{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T11:10:30Z","timestamp":1776251430393,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T00:00:00Z","timestamp":1637366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T00:00:00Z","timestamp":1637366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10207-021-00571-6","type":"journal-article","created":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T17:10:23Z","timestamp":1637428223000},"page":"611-636","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Anomalous behavior detection-based approach for authenticating smart home system users"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5873-1899","authenticated-orcid":false,"given":"Noureddine","family":"Amraoui","sequence":"first","affiliation":[]},{"given":"Belhassen","family":"Zouari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,20]]},"reference":[{"key":"571_CR1","doi-asserted-by":"crossref","unstructured":"Guth, J., Breitenb\u00fccher, U., Falkenthal, M., Fremantle, P., Kopp, O., Leymann, F., Reinfurt, L.: A detailed analysis of IoT platform architectures: concepts, similarities, and differences. In: Internet of everything (Springer, 2018), pp. 81\u2013101","DOI":"10.1007\/978-981-10-5861-5_4"},{"key":"571_CR2","unstructured":"Fernandes, E., Rahmati, A., Feamster, N.: New Problems and Solutions in IoT Security and Privacy. arXiv preprint arXiv:1910.03686 (2019)"},{"key":"571_CR3","unstructured":"Miessler, D.: Securing the internet of things: Mapping attack surface areas using the OWASP IoT top 10. In: RSA Conference (2015)"},{"key":"571_CR4","doi-asserted-by":"crossref","unstructured":"Gamundani, A.M., Phillips, A., Muyingi, H.N.: An Overview of Potential Authentication Threats and Attacks on Internet of Things (IoT): A Focus on Smart Home Applications. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (IEEE, 2018), pp. 50\u201357","DOI":"10.1109\/Cybermatics_2018.2018.00043"},{"issue":"6","key":"571_CR5","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1109\/JIOT.2017.2707465","volume":"4","author":"Z Ling","year":"2017","unstructured":"Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., Fu, X.: Security vulnerabilities of internet of things: a case study of the smart plug system. IEEE Internet Things J. 4(6), 1899 (2017)","journal-title":"IEEE Internet Things J."},{"key":"571_CR6","doi-asserted-by":"crossref","unstructured":"Martin, V., Cao, Q., Benson, T.: Fending off IoT-hunting attacks at home networks. In: Proceedings of the 2nd Workshop on Cloud-Assisted Networking (2017), pp. 67\u201372","DOI":"10.1145\/3155921.3160640"},{"key":"571_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Computer Appl. 84, 25 (2017)","journal-title":"J. Netw. Computer Appl."},{"issue":"9","key":"571_CR8","doi-asserted-by":"publisher","first-page":"9128","DOI":"10.1109\/JIOT.2020.3004077","volume":"7","author":"Y Liang","year":"2020","unstructured":"Liang, Y., Samtani, S., Guo, B., Yu, Z.: Behavioral biometrics for continuous authentication in the Internet-of-Things Era: an artificial intelligence perspective. IEEE Internet Things J. 7(9), 9128 (2020)","journal-title":"IEEE Internet Things J."},{"key":"571_CR9","doi-asserted-by":"publisher","first-page":"112505","DOI":"10.1109\/ACCESS.2019.2932400","volume":"7","author":"SW Shah","year":"2019","unstructured":"Shah, S.W., Kanhere, S.S.: Recent trends in user authentication-a survey. IEEE Access 7, 112505 (2019)","journal-title":"IEEE Access"},{"key":"571_CR10","doi-asserted-by":"crossref","unstructured":"Dutta, S., Chukkapalli, S.S.L., Sulgekar, M., Krithivasan, S., Das, P.K., Joshi, A., et\u00a0al. Context Sensitive Access Control in Smart Home Environments. In: 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020) (2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00018"},{"key":"571_CR11","unstructured":"Omolola, O., More, S., Fasllija, E., Wagner, G., Alber, L.: Policy-based access control for the IoT and Smart Cities. Open