{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:43:08Z","timestamp":1767854588053,"version":"3.49.0"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T00:00:00Z","timestamp":1691971200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T00:00:00Z","timestamp":1691971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s12652-023-04666-x","type":"journal-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T14:02:11Z","timestamp":1692021731000},"page":"16637-16651","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["IoT networks attacks detection using multi-novel features and extra tree random - voting ensemble classifier (ER-VEC)"],"prefix":"10.1007","volume":"14","author":[{"given":"Ayesha","family":"Sarwar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1922-6205","authenticated-orcid":false,"given":"Muhammad Faheem","family":"Mushtaq","sequence":"additional","affiliation":[]},{"given":"Urooj","family":"Akram","sequence":"additional","affiliation":[]},{"given":"Furqan","family":"Rustam","sequence":"additional","affiliation":[]},{"given":"Ameer","family":"Hamza","sequence":"additional","affiliation":[]},{"given":"Vaibhav","family":"Rupapara","sequence":"additional","affiliation":[]},{"given":"Saleem","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,14]]},"reference":[{"issue":"1","key":"4666_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/jsan11010018","volume":"11","author":"Q Abu Al-Haija","year":"2022","unstructured":"Abu Al-Haija Q, Al-Dala\u2019ien M (2022) Elba-iot: an ensemble learning model for botnet attack detection in iot networks. J Sens Actuator Netw 11(1):18","journal-title":"J Sens Actuator Netw"},{"key":"4666_CR2","unstructured":"Ahmed MS, Shah SM (2022) Unsupervised ensemble based deep learning approach for attack detection in iot network. arXiv preprint arXiv:2207.07903"},{"issue":"3","key":"4666_CR3","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2022","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutorials 22(3):1646\u20131685. https:\/\/doi.org\/10.1109\/COMST.2020.2988293","journal-title":"IEEE Commun Surv Tutorials"},{"key":"4666_CR4","doi-asserted-by":"crossref","unstructured":"Al-Hadhrami, Y, Hussain FK (2019) A machine learning architecture towards detecting denial of service attack in iot. In: Conference on Complex, Intelligent, and Software Intensive Systems, pp.\u00a0417\u2013429, Springer,","DOI":"10.1007\/978-3-030-22354-0_37"},{"key":"4666_CR5","doi-asserted-by":"crossref","unstructured":"Alrashdi I, Alqazzaz A, Aloufi E, Alharthi R, Zohdy M, Ming H (2019) Ad-iot: Anomaly detection of iot cyberattacks in smart city using machine learning. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp.\u00a00305\u20130310, IEEE","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"4666_CR6","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0101280","author":"J Alsamiri","year":"2019","unstructured":"Alsamiri J, Alsubhi K (2019) Internet of things cyber attacks detection using machine learning. Int J Adv Comput Sci Appl. https:\/\/doi.org\/10.14569\/IJACSA.2019.0101280","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"1","key":"4666_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TSUSC.2018.2809665","volume":"4","author":"A Azmoodeh","year":"2018","unstructured":"Azmoodeh A, Dehghantanha A, Choo K-KR (2018) Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans Sustain Comput 4(1):88\u201395","journal-title":"IEEE Trans Sustain Comput"},{"key":"4666_CR8","doi-asserted-by":"crossref","unstructured":"Bah\u015fi H, N\u00f5mm S, La\u00a0Torre FB (2018) Dimensionality reduction for machine learning based iot botnet detection. In: 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), pp.