{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T20:45:20Z","timestamp":1773866720915,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UID\/CEC\/04524\/2019"],"award-info":[{"award-number":["UID\/CEC\/04524\/2019"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10586-021-03238-y","type":"journal-article","created":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T11:02:56Z","timestamp":1613041376000},"page":"37-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A flow-based intrusion detection framework for internet of things networks"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6883-7996","authenticated-orcid":false,"given":"Leonel","family":"Santos","sequence":"first","affiliation":[]},{"given":"Ramiro","family":"Gon\u00e7alves","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Rabad\u00e3o","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Martins","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,10]]},"reference":[{"key":"3238_CR1","doi-asserted-by":"crossref","unstructured":"Santos, L., Rabad\u00e3o, C., Gon\u00e7alves, R.: Flow monitoring system for IoT networks. In: Rocha, \u00c1., Adeli, H., Reis, L., Costanzo, S. (eds.) WorldCIST'19 - 7th World Conference on Information Systems and Technologies, Galicia, Spain 2019. Advances in intelligent systems and computing, New Knowledge in information systems and technologies, pp. 420\u2013430. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-16184-2_40"},{"key":"3238_CR2","unstructured":"Bradley, J., Barbier, J., Handler, D.: Embracing the Internet of everything to capture your share of $14.4 trillion. White Paper, Cisco (2013)"},{"issue":"4","key":"3238_CR3","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The Internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"issue":"15","key":"3238_CR4","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"3238_CR5","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.future.2018.01.059","volume":"83","author":"K Sha","year":"2018","unstructured":"Sha, K., Wei, W., Yang, T., Wang, Z., Shi, W.: On security challenges and open issues in Internet of things. Future Gener. Comput. Syst. 83, 326\u2013337 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"8","key":"3238_CR6","doi-asserted-by":"publisher","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","volume":"11","author":"T Kothmayr","year":"2013","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Br\u00fcnig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of things. Ad Hoc Netw. 11(8), 2710\u20132723 (2013). https:\/\/doi.org\/10.1016\/j.adhoc.2013.05.003","journal-title":"Ad Hoc Netw."},{"issue":"8","key":"3238_CR7","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"issue":"12","key":"3238_CR8","doi-asserted-by":"publisher","first-page":"2654","DOI":"10.1002\/sec.406","volume":"7","author":"S Raza","year":"2014","unstructured":"Raza, S., Duquennoy, S., H\u00f6glund, J., Roedig, U., Voigt, T.: Secure communication for the Internet of things\u2014a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Netw. 7(12), 2654\u20132668 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"3238_CR9","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal, J., Monteiro, E., Silva, J.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294\u20131312 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3238_CR10","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"M Khan","year":"2018","unstructured":"Khan, M., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3238_CR11","doi-asserted-by":"publisher","first-page":"102080","DOI":"10.1016\/j.scs.2020.102080","volume":"56","author":"I AlRidhawi","year":"2020","unstructured":"AlRidhawi, I., Otoum, S., Aloqaily, M., Jararweh, Y., Baker, T.: Providing secure and reliable communication for next generation networks in smart cities. Sustain. Cities Soc. 56, 102080 (2020)","journal-title":"Sustain. Cities Soc."},{"key":"3238_CR12","doi-asserted-by":"crossref","unstructured":"Otoum, S., Kantarci, B., Mouftah, H.: Empowering reinforcement learning on big sensed data for intrusion detection. In Icc 2019\u20132019 IEEE international conference on communications (ICC). IEEE, 2019","DOI":"10.1109\/ICC.2019.8761575"},{"key":"3238_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"B Zarpelao","year":"2017","unstructured":"Zarpelao, B., Miani, R., Kawakani, C., de Alvarenga, S.: A survey of intrusion detection in Internet of things. J. Netw. Comput. Appl. 84, 25\u201337 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"3238_CR14","doi-asserted-by":"crossref","unstructured":"Santos, L., Rabadao, C., Gon\u00e7alves, R.: Intrusion detection systems in Internet of things: a literature review. In: 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, Spain, pp. 1\u20137. IEEE, 2018","DOI":"10.23919\/CISTI.2018.8399291"},{"key":"3238_CR15","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.comnet.2019.05.014","volume":"160","author":"S Hajiheidari","year":"2019","unstructured":"Hajiheidari, S., Wakil, K., Badri, M., Navimipour, N.J.: Intrusion detection systems in the Internet of things: a comprehensive investigation. Comput. Netw. 160, 165\u2013191 (2019)","journal-title":"Comput. Netw."