Identity Summit 2019,(2019)"},{"key":"571_CR12","doi-asserted-by":"crossref","unstructured":"Singh, M.P., Sural, S., Atluri, V., Vaidya, J.: Security Analysis of Unified Access Control Policies. In: International Conference On Secure Knowledge Management In Artificial Intelligence Era (Springer, 2019), pp. 126\u2013146","DOI":"10.1007\/978-981-15-3817-9_8"},{"issue":"2","key":"571_CR13","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/TCE.2020.2981636","volume":"66","author":"M Yamauchi","year":"2020","unstructured":"Yamauchi, M., Ohsita, Y., Murata, M., Ueda, K., Kato, Y.: Anomaly detection in smart home operation from user behaviors and home conditions. IEEE Transactions Consumer Electron. 66(2), 183 (2020)","journal-title":"IEEE Transactions Consumer Electron."},{"issue":"1","key":"571_CR14","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2780232","volume":"5","author":"M Wazid","year":"2017","unstructured":"Wazid, M., Das, A.K., Odelu, V., Kumar, N., Conti, M., Jo, M.: Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J. 5(1), 269 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"571_CR15","doi-asserted-by":"publisher","first-page":"10773","DOI":"10.1109\/JIOT.2019.2941767","volume":"6","author":"N Ghosh","year":"2019","unstructured":"Ghosh, N., Chandra, S., Sachidananda, V., Elovici, Y.: SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT. IEEE Internet Things J. 6(6), 10773 (2019)","journal-title":"IEEE Internet Things J."},{"key":"571_CR16","unstructured":"McCarthy, J., Powell, M., Stouffer, K., Tang, C.Y., Zimmerman, T., Barker, W., Ogunyale, T., Wynne, D., Wiltberger, J.: Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection. National Institute of Standards and Technology (NIST), Gaithersburg (2018)"},{"key":"571_CR17","doi-asserted-by":"crossref","unstructured":"Amraoui, N., Besrour, A., Ksantini, R., Zouari, B.: Implicit and continuous authentication of smart home users. In: International Conference on Advanced Information Networking and Applications (Springer, 2019), pp. 1228\u20131239","DOI":"10.1007\/978-3-030-15032-7_103"},{"key":"571_CR18","doi-asserted-by":"crossref","unstructured":"Rath, A.T., Colin, J.N.: Strengthening access control in case of compromised accounts in smart home. In: 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (IEEE, 2017), pp. 1\u20138","DOI":"10.1109\/WiMOB.2017.8115827"},{"key":"571_CR19","unstructured":"Brian, B.: Sustainability hacks: automatic window control. Sustainability hacks: automatic window control. https:\/\/hackaday.com\/2011\/09\/29\/sustainability-hacks-automatic-window-control\/ (2011). [Online; accessed 15-April-2021]"},{"key":"571_CR20","unstructured":"Wang, C., Yang, B.: Composite behavioral modeling for identity theft detection in online social networks. arXiv preprint arXiv:1801.06825 (2018)"},{"issue":"9","key":"571_CR21","doi-asserted-by":"publisher","first-page":"7903","DOI":"10.1109\/JIOT.2020.3003621","volume":"7","author":"Y Xiao","year":"2020","unstructured":"Xiao, Y., Jia, Y., Liu, C., Alrawais, A., Rekik, M., Shan, Z.: HomeShield: a credential-less authentication framework for smart home systems. IEEE Internet Things J. 7(9), 7903 (2020)","journal-title":"IEEE Internet Things J."},{"key":"571_CR22","unstructured":"Zhang, Z., Guan, Y., Ma, X., Yu, T., Zhang, L.: Sovereign: User-Controlled Smart Homes. arXiv preprint arXiv:2006.06131 (2020)"},{"key":"571_CR23","unstructured":"Samsung. Smartthings, one simple home system. w world of possibilities. https:\/\/www.smartthings.com\/ (2021). [Online; accessed 15-April-2021]"},{"key":"571_CR24","doi-asserted-by":"crossref","unstructured":"Sikder, A.K., Babun, L., Aksu, H., Uluagac, A.S.: Aegis: a context-aware security framework for smart home systems. In: Proceedings of the 35th Annual Computer Security Applications Conference (2019), pp. 28\u201341","DOI":"10.1145\/3359789.3359840"},{"issue":"7","key":"571_CR25","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MC.2018.3011051","volume":"51","author":"R