\u00a01857\u20131862, IEEE","DOI":"10.1109\/ICARCV.2018.8581205"},{"issue":"21","key":"4666_CR9","doi-asserted-by":"publisher","first-page":"8417","DOI":"10.3390\/s22218417","volume":"22","author":"AM Banaamah","year":"2022","unstructured":"Banaamah AM, Ahmad I (2022) Intrusion detection in iot using deep learning. Sensors 22(21):8417","journal-title":"Sensors"},{"issue":"2","key":"4666_CR10","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"Bertino E, Islam N (2017) Botnets and internet of things security. Computer 50(2):76\u201379","journal-title":"Computer"},{"key":"4666_CR11","unstructured":"Coetzee L, Eksteen J (2011) The internet of things-promise for the future? An introduction. In: 2011 IST-Africa Conference Proceedings, pp.\u00a01\u20139, IEEE"},{"key":"4666_CR12","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-981-15-0132-6_10","volume-title":"Data communication and networks","author":"S Dange","year":"2020","unstructured":"Dange S, Chatterjee M (2020) Iot botnet: the largest threat to the iot network. Data communication and networks. Springer, Cham, pp 137\u2013157"},{"key":"4666_CR13","doi-asserted-by":"crossref","unstructured":"Dinakarrao SMP, Sayadi H, Makrani HM, Nowzari C, Rafatirad S, Homayoun H (2019) Lightweight node-level malware detection and network-level malware confinement in iot networks. In: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.\u00a0776\u2013781, IEEE","DOI":"10.23919\/DATE.2019.8715057"},{"key":"4666_CR14","doi-asserted-by":"crossref","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp.\u00a029\u201335, IEEE","DOI":"10.1109\/SPW.2018.00013"},{"key":"4666_CR15","doi-asserted-by":"crossref","unstructured":"Emami-Naeini P, Dixon H, Agarwal Y, Cranor LF (2019) Exploring how privacy and security factor into iot device purchase behavior. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp.\u00a01\u201312","DOI":"10.1145\/3290605.3300764"},{"issue":"3","key":"4666_CR16","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/fi12030044","volume":"12","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Ahmim A, Derdour M, Janicke H (2020) Rdtids: rules and decision tree-based intrusion detection system for internet-of-things networks. Future Internet 12(3):44","journal-title":"Future Internet"},{"key":"4666_CR17","unstructured":"Frank C, Nance C, Jarocki S, Pauli WE, Madison S (2017) Protecting iot from mirai botnets; iot device hardening. In: Proceedings of the Conference on Information Systems Applied Research, Austin, TX, USA, p.\u00a01508"},{"key":"4666_CR18","doi-asserted-by":"crossref","unstructured":"Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A (2019) Deep learning-based intrusion detection for iot networks. In :2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), pp.\u00a0256\u201325609, IEEE","DOI":"10.1109\/PRDC47002.2019.00056"},{"key":"4666_CR19","unstructured":"George A (2020) Distributed messaging system for the IoT edge. PhD thesis, The University of North Carolina at Charlotte,"},{"key":"4666_CR20","doi-asserted-by":"publisher","first-page":"21457","DOI":"10.1109\/ACCESS.2021.3055775","volume":"9","author":"A George","year":"2021","unstructured":"George A, Ravindran A, Mendieta M, Tabkhi H (2021) Mez: an adaptive messaging system for latency-sensitive multi-camera machine vision at the iot edge. IEEE Access 9:21457\u201321473","journal-title":"IEEE Access"},{"issue":"1","key":"4666_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts P, Ernst D, Wehenkel L (2006) Extremely randomized trees. Mach Learn 63(1):3\u201342","journal-title":"Mach Learn"},{"key":"4666_CR22","doi-asserted-by":"crossref","unstructured":"Guerra-Manzanares A, Medina-Galindo J, Bahsi H, N\u00f5mm S (2020) Medbiot: generation of an iot botnet dataset in a medium-sized iot network. ICISSP, pp.