{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:47:30Z","timestamp":1765039650602,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811984440"},{"type":"electronic","value":"9789811984457"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-8445-7_3","type":"book-chapter","created":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T14:10:23Z","timestamp":1669990223000},"page":"34-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building"],"prefix":"10.1007","author":[{"given":"Otuekong","family":"Ekpo","sequence":"first","affiliation":[]},{"given":"Kate","family":"Takyi","sequence":"additional","affiliation":[]},{"given":"Rose-Mary Owusuaa Mensah","family":"Gyening","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,3]]},"reference":[{"key":"3_CR1","unstructured":"Statista. https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/. Accessed 11 Sep 2022"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Kuyucu, M.K., Bahtiyar, serif, Ince, G.: Security and privacy in the smart home: a survey of issues and mitigation strategies. In: 2019 4th International Conference on Computer Science and Engineering (UBMK) (2019). https:\/\/doi.org\/10.1109\/ubmk.2019.8907037","DOI":"10.1109\/ubmk.2019.8907037"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.1177\/1475921717737051","volume":"17","author":"DJ Atha","year":"2017","unstructured":"Atha, D.J., Jahanshahi, M.R.: Evaluation of deep learning approaches based on convolutional neural networks for corrosion detection. Struct. Health Monit. 17, 1110\u20131128 (2017). https:\/\/doi.org\/10.1177\/1475921717737051","journal-title":"Struct. Health Monit."},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Hundman, K., Constantinou, V., Laporte, C., Colwell, I., Soderstrom, T.: Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (2018). https:\/\/doi.org\/10.1145\/3219819.3219845","DOI":"10.1145\/3219819.3219845"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1109\/lra.2017.2714135","volume":"2","author":"F Lopez","year":"2017","unstructured":"Lopez, F., et al.: Categorization of anomalies in smart manufacturing systems to support the selection of detection mechanisms. IEEE Robot. Autom. Lett. 2, 1885\u20131892 (2017). https:\/\/doi.org\/10.1109\/lra.2017.2714135","journal-title":"IEEE Robot. Autom. Lett."},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"2491","DOI":"10.3390\/s18082491","volume":"18","author":"D Ramotsoela","year":"2018","unstructured":"Ramotsoela, D., Abu-Mahfouz, A., Hancke, G.: A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study. Sensors 18, 2491 (2018). https:\/\/doi.org\/10.3390\/s18082491","journal-title":"Sensors"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.ymssp.2018.05.050","volume":"115","author":"R Zhao","year":"2019","unstructured":"Zhao, R., Yan, R., Chen, Z., Mao, K., Wang, P., Gao, R.X.: Deep learning and its applications to machine health monitoring. Mech. Syst. Signal Process. 115, 213\u2013237 (2019). https:\/\/doi.org\/10.1016\/j.ymssp.2018.05.050","journal-title":"Mech. Syst. Signal Process."},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","volume":"22","author":"D Kwon","year":"2017","unstructured":"Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., Kim, K.J.: A survey of deep learning-based network anomaly detection. Clust. Comput. 22(1), 949\u2013961 (2017). https:\/\/doi.org\/10.1007\/s10586-017-1117-8","journal-title":"Clust. Comput."},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Malaiya, R.K., Kwon, D., Kim, J., Suh, S.C., Kim, H., Kim, I.: An empirical evaluation of deep learning for network anomaly detection. In: 2018 International Conference on Computing, Networking and Communications (ICNC) (2018). https:\/\/doi.org\/10.1109\/iccnc.2018.8390278","DOI":"10.1109\/iccnc.2018.8390278"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/access.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018). https:\/\/doi.org\/10.1109\/access.2018.2836950","journal-title":"IEEE Access"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.1109\/tmi.2018.2837002","volume":"37","author":"DK Iakovidis","year":"2018","unstructured":"Iakovidis, D.K., Georgakopoulos, S.V., Vasilakakis, M., Koulaouzidis, A., Plagianakos, V.P.: Detecting and locating gastrointestinal anomalies using deep learning and iterative cluster unification. IEEE Trans. Med. Imaging 37, 2196\u20132210 (2018). https:\/\/doi.org\/10.1109\/tmi.2018.2837002","journal-title":"IEEE Trans. Med. Imaging"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"9393","DOI":"10.1109\/jsen.2018.2870759","volume":"18","author":"S Latif","year":"2018","unstructured":"Latif, S., Usman, M., Rana, R., Qadir, J.: Phonocardiographic sensing using deep learning for abnormal heartbeat detection. IEEE Sens. J. 18, 9393\u20139400 (2018). https:\/\/doi.org\/10.1109\/jsen.2018.2870759","journal-title":"IEEE Sens. J."