{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T21:06:43Z","timestamp":1761599203776,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T00:00:00Z","timestamp":1598486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T00:00:00Z","timestamp":1598486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12083-020-00983-6","type":"journal-article","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T11:02:32Z","timestamp":1598526152000},"page":"349-374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3828-2050","authenticated-orcid":false,"given":"D. P.","family":"Acharjya","sequence":"first","affiliation":[]},{"given":"N. Syed Siraj","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,27]]},"reference":[{"issue":"1","key":"983_CR1","first-page":"1","volume":"16","author":"NT Hossain","year":"2016","unstructured":"Le NT, Hossain MA, Islam A, Kim DY, Choi YJ, Jang YM (2016) Survey of promising technologies for 5g networks. Mob Inf Syst 16(1):1\u201325","journal-title":"Mob Inf Syst"},{"issue":"2","key":"983_CR2","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1109\/COMST.2018.2881008","volume":"21","author":"R Du","year":"2019","unstructured":"Du R, Santi P, Xiao M, Vasilakos AV, Fischione C (2019) The sensable city: A survey on the deployment and management for smart city monitoring. IEEE Communications Surveys Tutorials 21 (2):1533\u20131560","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"15","key":"983_CR3","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: A survey. Comput Netw 54 (15):2787\u20132805","journal-title":"Comput Netw"},{"issue":"7","key":"983_CR4","first-page":"345","volume":"25","author":"S Andreev","year":"2015","unstructured":"Andreev S, Galinina O, Pyattaev A, Gerasimenko M, Tirronen T, Torsner J, Sachs J, Dohler M, Koucheryavy Y (2015) Understanding the iot connectivity landscape: A contemporary m2m radio technology roadmap. IEEE Commun Mag 25(7):345\u2013370","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"983_CR5","first-page":"245","volume":"17","author":"N Mitton","year":"2012","unstructured":"Mitton N, Papavassiliou S, Puliafito A, Trivedi KS (2012) Combining cloud and sensors in a smart city environment. EURASI Journal on Wireless Communications and Networking 17(5):245\u2013260","journal-title":"EURASI Journal on Wireless Communications and Networking"},{"issue":"3","key":"983_CR6","first-page":"19","volume":"67","author":"O Vermesan","year":"2019","unstructured":"Vermesan O, Eisenhauer M, Serrano M, Guillemin P, Sundmaekar H, Tragos EZ, Valino J, Copineaux B, Presser M, Aagaard A, Bahr R, Darmois EC (2019) The next generation internet of things \u2013 hyper connectivity and embedded intelligence at the edge. Journal of Networking and Internet of Things 67(3):19\u2013102","journal-title":"Journal of Networking and Internet of Things"},{"issue":"2","key":"983_CR7","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1504\/IJHPCN.2019.097500","volume":"13","author":"Y Wei","year":"2019","unstructured":"Wei Y, Li Q, Gong X, Guo D, Zhang Y (2019) Spectrum prediction and aggregation strategy in multi-user cooperative relay networks. International Journal of High Performance Computing and Networking 13(2):241\u2013250","journal-title":"International Journal of High Performance Computing and Networking"},{"issue":"1","key":"983_CR8","doi-asserted-by":"publisher","first-page":"7958","DOI":"10.1109\/ACCESS.2018.2799603","volume":"6","author":"UK Dutta","year":"2018","unstructured":"Dutta UK, Razzaque MA, Al-Wadud MA, Islam MS, Hossain MS, Gupta BB (2018) Self-adaptive scheduling of base transceiver stations in green 5g network. IEEE Access 6(1):7958\u20137969","journal-title":"IEEE Access"},{"issue":"12","key":"983_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.14569\/IJACSA.2015.061214","volume":"6","author":"NSS Ahmed","year":"2015","unstructured":"Ahmed NSS, Acharjya DP (2015) Detection of denial of service attack in wireless network using dominance based rough set. International Journal of Advanced Computer Science and Applications 6(12):267\u2013278","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"2","key":"983_CR10","first-page":"45","volume":"1","author":"NSS Ahmed","year":"2015","unstructured":"Ahmed NSS, Acharjya DP (2015) A dominance based rough set approach for the detection of jamming attack. International Journal of Philosophies in Computer Science 1(2):45\u201366","journal-title":"International Journal of Philosophies in Computer Science"},{"issue":"5","key":"983_CR11","first-page":"1574","volume":"8","author":"D Gurusamy","year":"2019","unstructured":"Gurusamy D, Priya MD, Yibgeta B, Bekalu A (2019) DDos risk in 5g enabled iot and solutions. International Journal of Engineering and Advanced Technology 8(5):1574\u20131578","journal-title":"International Journal of Engineering and Advanced Technology"},{"issue":"4","key":"983_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.4018\/IJISP.2019100103","volume":"13","author":"NSS Ahmed","year":"2019","unstructured":"Ahmed NSS, Acharjya DP (2019) A framework for various attack identification in manet using multi-granular rough set. International Journal of Information Security and Privacy 