\u00a0207\u2013218","DOI":"10.5220\/0009187802070218"},{"key":"4666_CR23","first-page":"765","volume-title":"Soft computing for security applications","author":"GP Gupta","year":"2022","unstructured":"Gupta GP et al (2022) Intrusion detection framework using an improved deep reinforcement learning technique for iot network. In: Ram K (ed) Soft computing for security applications. Springer, Cham, pp 765\u2013779"},{"key":"4666_CR24","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.future.2018.03.007","volume":"85","author":"H HaddadPajouh","year":"2018","unstructured":"HaddadPajouh H, Dehghantanha A, Khayami R, Choo K-KR (2018) A deep recurrent neural network based approach for internet of things malware threat hunting. Futur Gener Comput Syst 85:88\u201396","journal-title":"Futur Gener Comput Syst"},{"key":"4666_CR25","doi-asserted-by":"crossref","unstructured":"Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) Ioddos-the internet of distributed denial of sevice attacks. In: 2nd International Conference on Internet of Things, Big Data and Security. SCITEPRESS, pp.\u00a047\u201358","DOI":"10.5220\/0006246600470058"},{"issue":"3","key":"4666_CR26","first-page":"129","volume":"7","author":"MAM Hasan","year":"2016","unstructured":"Hasan MAM, Nasser M, Ahmad S, Molla KI (2016) Feature selection for intrusion detection using random forest. J Inf Secur 7(3):129\u2013140","journal-title":"J Inf Secur"},{"key":"4666_CR27","doi-asserted-by":"crossref","unstructured":"Hezam AA, Mostafa SA, Ramli AA, Mahdin H, Khalaf BA (2021) Deep learning approach for detecting botnet attacks in iot environment of multiple and heterogeneous sensors. In: International Conference on Advances in Cyber Security, pp.\u00a0317\u2013328, Springer","DOI":"10.1007\/978-981-16-8059-5_19"},{"key":"4666_CR28","unstructured":"Hilt S, Merc\u00eas F, Rosario M, Sancho D 2020 Worm war: The botnet battle for iot territory"},{"key":"4666_CR29","volume":"1529","author":"TM Hossain","year":"2020","unstructured":"Hossain TM, Wataada J, Hermana M, Aziz IA (2020) Supervised machine learning in electrofacies classification: a rough set theory approach. J Phys 1529:052048","journal-title":"J Phys"},{"issue":"9","key":"4666_CR30","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.3390\/s21093025","volume":"21","author":"F Hussain","year":"2021","unstructured":"Hussain F, Abbas SG, Shah GA, Pires IM, Fayyaz UU, Shahzad F, Garcia NM, Zdravevski E (2021) A framework for malicious traffic detection in iot healthcare environment. Sensors 21(9):3025","journal-title":"Sensors"},{"key":"4666_CR31","unstructured":"Ikeda S (2020) Iot-based ddos attacks are growing and making use of common vulnerabilities. https:\/\/www.cpomagazine.com\/cyber-security\/iot-based-ddos-attacks-are-growing-and-making-use-of-common-vulnerabilities\/,"},{"key":"4666_CR32","unstructured":"Intel A Guide to the internet of things infographic. Available online via Intel: http:\/\/www. intel. com\/content\/dam\/www\/public\/us\/en\/images\/iot\/guide-to-iot-infographic. png (Accessed on 2016.01. 11)"},{"key":"4666_CR33","unstructured":"Intelligence T (2020) 2020 SonicWall Cyber Threat Report. https:\/\/www.sonicwall.com\/resources\/white-papers\/2020-sonicwall-cyber-threat-report\/. Accessed 12 Aug 2023"},{"key":"4666_CR34","doi-asserted-by":"crossref","unstructured":"Kambourakis G, Kolias C, Stavrou A (2017) The mirai botnet and the iot zombie armies. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pp.\u00a0267\u2013272, IEEE","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"4666_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.09.619","author":"K Kaur","year":"2020","unstructured":"Kaur K, Mittal SK (2020) WITHDRAWN: Classification of mammography image with CNN-RNN based semantic features and extra tree classifier approach using LSTM. Mater Today Proc. https:\/\/doi.org\/10.1016\/j.matpr.2020.09.619","journal-title":"Mater Today Proc"},{"issue":"11","key":"4666_CR36","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.3390\/electronics8111210","volume":"8","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019a) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8(11):1210","journal-title":"Electronics"},{"issue":"1","key":"4666_CR37","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019b) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1):20","journal-title":"Cybersecurity"},{"key":"4666_CR38","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.jkss.2011.03.002","volume":"40","author":"H Kim","year":"2011","unstructured":"Kim H, Kim H, Moon H, Ahn H (2011) A weight-adjusted voting algorithm for ensembles of classifiers. J Korean Stat Soc 40:437\u2013449","journal-title":"J Korean Stat Soc"},{"issue":"7","key":"4666_CR39","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80\u201384","journal-title":"Computer"},{"key":"4666_CR40","doi-asserted-by":"crossref","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Slay J (2017) Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques. In: International Conference on Mobile Networks and Management, pp.