},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-59050-9_12","volume-title":"Information Processing in Medical Imaging","author":"T Schlegl","year":"2017","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer, M., et al. (eds.) IPMI 2017. LNCS, vol. 10265, pp. 146\u2013157. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/tmi.2019.2919951","volume":"39","author":"P Seebock","year":"2020","unstructured":"Seebock, P., et al.: Exploiting epistemic uncertainty of anatomy segmentation for anomaly detection in retinal OCT. IEEE Trans. Med. Imaging 39, 87\u201398 (2020). https:\/\/doi.org\/10.1109\/tmi.2019.2919951","journal-title":"IEEE Trans. Med. Imaging"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"9428","DOI":"10.1609\/aaai.v33i01.33019428","volume":"33","author":"A Borghesi","year":"2019","unstructured":"Borghesi, A., Bartolini, A., Lombardi, M., Milano, M., Benini, L.: Anomaly detection using autoencoders in high performance computing systems. Proc. AAAI Conf. Artif. Intell. 33, 9428\u20139433 (2019). https:\/\/doi.org\/10.1609\/aaai.v33i01.33019428","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"3_CR16","unstructured":"Sipple, J.: Interpretable, multidimensional, multimodal anomaly detection with negative sampling for detection of device failure. In: International Conference on Machine Learning, pp. 9016\u20139025 (2020)"},{"key":"3_CR17","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbw068","author":"S Min","year":"2016","unstructured":"Min, S., Lee, B., Yoon, S.: Deep learning in bioinformatics. Brief. Bioinform. (2016). https:\/\/doi.org\/10.1093\/bib\/bbw068","journal-title":"Brief. Bioinform."},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Reyes, E., Estevez, P.A.: Transformation based deep anomaly detection in astronomical images. In: 2020 International Joint Conference on Neural Networks (IJCNN) (2020). https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9206997","DOI":"10.1109\/ijcnn48605.2020.9206997"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.jocs.2016.11.016","volume":"20","author":"WD Fisher","year":"2017","unstructured":"Fisher, W.D., Camp, T.K., Krzhizhanovskaya, V.V.: Anomaly detection in earth dam and levee passive seismic data using support vector machines and automatic feature selection. J. Comput. Sci. 20, 143\u2013153 (2017). https:\/\/doi.org\/10.1016\/j.jocs.2016.11.016","journal-title":"J. Comput. Sci."},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"677","DOI":"10.5194\/esd-8-677-2017","volume":"8","author":"M Flach","year":"2017","unstructured":"Flach, M., et al.: Multivariate anomaly detection for earth observations: a comparison of algorithms and feature extraction techniques. Earth Syst. Dyn. 8, 677\u2013696 (2017). https:\/\/doi.org\/10.5194\/esd-8-677-2017","journal-title":"Earth Syst. Dyn."},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"4666","DOI":"10.1109\/tgrs.2020.2965961","volume":"58","author":"T Jiang","year":"2020","unstructured":"Jiang, T., Li, Y., Xie, W., Du, Q.: Discriminative reconstruction constrained generative adversarial network for hyperspectral anomaly detection. IEEE Trans. Geosci. Remote Sens. 58, 4666\u20134679 (2020). https:\/\/doi.org\/10.1109\/tgrs.2020.2965961","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/7892130","volume":"2022","author":"R Malik","year":"2022","unstructured":"Malik, R., Singh, Y., Sheikh, Z.A., Anand, P., Singh, P.K., Workneh, T.C.: An improved deep belief network IDS on IOT-based network for traffic systems. J. Adv. Transp. 2022, 1\u201317 (2022). https:\/\/doi.org\/10.1155\/2022\/7892130","journal-title":"J. Adv. Transp."},{"key":"3_CR23","unstructured":"The TON_IoT datasets. https:\/\/research.unsw.edu.au\/projects\/toniot-datasets. Accessed 11 Sep 2022"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.asoc.2018.06.018","volume":"71","author":"H Khorasgani","year":"2018","unstructured":"Khorasgani, H., Biswas, G.: A methodology for monitoring smart buildings with incomplete models. Appl. Soft Comput. 71, 396\u2013406 (2018). https:\/\/doi.org\/10.1016\/j.asoc.2018.06.018","journal-title":"Appl. Soft Comput."},{"key":"3_CR25","first-page":"13663","volume":"25","author":"T Dhamor","year":"2021","unstructured":"Dhamor, T., Bhat, S., Thenmalar, S.: Dynamic approaches for detection of DDoS threats using machine learning. Ann. Rom. Soc. Cell Biol. 25, 13663\u201313673 (2021)","journal-title":"Ann. Rom. Soc. Cell Biol."