Rom\u00e1n-Castro","year":"2018","unstructured":"Rom\u00e1n-Castro, R., L\u00f3pez, J., Gritzalis, S.: Evolution and trends in iot security. Computer 51(7), 16 (2018)","journal-title":"Computer"},{"key":"571_CR26","unstructured":"Megan, W.: Have a smart lock? Yeah, it can probably be hacked. https:\/\/www.cnet.com\/news\/have-a-smart-lock-yeah-it-can-probably-be-hacked\/ (2016). [Online; accessed 15-April-2021]"},{"key":"571_CR27","unstructured":"Jaikumar, V.: Target attack shows danger of remotely accessible HVAC systems. https:\/\/www.computerworld.com\/article\/2487452\/target-attack-shows-danger-of-remotely-accessible-hvac-systems.html (2014). [Online; accessed 15-April-2021]"},{"key":"571_CR28","unstructured":"Jack, L.: Half baked IoT stove could be used as a remote controlled arson device. https:\/\/hackaday.com\/2017\/04\/20\/half-baked-iot-stove-could-be-used-as-a-remote-controlled-arson-device\/ (2017). [Online; accessed 15-April-2021]"},{"key":"571_CR29","unstructured":"Darlene, S.: Researchers hack Philips Hue lights via a drone; IoT worm could cause city blackout. https:\/\/www.computerworld.com\/article\/3139860\/researchers-hack-philips-hue-lights-via-a-drone-iot-worm-could-cause-city-blackout.html (2016). [Online; accessed 15-April-2021]"},{"key":"571_CR30","unstructured":"Brad, R.: The ultimate nightmare: Researchers learn how to hack connected \u2018smart home\u2019 toilets. https:\/\/bgr.com\/2014\/06\/12\/smart-home-toilets-hacked\/ (2014). [Online; accessed 15-April-2021]"},{"key":"571_CR31","doi-asserted-by":"crossref","unstructured":"Dmitry, D., Elena, P., Anna, C., Tatiana, Z., Elena, P.: Approaches to Anomaly Detection in Web Application Intrusion Detection Systems. In: 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT) (IEEE, 2020), pp. 532\u2013535","DOI":"10.1109\/USBEREIT48449.2020.9117745"},{"issue":"17","key":"571_CR32","doi-asserted-by":"publisher","first-page":"3111","DOI":"10.1002\/sec.1236","volume":"8","author":"Q Liao","year":"2015","unstructured":"Liao, Q., Li, H., Kang, S., Liu, C.: Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching. Secur. Commun. Netw. 8(17), 3111 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"571_CR33","doi-asserted-by":"crossref","unstructured":"Najafabadi, M.M., Khoshgoftaar, T.M., Calvert, C., Kemp, C.: User behavior anomaly detection for application layer DDoS attacks. In: 2017 IEEE International Conference on Information Reuse and Integration (IRI) (IEEE, 2017), pp. 154\u2013161","DOI":"10.1109\/IRI.2017.44"},{"key":"571_CR34","doi-asserted-by":"crossref","unstructured":"S.\u00a0Mathew, M.\u00a0Petropoulos, H.Q. Ngo, S.\u00a0Upadhyaya. A data-centric approach to insider attack detection in database systems. In: International Workshop on Recent Advances in Intrusion Detection (Springer, 2010), pp. 382\u2013401","DOI":"10.1007\/978-3-642-15512-3_20"},{"key":"571_CR35","doi-asserted-by":"crossref","unstructured":"Mazzawi, H., Dalal, G., Rozenblatz, D., Ein-Dorx, L., Niniox, M., Lavi, O.: Anomaly detection in large databases using behavioral patterning. In: 2017 IEEE 33rd International Conference on Data Engineering (ICDE) (IEEE, 2017), pp. 1140\u20131149","DOI":"10.1109\/ICDE.2017.158"},{"key":"571_CR36","unstructured":"Viswanath, B., Bashir, M.A., Crovella, M., Guha, S., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Towards detecting anomalous user behavior in online social networks. In: 23rd $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 14) (2014), pp. 223\u2013238"},{"issue":"1","key":"571_CR37","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2015.2482465","volume":"11","author":"X Ruan","year":"2015","unstructured":"Ruan, X., Wu, Z., Wang, H., Jajodia, S.: Profiling online social behaviors for compromised account detection. IEEE Transactions Information Forensic. Secur. 11(1), 176 (2015)","journal-title":"IEEE Transactions Information Forensic. Secur."