\u00a030\u201344, Springer","DOI":"10.1007\/978-3-319-90775-8_3"},{"key":"4666_CR41","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.chaos.2018.03.010","volume":"110","author":"L Li","year":"2018","unstructured":"Li L, Zhang H, Peng H, Yang Y (2018) Nearest neighbors based density peaks approach to intrusion detection. Chaos Solitons Fractals 110:33\u201340","journal-title":"Chaos Solitons Fractals"},{"key":"4666_CR42","doi-asserted-by":"crossref","unstructured":"Li Z, Wei L, Li W, Wei L, Chen M, Lv M, Zhi X, Wang C, Gao N (2019) Research on ddos attack detection based on elm in iot environment. In: 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), pp.\u00a0144\u2013148, IEEE","DOI":"10.1109\/ICSESS47205.2019.9040855"},{"key":"4666_CR43","first-page":"0360","volume":"1","author":"J Manyika","year":"2011","unstructured":"Manyika J, Roxburgh C (2011) The great transformer: the impact of the internet on economic growth and prosperity. McKinsey Global Institute 1:0360\u20138581","journal-title":"McKinsey Global Institute"},{"key":"4666_CR44","doi-asserted-by":"crossref","unstructured":"McDermott CD, Petrovski AV, Majdani F (2018) Towards situational awareness of botnet activity in the internet of things. Institute of Electrical and Electronics Engineers","DOI":"10.1109\/CyberSA.2018.8551408"},{"issue":"3","key":"4666_CR45","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12\u201322","journal-title":"IEEE Pervasive Comput"},{"key":"4666_CR46","unstructured":"Molitor T (2020) Coverage prediction for inter-frequency handover using machine learning with aggregated training data, p 57"},{"key":"4666_CR47","unstructured":"Osborne C (2018) Meet torii, a new iot botnet far more sophisticated than mirai variants. https:\/\/www.zdnet.com\/article\/meet-torii-a-new-iot-botnet-far-more-sophisticated-than-mirai\/. Accessed 12 Aug 2023"},{"key":"4666_CR48","unstructured":"Pokhrel S, Abbas R, Aryal B (2021) Iot security: botnet detection in iot using machine learning. arXiv preprint arXiv:2104.02231"},{"issue":"9","key":"4666_CR49","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.3390\/s21092985","volume":"21","author":"SI Popoola","year":"2021","unstructured":"Popoola SI, Adebisi B, Ande R, Hammoudeh M, Anoh K, Atayero AA (2021) smote-drnn: a deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 21(9):2985","journal-title":"Sensors"},{"key":"4666_CR50","doi-asserted-by":"crossref","unstructured":"Prokofiev AO, Smirnova YS, Surov VA (2018) A method to detect internet of things botnets. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp.\u00a0105\u2013108, IEEE","DOI":"10.1109\/EIConRus.2018.8317041"},{"issue":"1","key":"4666_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-022-04835-6","volume":"12","author":"V Rupapara","year":"2022","unstructured":"Rupapara V, Rustam F, Aljedaani W, Shahzad HF, Lee E, Ashraf I (2022) Blood cancer prediction using leukemia microarray gene data and hybrid logistic vector trees model. Sci Rep 12(1):1\u201315","journal-title":"Sci Rep"},{"issue":"22","key":"4666_CR52","doi-asserted-by":"publisher","first-page":"3817","DOI":"10.3390\/electronics11223817","volume":"11","author":"F Rustam","year":"2022","unstructured":"Rustam F, Mushtaq MF, Hamza A, Farooq MS, Jurcut AD, Ashraf I (2022) Denial of service attack classification using machine learning with multi-features. Electronics 