},{"key":"3_CR26","unstructured":"DDoS Evaluation Dataset (CIC-DDoS2019). https:\/\/www.unb.ca\/cic\/datasets\/ddos2019.html. Accessed 11 Sep 2022"},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Sumathi, S., Karthikeyan, N.: Search for effective data mining algorithm for network-based intrusion detection (NIDS)-DDOS attacks. In: 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW) (2018). https:\/\/doi.org\/10.1109\/i2c2sw45816.2018.8997522","DOI":"10.1109\/i2c2sw45816.2018.8997522"},{"key":"3_CR28","unstructured":"KDD cup 1999 data, the UCI KDD archive information and computer science University of California. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed 11 Sep 2022"},{"key":"3_CR29","unstructured":"DARP dataset. https:\/\/www.data.world\/datasets\/darp. Accessed 11 Sep 2022"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Ajeetha, G., Madhu Priya, G.: Machine learning based DDOS attack detection. In: 2019 Innovations in Power and Advanced Computing Technologies (i-PACT) (2019).https:\/\/doi.org\/10.1109\/i-pact44901.2019.8959961","DOI":"10.1109\/i-pact44901.2019.8959961"},{"key":"3_CR31","unstructured":"Internet Assigned Numbers Authority: Service name and transport protocol port number registry. https:\/\/www.iana.org\/assignments\/service-names-port-numbers\/service-namesport-numbers.xhtml. Accessed 11 Sep 2022"},{"key":"3_CR32","doi-asserted-by":"publisher","unstructured":"Wehbi, K., Hong, L., Al-salah, T., Bhutta, A.A.: A survey on machine learning based detection on DDoS attacks for IOT systems. In: 2019 SoutheastCon (2019). https:\/\/doi.org\/10.1109\/southeastcon42311.2019.9020468","DOI":"10.1109\/southeastcon42311.2019.9020468"},{"key":"3_CR33","doi-asserted-by":"publisher","first-page":"4372","DOI":"10.3390\/s20164372","volume":"20","author":"YN Soe","year":"2020","unstructured":"Soe, Y.N., Feng, Y., Santosa, P.I., Hartanto, R., Sakurai, K.: Machine learning-based IOT-botnet attack detection with sequential architecture. Sensors 20, 4372 (2020). https:\/\/doi.org\/10.3390\/s20164372","journal-title":"Sensors"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"UCI Machine Learning Repository: Detection_of_IoT_botnet_attacks_N_BaIoT data set. https:\/\/archive.ics.uci.edu\/ml\/datasets\/detection_of_IoT_botnet_attacks_N_BaIoT. Accessed 11 Sep 2022","DOI":"10.18178\/ijmlc.2021.11.6.1068"},{"key":"3_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: network ToN_IoT datasets. Sustain. Cities Soc. 72, 102994 (2021). https:\/\/doi.org\/10.1016\/j.scs.2021.102994","journal-title":"Sustain. Cities Soc."},{"key":"3_CR36","unstructured":"Moustafa, N.: New generations of internet of things datasets for cybersecurity applications-based machine learning: ToN_IoT datasets. In: Proceedings of the eResearch Australasia Conference, Brisbane, Australia, pp. 21\u201325 (2019)"},{"key":"3_CR37","series-title":"Advanced Studies in Theoretical and Applied Econometrics","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-030-31150-6_13","volume-title":"Macroeconomic Forecasting in the Era of Big Data","author":"T-H Lee","year":"2020","unstructured":"Lee, T.-H., Ullah, A., Wang, R.: Bootstrap aggregating and random forest. In: Fuleky, P. (ed.) Macroeconomic Forecasting in the Era of Big Data. ASTAE, vol. 52, pp. 389\u2013429. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-31150-6_13"},{"key":"3_CR38","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems 30 (2017)"},{"key":"3_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101984","volume":"97","author":"D Jin","year":"2020","unstructured":"Jin, D., Lu, Y., Qin, J., Cheng, Z., Mao, Z.: SwiftIDS: Real-time intrusion detection system based on LIGHTGBM and parallel intrusion detection mechanism. Comput. Secur. 97, 101984 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101984","journal-title":"Comput. Secur."},{"key":"3_CR40","doi-asserted-by":"publisher","unstructured":"Xiaosong, Z.H.A.O., Qiangfu, Z.H.A.O.: Stock prediction using optimized LIGHTGBM based on cost awareness. In: 2021 5th IEEE International Conference on Cybernetics (CYBCONF) (2021). https:\/\/doi.org\/10.1109\/cybconf51991.2021.9464148","DOI":"10.1109\/cybconf51991.2021.9464148"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-8445-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T14:13:16Z","timestamp":1669990396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-8445-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811984440","9789811984457"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-8445-7_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kumasi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghana","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fcs.knust.edu.gh\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}