},{"key":"571_CR38","unstructured":"S\u00e1nchez, P.M.S., Valero, J.M.J., Celdr\u00e1n, A.H., Bovet, G., P\u00e9rez, M.G., P\u00e9rez, G.M.: A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets. arXiv preprint arXiv:2008.03343 (2020)"},{"key":"571_CR39","unstructured":"Kayacik, H.G., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: On the effectiveness of user behaviour modelling with mobile device sensors. arXiv preprint arXiv:1410.7743 (2014)"},{"key":"571_CR40","doi-asserted-by":"crossref","unstructured":"Birnbach, S., Eberz, S.: Peeves: Physical Event Verification in Smart Homes. (2019)","DOI":"10.1145\/3319535.3354254"},{"key":"571_CR41","unstructured":"He, W., Golla, M., Padhi, R., Ofek, J., D\u00fcrmuth, M., Fernandes, E., Ur, B.: Rethinking access control and authentication for the home internet of things (IoT). In: 27th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 18) (2018), pp. 255\u2013272"},{"issue":"4","key":"571_CR42","doi-asserted-by":"publisher","first-page":"e0152173","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PloS one 11(4), e0152173 (2016)","journal-title":"PloS one"},{"key":"571_CR43","doi-asserted-by":"crossref","unstructured":"Bisong, E.: Batch vs. online learning. In: Building Machine Learning and Deep Learning Models on Google Cloud Platform, pp. 199\u2013201. Apress, Berkeley, CA (2019)","DOI":"10.1007\/978-1-4842-4470-8_15"},{"issue":"5","key":"571_CR44","doi-asserted-by":"crossref","first-page":"155014771877692","DOI":"10.1177\/1550147718776924","volume":"14","author":"Z Chen","year":"2018","unstructured":"Chen, Z., Tian, L., Lin, C.: Trust evaluation model of cloud user based on behavior data. Int. J. Distributed Sensor Netw. 14(5), 1550147718776924 (2018)","journal-title":"Int. J. Distributed Sensor Netw."},{"issue":"1\u20132","key":"571_CR45","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.istr.2012.02.001","volume":"17","author":"P Bours","year":"2012","unstructured":"Bours, P.: Continuous keystroke dynamics: a different perspective towards biometric evaluation. Information Secur. Tech. Rep. 17(1\u20132), 36 (2012)","journal-title":"Information Secur. Tech. Rep."},{"key":"571_CR46","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jisa.2018.03.001","volume":"40","author":"S Mondal","year":"2018","unstructured":"Mondal, S., Bours, P.: A continuous combination of security & forensics for mobile devices. J. Information Secur. Appl. 40, 63 (2018)","journal-title":"J. Information Secur. Appl."},{"key":"571_CR47","unstructured":"Robert, T., Fabre, J.-C., Roy, M.: Application of early error detection for handling degraded modes of operation. In: 12th European Workshop on Dependable Computing, EWDC 2009 (2009)"},{"key":"571_CR48","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: International Workshop on Public Key Cryptography (Springer, 2005), pp. 65\u201384","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"571_CR49","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.-C., Kouchnarenko, O., Mantovani, J., et al. The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) Computer Aided Verification. CAV 2005. Lecture Notes in Computer Science, vol 3576. Springer, Berlin, Heidelberg","DOI":"10.1007\/11513988_27"},{"key":"571_CR50","unstructured":"Kdd cup 1999 data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html (1999). [Online; accessed 15-April-2021]"},{"key":"571_CR51","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"issue":"4","key":"571_CR52","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.3390\/s21041528","volume":"21","author":"I Essop","year":"2021","unstructured":"Essop, I., Ribeiro, J.C., Papaioannou, M., Zachos, G., Mantas, G., Rodriguez, J.: Generating datasets for anomaly-based intrusion detection systems in IoT and industrial IoT networks. Sensors 21(4), 1528 (2021)","journal-title":"Sensors"},{"issue":"1","key":"571_CR53","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3233\/AIS-130242","volume":"6","author":"K Rasch","year":"2014","unstructured":"Rasch, K.: An unsupervised recommender system for smart homes. J. Ambient Intell. Smart Environ. 