11(22):3817","journal-title":"Electronics"},{"key":"4666_CR53","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jpdc.2022.10.001","volume":"172","author":"F Rustam","year":"2023","unstructured":"Rustam F, Ashraf I, Jurcut AD, Bashir AK, Zikria YB (2023) Malware detection using image representation of malware data and transfer learning. J Parallel Distrib Comput 172:32\u201350","journal-title":"J Parallel Distrib Comput"},{"issue":"1","key":"4666_CR54","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/TKDE.2013.34","volume":"26","author":"L Rutkowski","year":"2013","unstructured":"Rutkowski L, Jaworski M, Pietruczuk L, Duda P (2013) Decision trees for mining data streams based on the gaussian approximation. IEEE Trans Knowl Data Eng 26(1):108\u2013119","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4666_CR55","doi-asserted-by":"crossref","unstructured":"Sahar N, Mishra R, Kalam S (2021) Deep learning approach-based network intrusion detection system for fog-assisted iot. In: Proceedings of international conference on big data, machine learning and their applications, pp.\u00a039\u201350, Springer","DOI":"10.1007\/978-981-15-8377-3_4"},{"key":"4666_CR56","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comcom.2021.05.024","volume":"176","author":"AK Sahu","year":"2021","unstructured":"Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of things attack detection using hybrid deep learning model. Comput Commun 176:146\u2013154","journal-title":"Comput Commun"},{"key":"4666_CR57","doi-asserted-by":"crossref","unstructured":"Salam A (2020) Internet of things in water management and treatment. In: Internet of Things for Sustainable Community Development, pp.\u00a0273\u2013298, Springer","DOI":"10.1007\/978-3-030-35291-2_9"},{"key":"4666_CR58","doi-asserted-by":"publisher","first-page":"5320","DOI":"10.1007\/s11227-019-02945-z","volume":"76","author":"MM Salim","year":"2019","unstructured":"Salim MM, Rathore S, Park JH (2019) Distributed denial of service attacks and its defenses in iot: a survey\u2019\u2019. J Supercomput 76:5320","journal-title":"J Supercomput"},{"key":"4666_CR59","doi-asserted-by":"crossref","unstructured":"Sarwar A, Hasan S, Khan WU, Ahmed S, Marwat SNK (2022) Design of an advance intrusion detection system for iot networks. In: 2022 2nd International Conference on Artificial Intelligence (ICAI), pp.\u00a046\u201351, IEEE","DOI":"10.1109\/ICAI55435.2022.9773747"},{"key":"4666_CR60","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.knosys.2016.11.017","volume":"118","author":"B Seijo-Pardo","year":"2017","unstructured":"Seijo-Pardo B, Porto-D\u00edaz I, Bol\u00f3n-Canedo V, Alonso-Betanzos A (2017) Ensemble feature selection: homogeneous and heterogeneous approaches. Knowl-Based Syst 118:124\u2013139","journal-title":"Knowl-Based Syst"},{"key":"4666_CR61","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-30859-9_6","volume-title":"Internet of things, smart spaces, and next generation networks and systems","author":"R Shire","year":"2019","unstructured":"Shire R, Shiaeles S, Bendiab K, Ghita B, Kolokotronis N (2019) Malware squid: a novel iot malware traffic analysis framework using convolutional neural network and binary visualisation. Internet of things, smart spaces, and next generation networks and systems. Springer, Cham, pp 65\u201376"},{"issue":"14","key":"4666_CR62","doi-asserted-by":"publisher","first-page":"4833","DOI":"10.3390\/s21144833","volume":"21","author":"HUR Siddiqui","year":"2021","unstructured":"Siddiqui HUR, Saleem AA, Brown R, Bademci B, Lee E, Rustam F, Dudley S (2021) Non-invasive driver drowsiness detection system. Sensors 21(14):4833","journal-title":"Sensors"},{"key":"4666_CR63","doi-asserted-by":"crossref","unstructured":"Singh D, Tripathi G, Jara AJ (2014) A survey of internet-of-things: Future vision, architecture, challenges and services, in 2014 IEEE world forum on Internet of Things (WF-IoT), pp.