},{"key":"3238_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"F Alaba","year":"2017","unstructured":"Alaba, F., Othman, M., Hashem, I., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10\u201328 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"3238_CR17","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3238_CR18","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., De Donato, W., Persico, V., Pescap\u00e9, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684\u2013700 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"7","key":"3238_CR19","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497\u20131516 (2012)","journal-title":"Ad Hoc Netw."},{"key":"3238_CR20","first-page":"161","volume-title":"The future internet assembly, Dublin, Ireland 2013. Lecture notes in computer science","author":"S Ziegler","year":"2013","unstructured":"Ziegler, S., Crettaz, C., Ladid, L., Krco, S., Pokric, B., Skarmeta, A., Jara, A., Kastner, W., Jung, M.: Iot6\u2013moving to an ipv6-based future iot. In: Alex, G., Anastasius, G. (eds.) The future internet assembly, Dublin, Ireland 2013. Lecture notes in computer science, pp. 161\u2013172. Springer, Berlin, Heidelberg (2013)"},{"key":"3238_CR21","doi-asserted-by":"crossref","unstructured":"Khan, R., Khan, S., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th international conference on frontiers of information technology, Islamabad, Pakistan, pp. 257\u2013260. IEEE, 2012","DOI":"10.1109\/FIT.2012.53"},{"key":"3238_CR22","unstructured":"Yang, Z., Yue, Y., Yang, Y., Peng, Y., Wang, X., Liu, W.: Study and application on the architecture and key technologies for IOT. In: 2011 International Conference on Multimedia Technology, Hangzhou, China, pp. 747\u2013751. IEEE, 2011"},{"issue":"5","key":"3238_CR23","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125\u20131142 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3238_CR24","doi-asserted-by":"crossref","unstructured":"Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), pp. 1\u20135. IEEE, 2014","DOI":"10.1109\/EMTC.2014.6996632"},{"key":"3238_CR25","doi-asserted-by":"crossref","unstructured":"Zegzhda, D., Stepanova, T.: Achieving Internet of things security via providing topological sustainability. In: 2015 Science and Information Conference (SAI), pp. 269\u2013276. IEEE, 2015","DOI":"10.1109\/SAI.2015.7237154"},{"issue":"7","key":"3238_CR26","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOM.2016.7514162","volume":"54","author":"A Meddeb","year":"2016","unstructured":"Meddeb, A.: Internet of things standards: who stands out from the crowd? IEEE Commun. Mag. 54(7), 40\u201347 (2016)","journal-title":"IEEE Commun. Mag."},{"issue":"7","key":"3238_CR27","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"issue":"11","key":"3238_CR28","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MCOM.2011.6069710","volume":"49","author":"A Gluhak","year":"2011","unstructured":"Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N., Razafindralambo, T.: A survey on facilities for experimental internet of things research. IEEE Commun. Mag. 49(11), 58\u201367 (2011)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"3238_CR29","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., McCann, J., Leung, K.: A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel. Commun. 20(6), 91\u201398 (2013)","journal-title":"IEEE Wirel. Commun."},{"issue":"1","key":"3238_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/JIOT.2014.2312291","volume":"1","author":"J Stankovic","year":"2014","unstructured":"Stankovic, J.: Research directions for the internet of things. IEEE Internet Things J. 1(1), 3\u20139 (2014). https:\/\/doi.org\/10.1109\/JIOT.2014.2312291","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"3238_CR31","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/JIOT.2014.2337336","volume":"1","author":"S Chen","year":"2014","unstructured":"Chen, S., Xu, H., Liu, D., Hu, B., Wang, H.: A vision of IoT: applications, challenges, and opportunities with china perspective. IEEE Internet Things J. 1(4), 349\u2013359 (2014)","journal-title":"IEEE Internet Things J."},{"key":"3238_CR32","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.comnet.2014.03.007","volume":"65","author":"S Lee","year":"2014","unstructured":"Lee, S., Levanti, K., Kim, H.: Network monitoring: present and future. Comput. Netw. 65, 84\u201398 (2014)","journal-title":"Comput. Netw."},{"key":"3238_CR33","doi-asserted-by":"crossref","unstructured":"Velan, P.: Improving network flow definition: formalization and applicability. In: NOMS 2018\u20132018 IEEE\/IFIP Network Operations and Management Symposium, Taipei, Taiwan, pp. 1\u20135. IEEE, 2018","DOI":"10.1109\/NOMS.2018.8406203"},{"key":"3238_CR34","doi-asserted-by":"crossref","unstructured":"Claise, B., Trammell, B., Aitken, P.: Specification of the IP flow information export (IPFIX) protocol for the exchange of flow information. In: RFC 7011 (INTERNET STANDARD), Internet Engineering Task Force. (2013)","DOI":"10.17487\/rfc7015"},{"issue":"3","key":"3238_CR35","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An overview of IP flow-based intrusion detection. IEEE Commun. Surv. Tutor. 