13(4):28\u201352","journal-title":"International Journal of Information Security and Privacy"},{"key":"983_CR13","doi-asserted-by":"crossref","unstructured":"Acharjya DP, Ahmed NSS (2017) Recognizing Attacks in Wireless Sensor Network in View of Internet of Things. In: Acharjya DP, Geetha MK (eds) Internet of things : novel advances and envisioned, studies in big data 25, pp. 173\u2013191","DOI":"10.1007\/978-3-319-53472-5_8"},{"key":"983_CR14","doi-asserted-by":"crossref","unstructured":"Rezvy S, Luo Y, Petridis M, Lasebae A, Zebin T (2019) An efficient deep learning model for intrusion classification and prediction in 5g and iot networks. In: Proceedings of Annual Conference on Information Sciences and Systems, pp. 1\u20136","DOI":"10.1109\/CISS.2019.8693059"},{"issue":"1","key":"983_CR15","first-page":"1","volume":"10","author":"Z Tian","year":"2019","unstructured":"Tian Z, Sun Y, Su S, Li M, Du X (2019) Automated attack and defense framework for 5G Security on physical and logical layers. Int J Adv Comput Sci Appl 10(1):1\u201312","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"1","key":"983_CR16","first-page":"1","volume":"17","author":"D Fang","year":"2017","unstructured":"Fang D, Qian Y, Hu RQ (2017) Security for 5g mobile wireless networks. IEEE Access 17 (1):1\u201324","journal-title":"IEEE Access"},{"key":"983_CR17","doi-asserted-by":"crossref","unstructured":"Sahoo SR, Gupta BB (2018) Security issues and challenges in online social networks (OSNs) based on user perspective: principles, algorithm, applications, and perspectives. In: Gupta BB (ed) computer and cyber security, taylor and francis group 25, pp. 1\u201316","DOI":"10.1201\/9780429424878-22"},{"issue":"1","key":"983_CR18","doi-asserted-by":"publisher","first-page":"18513","DOI":"10.1007\/s11042-016-4162-z","volume":"76","author":"Z Zhang","year":"2017","unstructured":"Zhang Z, Sun R, Zhao C, Wang J, Chang CK, Gupta BB (2017) CyVOD: A novel trinity multimedia social network scheme. Multimedia Tools and Applications 76(1):18513\u201318529","journal-title":"Multimedia Tools and Applications"},{"key":"983_CR19","doi-asserted-by":"crossref","unstructured":"Mamolar AS, Pervez Z, Wang Q, Alcaraz-Calero JM (2019) Towards the detection of mobile ddos attacks in 5g multi-tenant networks. In: Proceedings of European Conference on Networks and Detection, pp. 1\u20136","DOI":"10.1109\/EuCNC.2019.8801975"},{"issue":"1","key":"983_CR20","first-page":"1","volume":"17","author":"SR Hussain","year":"2019","unstructured":"Hussain SR, Echeverria M, Chowdhury O, Li N, Bertino E (2019) Privacy attacks to the 4g and 5g cellular paging protocol s using side channel information. International Journal of Computer Application 17(1):1\u201315","journal-title":"International Journal of Computer Application"},{"issue":"1","key":"983_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/4582391","volume":"19","author":"H Alquhayz","year":"2019","unstructured":"Alquhayz H, Alalwan N, Alzahrani AI, Al-Bayatti AH, Sharif MS (2019) Policy-based security management system for 5g heterogeneous networks. Wirel Commun Mob Comput 19(1):1\u201314","journal-title":"Wirel Commun Mob Comput"},{"issue":"3","key":"983_CR22","first-page":"355","volume":"9","author":"HA Abdul-Ghani","year":"2018","unstructured":"Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive iot attacks survey based on a building-block reference model. Int J Adv Comput Sci Appl 9(3):355\u2013373","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"22","key":"983_CR23","first-page":"1","volume":"8","author":"HA Abdul-Ghani","year":"2019","unstructured":"Abdul-Ghani HA, Konstantas D (2019) A comprehensive study of security and privacy guidelines, threats, and countermeasures : an iot perspective. Journal of Sensor and Actuator Networks 8(22):1\u201338","journal-title":"Journal of Sensor and Actuator Networks"},{"issue":"1","key":"983_CR24","first-page":"1","volume":"19","author":"MY Idris","year":"2019","unstructured":"Idris MY, Malik RF, Nurmaini S, Alsharif N, Budiarto R (2019) Investigating brute force attack patterns in iot network. Journal of Electrical and Computer Engineering 19(1):1\u201314","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"983_CR25","doi-asserted-by":"crossref","unstructured":"Deogirikar J, Vidhate A (2017) Security attacks in iot : A survey. In: Proceedings of International Conference on IoT in Social, Mobile, Analytics and Cloud, pp. 32\u201337","DOI":"10.1109\/I-SMAC.2017.8058363"},{"issue":"11","key":"983_CR26","doi-asserted-by":"publisher","first-page":"2934","DOI":"10.1109\/TCSI.2017.2702098","volume":"64","author":"W Yu","year":"2017","unstructured":"Yu W, Kose S (2017) A lightweight masked AES implementation for securing iot against cpa attacks. IEEE Transactions on Circuits and Systems 64(11):2934\u20132944","journal-title":"IEEE Transactions on Circuits and Systems"},{"key":"983_CR27","doi-asserted-by":"crossref","unstructured":"Strielkina A, Kharchenko V, Uzun D (2018) Availability models for healthcare iot systems: classification and research considering attacks on vulnerabilities. In: Proceedings of IEEE 9th International Conference on Dependable Systems, Services and Technologies, pp. 