\u00a0287\u2013292, IEEE,","DOI":"10.1109\/WF-IoT.2014.6803174"},{"issue":"16","key":"4666_CR64","doi-asserted-by":"publisher","first-page":"4372","DOI":"10.3390\/s20164372","volume":"20","author":"YN Soe","year":"2020","unstructured":"Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K (2020) Machine learning-based iot-botnet attack detection with sequential architecture. Sensors 20(16):4372","journal-title":"Sensors"},{"issue":"2","key":"4666_CR65","first-page":"130","volume":"27","author":"Y-Y Song","year":"2015","unstructured":"Song Y-Y, Ying L (2015) Decision tree methods: applications for classification and prediction. Shanghai Arch Psychiatry 27(2):130","journal-title":"Shanghai Arch Psychiatry"},{"key":"4666_CR66","doi-asserted-by":"crossref","unstructured":"Su J, Vasconcellos VD, Prasad S, Daniele S, Feng Y, Sakurai K (2018) Lightweight classification of iot malware based on image recognition. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol.\u00a02, pp.\u00a0664\u2013669, IEEE","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"4666_CR67","doi-asserted-by":"crossref","unstructured":"Syarif AR, Gata W (2017) Intrusion detection system using hybrid binary pso and k-nearest neighborhood algorithm. In: 2017 11th International Conference on Information & Communication Technology and System (ICTS), pp.\u00a0181\u2013186, IEEE","DOI":"10.1109\/ICTS.2017.8265667"},{"issue":"1","key":"4666_CR68","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11235-019-00599-z","volume":"73","author":"R Vishwakarma","year":"2020","unstructured":"Vishwakarma R, Jain AK (2020) A survey of ddos attacking techniques and defence mechanisms in the iot network. Telecommun Syst 73(1):3\u201325","journal-title":"Telecommun Syst"},{"key":"4666_CR69","volume-title":"The internet in everyday life","author":"B Wellman","year":"2008","unstructured":"Wellman B, Haythornthwaite C (2008) The internet in everyday life. John Wiley and Sons, Hoboken"},{"key":"4666_CR70","unstructured":"Woods V, Van\u00a0der Meulen R (2016) Gartner says worldwide lot security spending to reach \\$348 million in 2016, in Gartner, Stamford"},{"key":"4666_CR71","doi-asserted-by":"crossref","unstructured":"Yu T, Sekar V, Seshan S, Agarwal Y, Xu C (2015) Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks, pp.\u00a01\u20137","DOI":"10.1145\/2834050.2834095"},{"key":"4666_CR72","volume-title":"Abstract and applied analysis","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Zhang H, Cai J, Yang B (2014) A weighted voting classifier based on differential evolution. Abstract and applied analysis. Hindawi, London"},{"issue":"3","key":"4666_CR73","first-page":"1","volume":"8","author":"S Zhang","year":"2017","unstructured":"Zhang S, Li X, Zong M, Zhu X, Cheng D (2017) Learning k for knn classification. ACM Trans Intell Syst Technol (TIST) 8(3):1\u201319","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"4666_CR74","doi-asserted-by":"crossref","unstructured":"Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things. In: 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), pp.\u00a0836\u2013843, IEEE","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.141"},{"issue":"2","key":"4666_CR75","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/JIOT.2018.2847733","volume":"6","author":"W Zhou","year":"2018","unstructured":"Zhou W, Jia Y, Peng A, Zhang Y, Liu P (2018) The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J 6(2):1606\u20131616","journal-title":"IEEE Internet Things J"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04666-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-023-04666-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04666-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T04:10:23Z","timestamp":1729915823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-023-04666-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,14]]},"references-count":75,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["4666"],"URL":"https:\/\/doi.org\/10.1007\/s12652-023-04666-x","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,14]]},"assertion":[{"value":"26 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}