12(3), 343\u2013356 (2010)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"3238_CR36","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/COMST.2014.2321898","volume":"16","author":"R Hofstede","year":"2014","unstructured":"Hofstede, R., \u010celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., Pras, A.: Flow monitoring explained: from packet capture to data analysis with netflow and ipfix. IEEE Commun. Surv. Tutor. 16(4), 2037\u20132064 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3238_CR37","doi-asserted-by":"crossref","unstructured":"Zseby, T., Boschi, E., Brownlee, N., Claise, B.: IP flow information export (IPFIX) applicability. In, vol. RFC 5472. Internet Engineering Task Force (IETF), (2009)","DOI":"10.17487\/rfc5472"},{"issue":"2","key":"3238_CR38","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.jnca.2012.12.020","volume":"36","author":"B Li","year":"2013","unstructured":"Li, B., Springer, J., Bebis, G., Gunes, M.: A survey of network flow applications. J. Netw. Comput. Appl. 36(2), 567\u2013581 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"3238_CR39","first-page":"163","volume-title":"National information systems security 95","author":"L Halme","year":"1996","unstructured":"Halme, L., Bauer, R.: Aint misbehaving - A taxomony of anti-intrusion techniques. In: Wakid, S., Davis, J. (eds.) National information systems security 95, pp. 163\u2013172. DIANE Publishing, Baltimore, EUA (1996)"},{"issue":"11","key":"3238_CR40","first-page":"25","volume":"24","author":"T AbuHmed","year":"2008","unstructured":"AbuHmed, T., Mohaisen, A., Nyang, D.: A survey on deep packet inspection for intrusion detection systems. Magazine Korea Telecommun. Soc. 24(11), 25\u201336 (2008)","journal-title":"Magazine Korea Telecommun. Soc."},{"key":"3238_CR41","doi-asserted-by":"crossref","unstructured":"Hus\u00e1k, M., Velan, P., Vykopal, J.: Security monitoring of http traffic using extended flows. In: 2015 10th International Conference on Availability, Reliability and Security, Toulose, France, pp. 258\u2013265. IEEE, 2015","DOI":"10.1109\/ARES.2015.42"},{"issue":"1","key":"3238_CR42","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H Liao","year":"2013","unstructured":"Liao, H., Lin, C., Lin, Y., Tung, K.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"3238_CR43","unstructured":"Koch, R.: Towards next-generation intrusion detection. In: 2011 3rd International Conference on Cyber Conflict, Tallinn, Estonia, pp. 1\u201318. IEEE, 2011"},{"key":"3238_CR44","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques systems and challenges. Comput. Secur. 28, 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"3238_CR45","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.cose.2017.05.009","volume":"70","author":"M Umer","year":"2017","unstructured":"Umer, M., Sher, M., Bi, Y.: Flow-based intrusion detection: techniques and challenges. Comput. Secur. 70, 238\u2013254 (2017)","journal-title":"Comput. Secur."},{"issue":"2","key":"3238_CR46","doi-asserted-by":"publisher","first-page":"601","DOI":"10.2298\/CSIS130415035A","volume":"11","author":"Y Abuadlla","year":"2014","unstructured":"Abuadlla, Y., Kvascev, G., Gajin, S., Jovanovic, Z.: Flow-based anomaly intrusion detection system using two neural network stages. Comput. Sci. Inf. Syst. 11(2), 601\u2013622 (2014)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"3238_CR47","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.ins.2014.09.025","volume":"294","author":"K Costa","year":"2015","unstructured":"Costa, K., Pereira, L., Nakamura, R., Pereira, C., Papa, J., Falc\u00e3o, A.: A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks. Inf. Sci. 294, 95\u2013108 (2015)","journal-title":"Inf. Sci."},{"key":"3238_CR48","first-page":"31","volume":"21","author":"A Satoh","year":"2015","unstructured":"Satoh, A., Nakamura, Y., Ikenaga, T.: A flow-based detection method for stealthy dictionary attacks against secure shell. J. Inf. Secur. Appl. 21, 31\u201341 (2015)","journal-title":"J. Inf. Secur. Appl."},{"key":"3238_CR49","doi-asserted-by":"crossref","unstructured":"Liu, C., Yang, J., Chen, R., Zhang, Y., Zeng, J.: Research on immunity-based intrusion detection technology for the internet of things. In: 2011 Seventh International Conference on Natural Computation, Shanghai, China, pp. 212\u2013216. IEEE, 2011","DOI":"10.1109\/ICNC.2011.6022060"},{"key":"3238_CR50","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., Spirito, M.: An IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC conference on Computer and communications security, Berlin, Germany, pp. 1337\u20131340. ACM, 2013","DOI":"10.1145\/2508859.2512494"},{"key":"3238_CR51","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M., Vinkovits, M.: Denial-of-service detection in 6LoWPAN based Internet of things. In: 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob), Lyon, France, pp. 600\u2013607. IEEE, 2013","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"3238_CR52","doi-asserted-by":"crossref","unstructured":"Shreenivas, D., Raza, S., Voigt, T.: Intrusion detection in the RPL-connected 6LoWPAN networks. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, Abu Dhabi, United Arab Emirates, pp. 31\u201338. ACM, 2017","DOI":"10.1145\/3055245.3055252"},{"key":"3238_CR53","doi-asserted-by":"crossref","unstructured":"Jun, C., Chi, C.: Design of complex event-processing IDS in internet of things. In: 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation, Zhangjiajie, China, pp. 226\u2013229. IEEE, 2014","DOI":"10.1109\/ICMTMA.2014.57"},{"issue":"9","key":"3238_CR54","first-page":"1","volume":"121","author":"P Pongle","year":"2015","unstructured":"Pongle, P., Chavan, G.: Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121(9), 1\u20139 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"3238_CR55","doi-asserted-by":"crossref","unstructured":"Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis\u2014A system for knowledge-driven adaptable intrusion detection for the Internet of things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 656\u2013666. IEEE, 2017","DOI":"10.1109\/ICDCS.2017.104"},{"key":"3238_CR56","doi-asserted-by":"publisher","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019)","journal-title":"Ad Hoc Netw."},{"key":"3238_CR57","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for Internet of things. Future Gener. Comput. Syst. 82, 761\u2013768 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"3238_CR58","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/JIOT.2018.2883344","volume":"6","author":"J Li","year":"2018","unstructured":"Li, J., Zhao, Z., Li, R., Zhang, H.: Ai-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J. 6(2), 2093\u20132102 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"3238_CR59","doi-asserted-by":"publisher","first-page":"9889","DOI":"10.1007\/s10586-018-1847-2","volume":"22","author":"L Deng","year":"2019","unstructured":"Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 22(4), 9889\u20139904 (2019)","journal-title":"Clust. Comput."},{"key":"3238_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-017-1105-z","volume":"22","author":"M Gajewski","year":"2019","unstructured":"Gajewski, M., Batalla, J.M., Mastorakis, G., Mavromoustakis, C.X.: A distributed IDS architecture model for smart home systems. Clust. Comput. 22, 1\u201311 (2019)","journal-title":"Clust. Comput."},{"key":"3238_CR61","first-page":"314","volume":"02","author":"HH Pajouh","year":"2019","unstructured":"Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Ann. Hist. Comput. 02, 314\u2013323 (2019)","journal-title":"IEEE Ann. Hist. Comput."},{"key":"3238_CR62","first-page":"1","volume":"1","author":"AJ Siddiqui","year":"2020","unstructured":"Siddiqui, A.J., Boukerche, A.: TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of things. Clust. Comput. 1, 1\u201319 (2020)","journal-title":"Clust. Comput."},{"issue":"8","key":"3238_CR63","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari, M., Janjua, Z.H., Vecchio, M., Antonelli, F.: Passban IDS: an intelligent anomaly based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7(8), 6882\u20136897 (2020)","journal-title":"IEEE Internet Things J."},{"key":"3238_CR64","unstructured":"Santos, L., Gon\u00e7alves, R., Rabad\u00e3o, C.: A novel intrusion detection system architecture for internet of things networks. In: ECCWS 2019 18th European Conference on Cyber Warfare and Security, Coimbra, Portugal, p. 428. Academic Conferences and publishing limited, 2019"},{"key":"3238_CR65","doi-asserted-by":"crossref","unstructured":"Canuto, L., Santos, L., Vieira, L., Gon\u00e7alves, R., Rabad\u00e3o, C.: CoAP flow signatures for the internet of things. In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019","DOI":"10.23919\/CISTI.2019.8760759"},{"key":"3238_CR66","doi-asserted-by":"crossref","unstructured":"Leal, R., Santos, L., Vieira, L., Gon\u00e7alves, R., Rabad\u00e3o, C.: MQTT flow signatures for the Internet of things. In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019","DOI":"10.23919\/CISTI.2019.8760849"},{"key":"3238_CR67","doi-asserted-by":"crossref","unstructured":"Vieira, L., Santos, L., Gon\u00e7alves, R., Rabad\u00e3o, C.: Identifying attack signatures for the internet of things: an IP flow based approach. In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019.","DOI":"10.23919\/CISTI.2019.8760650"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03238-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03238-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03238-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T14:12:22Z","timestamp":1677507142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03238-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,10]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["3238"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03238-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,10]]},"assertion":[{"value":"28 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}