{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T02:37:29Z","timestamp":1767494249686,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T00:00:00Z","timestamp":1570233600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T00:00:00Z","timestamp":1570233600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802116"],"award-info":[{"award-number":["61802116"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the key scientific and technological project of Henan province","award":["192102210113"],"award-info":[{"award-number":["192102210113"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10776-019-00462-7","type":"journal-article","created":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T08:02:41Z","timestamp":1570262561000},"page":"209-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Network Attack Detection Method Using SDA and Deep Neural Network Based on Internet of Things"],"prefix":"10.1007","volume":"27","author":[{"given":"Jingwei","family":"Li","sequence":"first","affiliation":[]},{"given":"Bo","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,5]]},"reference":[{"issue":"1","key":"462_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1039\/C8EE02029A","volume":"12","author":"C Lethien","year":"2019","unstructured":"C. Lethien, J. L. Bideau and T. Brousse, Challenges and prospects of 3D micro-supercapacitors for powering the internet of things, Energy & Environmental Science, Vol. 12, No. 1, pp. 96\u2013115, 2019.","journal-title":"Energy & Environmental Science"},{"issue":"1","key":"462_CR2","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/JIOT.2018.2854374","volume":"6","author":"S Li","year":"2019","unstructured":"S. Li, L. Li, M. J. Hussain, et al., Sentinel: breaking the bottleneck of energy utilization efficiency in RF-powered devices, IEEE Internet of Things Journal, Vol. 6, No. 1, pp. 705\u2013717, 2019.","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"462_CR3","first-page":"122","volume":"40","author":"LU Zhen-Bang","year":"2008","unstructured":"L. U. Zhen-Bang and L. H. Zhou, A detection model for multi-stage attacks based on WOWA-FCM, Journal of Sichuan University, Vol. 40, No. 1, pp. 122\u2013126, 2008.","journal-title":"Journal of Sichuan University"},{"key":"462_CR4","unstructured":"L. Jin, L. Yong, G. Lin, DDoS attack detection based on neural network[C]\/\/International Symposium on Aware Computing, 2010."},{"key":"462_CR5","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","volume":"275","author":"D Ding","year":"2018","unstructured":"D. Ding, Q. L. Han, Y. Xiang, et al., A survey on security control and attack detection for industrial cyber-physical systems, Neurocomputing, Vol. 275, pp. 1674\u20131683, 2018.","journal-title":"Neurocomputing"},{"key":"462_CR6","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"S. Aljawarneh, M. Aldwairi and M. B. Yassein, Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model, Journal of Computational Science, Vol. 25, pp. 152\u2013160, 2018.","journal-title":"Journal of Computational Science"},{"issue":"14","key":"462_CR7","doi-asserted-by":"publisher","first-page":"18503","DOI":"10.1007\/s11042-018-5866-z","volume":"77","author":"R Varatharajan","year":"2018","unstructured":"R. Varatharajan, A. P. Preethi, G. Manogaran, et al., Stealthy attack detection in multi-channel multi-radio wireless networks, Multimedia Tools and Applications, Vol. 77, No. 14, pp. 18503\u201318526, 2018.","journal-title":"Multimedia Tools and Applications"},{"issue":"11","key":"462_CR8","doi-asserted-by":"publisher","first-page":"3254","DOI":"10.1109\/TCYB.2018.2843358","volume":"48","author":"E Mousavinejad","year":"2018","unstructured":"E. Mousavinejad, F. Yang, Q. L. Han, et al., A novel cyber attack detection method in networked control systems, IEEE Transactions on Cybernetics, Vol. 48, No. 11, pp. 3254\u20133264, 2018.","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"2","key":"462_CR9","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"N. Sultana, N. Chilamkurti, W. Peng, et al., Survey on SDN based network intrusion detection system using machine learning approaches, Peer-to-Peer Networking and Applications, Vol. 12, No. 2, pp. 493\u2013501, 2019.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"2","key":"462_CR10","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TMC.2018.2833849","volume":"18","author":"Y Yao","year":"2018","unstructured":"Y. Yao, B. Xiao, G. Wu, et al., Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI, IEEE Transactions on Mobile Computing, Vol. 18, No. 2, pp. 362\u2013375, 2018.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"7","key":"462_CR11","doi-asserted-by":"publisher","first-page":"3271","DOI":"10.1109\/TII.2018.2825243","volume":"14","author":"JQ James","year":"2018","unstructured":"J. Q. James, Y. Hou and V. O. K. Li, Online false data injection attack detection with wavelet transform and deep neural networks, IEEE Transactions on Industrial Informatics, Vol. 14, No. 7, pp. 3271\u20133280, 2018.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"462_CR12","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.eswa.2017.09.013","volume":"92","author":"AH Hamamoto","year":"2018","unstructured":"A. H. Hamamoto, L. F. Carvalho, L. D. H. Sampaio, et al., Network anomaly detection system using genetic algorithm and fuzzy logic, Expert Systems with Applications, Vol. 92, pp. 390\u2013402, 2018.","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"462_CR13","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2298\/CSIS160905039P","volume":"15","author":"M Petkovic","year":"2018","unstructured":"M. Petkovic, I. Basicevic, D. Kukolj, et al., Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks, Computer Science Informaation System, Vol. 15, No. 1, pp. 139\u2013162, 2018.","journal-title":"Computer Science Informaation System"},{"issue":"3","key":"462_CR14","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1109\/JIOT.2018.2823084","volume":"5","author":"F Gu","year":"2018","unstructured":"S. Khan, A. Gani, A. W. A. Wahab, et al., Feature selection of denial-of-service attacks using entropy and granular computing,\u00a0Arabian Journal for Science and Engineering, Vol. 43, No. 2, pp. 499\u2013508, 2018.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"462_CR15","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s13369-017-2634-8","volume":"43","author":"S Khan","year":"2018","unstructured":"Y. Meidan, M. Bohadana, Y. Mathov, et al., N-BaIoT\u2014network-based detection of IoT botnet attacks using deep autoencoders,\u00a0IEEE Pervasive Computing, Vol. 17, No. 3, pp. 12\u201322, 2018.","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"3","key":"462_CR16","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"F. Gu, K. Khoshelham, S. Valaee, et al., Locomotion activity recognition using stacked denoising autoencoders,\u00a0IEEE Internet of Things Journal, Vol. 5, No. 3, pp. 2085\u20132093, 2018.","journal-title":"IEEE Pervasive Computing"},{"key":"462_CR17","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.jclepro.2019.04.261","volume":"228","author":"W Wang","year":"2019","unstructured":"W. Wang, W. Peng, L. Tong, et al., Study on sustainable development of power transmission system under ice disaster based on a new security early warning model, Journal of Cleaner Production, Vol. 228, pp. 175\u2013184, 2019.","journal-title":"Journal of Cleaner Production"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00462-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-019-00462-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00462-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,3]],"date-time":"2020-10-03T23:09:37Z","timestamp":1601766577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-019-00462-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,5]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["462"],"URL":"https:\/\/doi.org\/10.1007\/s10776-019-00462-7","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2019,10,5]]},"assertion":[{"value":"10 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}