58\u201362","DOI":"10.1109\/DESSERT.2018.8409099"},{"issue":"1","key":"983_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-017-0490-9","volume":"21","author":"H Wang","year":"2018","unstructured":"Wang H, Zhang Z, Taleb T (2018) Special issue on security and privacy of iot. World Wide Web 21(1):1\u20136","journal-title":"World Wide Web"},{"key":"983_CR29","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak Z (1982) Rough sets. International Journal of Computer and Information Sciences 11:341\u2013356","journal-title":"International Journal of Computer and Information Sciences"},{"key":"983_CR30","unstructured":"Greco S, Matarazzo B, Slowinski R (1991) The use of rough sets and fuzzy sets in MCDM. In: Gal T, Stewart T, Hanne T (eds) Advances in multiple criteria decision making, kluwer academic publishers, pp. 14.1\u201314.59"},{"key":"983_CR31","doi-asserted-by":"crossref","unstructured":"Pawlak Z (1991) Rough sets: theoretical aspects of reasoning about data. Kluwer academic publishers, dordrecht the netherlands","DOI":"10.1007\/978-94-011-3534-4_7"},{"key":"983_CR32","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/S0377-2217(98)00127-1","volume":"117","author":"S Greco","year":"1999","unstructured":"Greco S, Matarazzo B, Slowinski R, Stefanowski J (1999) An algorithm for induction of decision rules consistent with the dominance principle. Eur J Oper Res 117:63\u201383","journal-title":"Eur J Oper Res"},{"issue":"2","key":"983_CR33","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1504\/IJCNDS.2017.082105","volume":"18","author":"NSS Ahmed","year":"2017","unstructured":"Ahmed NSS, Acharjya DP, Sanyal S (2017) A framework for phishing attack identification using rough set and formal concept analysis. International Journal of Communication Networks and Distributed Systems 18(2):186\u2013212","journal-title":"International Journal of Communication Networks and Distributed Systems"},{"issue":"2","key":"983_CR34","first-page":"234","volume":"34","author":"RE Jurga","year":"2007","unstructured":"Jurga RE, Hulb MM, Procurve HP (2007) Technical report packet sampling for network monitoring. Journal of Computational Engineering 34(2):234\u2013246","journal-title":"Journal of Computational Engineering"},{"key":"983_CR35","doi-asserted-by":"crossref","unstructured":"Grzymala-Busse JW (1992). In: Slownski R (ed) LERS \u2013 A system for learning from examples based on rough set. Kluwer Academic Publishers, Handbook of Applications and Advances of Rough Sets Theory, pp 3\u201318","DOI":"10.1007\/978-94-015-7975-9_1"},{"issue":"10","key":"983_CR36","first-page":"1","volume":"7","author":"GAP Rodrigues","year":"2017","unstructured":"Rodrigues GAP, Albuquerque RDO, Deus FEG (2017) Cybersecurity and network forensics: Analysis of malicious traffic towards a honeypot with deep packet inspection. Application Science 7(10):1\u20131082","journal-title":"Application Science"},{"key":"983_CR37","doi-asserted-by":"crossref","unstructured":"Moustafa N, Creech G, Slay J (2108) Flow aggregator module for analyzing network traffic. In: Proceedings of Computing, Analytics and Networking, pp. 19\u201329","DOI":"10.1007\/978-981-10-7871-2_3"},{"issue":"4","key":"983_CR38","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"OD Vel","year":"2001","unstructured":"Vel OD, Anderson A, Comey M, Mohay G (2001) Mining e-mail content for author identification forensicis. ACM SIGMOD Rec. 30(4):55\u201364","journal-title":"ACM SIGMOD Rec."},{"issue":"19","key":"983_CR39","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniots","year":"2019","unstructured":"Koroniots N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analysis : Bot-iot dataset. Future Generation Computer System 100(19):779\u2013796","journal-title":"Future Generation Computer System"},{"key":"983_CR40","unstructured":"Chang YH, Huang HY (2008) An automatic document classifier system based on naive bayes classifier and ontology. In: Proceedings of IEEE International Conference on Machine Learning and Cybernetics, 6, 3144\u20133149"},{"issue":"4","key":"983_CR41","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1080\/03081070902857563","volume":"38","author":"R Belohlavek","year":"2009","unstructured":"Belohlavek R, De Baets B, Outrata J, Vychodil V (2009) Inducing decision trees via concept lattices. International Journal of General Systems 38(4):455\u2013467","journal-title":"International Journal of General Systems"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00983-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-00983-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00983-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T00:06:46Z","timestamp":1630022806000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-00983-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,27]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["983"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00983-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2020,8,27]]},"assertion":[{"value":"9 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"First Author declares that he has no conflict of interest. Second Author declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}