6(1), 21 (2014)","journal-title":"J. Ambient Intell. Smart Environ."},{"key":"571_CR54","doi-asserted-by":"crossref","unstructured":"van Kasteren, T.L.M., Englebienne, G., Kr\u00f6se, B.J.A.: Human activity recognition from wireless sensor network data: benchmark and software. In: Activity Recognition in Pervasive Intelligent Environments, pp. 165\u2013186. Atlantis Press (2011)","DOI":"10.2991\/978-94-91216-05-3_8"},{"key":"571_CR55","unstructured":"van Kasteren, T.L., Englebienne, G., Kr\u00f6se, B.J.: University of Amsterdam activity recognition dataset. http:\/\/casas.wsu.edu\/datasets\/ (2011). [Online; accessed 15-April-2021]"},{"key":"571_CR56","unstructured":"Francois-Xavier, A.: IoT traffic traces gathered in a the DS2OS IoT environment. https:\/\/www.kaggle.com\/francoisxa\/ds2ostraffictraces (2018). [Online; accessed 15-April-2021]"},{"issue":"5","key":"571_CR57","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/TKDE.2010.235","volume":"24","author":"V Chandola","year":"2010","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection for discrete sequences: a survey. IEEE Transactions Knowl. Data Eng. 24(5), 823 (2010)","journal-title":"IEEE Transactions Knowl. Data Eng."},{"issue":"7","key":"571_CR58","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443 (2001)","journal-title":"Neural Comput."},{"issue":"6","key":"571_CR59","doi-asserted-by":"publisher","first-page":"868","DOI":"10.3390\/s16060868","volume":"16","author":"V Garcia-Font","year":"2016","unstructured":"Garcia-Font, V., Garrigues, C., Rif\u00e0-Pous, H.: A comparative study of anomaly detection techniques for smart city wireless sensor networks. Sensors 16(6), 868 (2016)","journal-title":"Sensors"},{"key":"571_CR60","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.patcog.2019.02.027","volume":"91","author":"T Kefi-Fatteh","year":"2019","unstructured":"Kefi-Fatteh, T., Ksantini, R., Ka\u00e2niche, M.B., Bouhoula, A.: A novel incremental one-class support vector machine based on low variance direction. Pattern Recognition 91, 308 (2019)","journal-title":"Pattern Recognition"},{"key":"571_CR61","unstructured":"Pahl, M.O., Aubet, F.X.: All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection. In: 2018 14th International Conference on Network and Service Management (CNSM) (IEEE, 2018), pp. 72\u201380"},{"key":"571_CR62","doi-asserted-by":"publisher","first-page":"89337","DOI":"10.1109\/ACCESS.2020.2994079","volume":"8","author":"S Latif","year":"2020","unstructured":"Latif, S., Zou, Z., Idrees, Z., Ahmad, J.: A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8, 89337 (2020)","journal-title":"IEEE Access"},{"key":"571_CR63","doi-asserted-by":"publisher","first-page":"100059","DOI":"10.1016\/j.iot.2019.100059","volume":"7","author":"M Hasan","year":"2019","unstructured":"Hasan, M., Islam, M.M., Zarif, M.I.I., Hashem, M.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7, 100059 (2019)","journal-title":"Internet of Things"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00571-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-021-00571-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00571-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:19:34Z","timestamp":1744193974000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-021-00571-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,20]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["571"],"URL":"https:\/\/doi.org\/10.1007\/s10207-021-00571-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,20]]},"assertion":[{"value":"20 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}},{"value":"Noureddine Amraoui declares that he has no conflict of interest. Belhassen Zouari declares that he has no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of potential conflicts of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}