kozik R, Chora\u015b M, Ficco M, Palmieri F (2018) A scalable distributed machine learning approach for attack detection in edge computing environments. J Parallel Distr Comput 119:18\u201326","journal-title":"J Parallel Distr Comput"},{"key":"35_CR16","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2018.11.002","volume":"126","author":"H Lin","year":"2019","unstructured":"Lin H, Yan Z, Fu Y (2019) Adaptive security-related data collection with context awareness. J Network Comput Appl 126:88\u2013103","journal-title":"J Network Comput Appl"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Hastie T, Tibshirani R, Friedman J (2009) The elements of statistical learning: data mining, inference, and prediction. Springer Science & Business Media, Berlin","DOI":"10.1007\/978-0-387-84858-7"},{"key":"35_CR18","doi-asserted-by":"publisher","DOI":"10.1201\/b12207","volume-title":"Ensemble methods: foundations and algorithms","author":"ZH Zhou","year":"2012","unstructured":"Zhou ZH (2012) Ensemble methods: foundations and algorithms. CRC Press, Boca Raton"},{"key":"35_CR19","unstructured":"Rish I (2001) An empirical study of the naive Bayes classifier. In: IJCAI 2001 workshop on empirical methods in artificial intelligence, vol 3, No 22, pp 41\u201346"},{"issue":"3","key":"35_CR20","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"6","author":"N Moustafa","year":"2018","unstructured":"Moustafa N, Turnbull B, Choo KKR (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Int Things J 6(3):4815\u20134830","journal-title":"IEEE Int Things J"},{"issue":"1","key":"35_CR21","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/s40537-019-0176-5","volume":"6","author":"AI Adekitan","year":"2019","unstructured":"Adekitan AI, Abolade J, Shobayo O (2019) Data mining approach for predicting the daily Internet data traffic of a smart university. J Big Data 6(1):11","journal-title":"J Big Data"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Rahmat S, Niyaz Q, Mathur A, Sun W, Javaid AY (2019) Network traffic-based hybrid malware detection for smartphone and traditional networked systems. In: 2019 IEEE 10th annual ubiquitous computing, electronics & mobile communication conference (UEMCON). IEEE, pp 0322\u20130328","DOI":"10.1109\/UEMCON47517.2019.8992934"},{"key":"35_CR23","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.cose.2018.10.007","volume":"80","author":"M Gratian","year":"2019","unstructured":"Gratian M, Bhansali D, Cukier M, Dykstra J (2019) Identifying infected users via network traffic. Comput Secur 80:306\u2013316","journal-title":"Comput Secur"},{"issue":"3","key":"35_CR24","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1080\/23742917.2019.1623475","volume":"3","author":"SR Khonde","year":"2019","unstructured":"Khonde SR, Ulagamuthalvi V (2019) Ensemble-based semi-supervised learning approach for a distributed intrusion detection system. J Cyber Secur Technol 3(3):163\u2013188","journal-title":"J Cyber Secur Technol"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:06:54Z","timestamp":1646489214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}