{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:28:17Z","timestamp":1774466897805,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Project (PACTE-PISTE) to Fight Terrorism in Tunisia"},{"name":"design a reliable surveillance system for the monitoring of hostile environments for the Tunisian Army"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3056149","type":"journal-article","created":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T06:25:48Z","timestamp":1612247148000},"page":"24168-24186","source":"Crossref","is-referenced-by-count":49,"title":["READ-IoT: Reliable Event and Anomaly Detection Framework for the Internet of Things"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1721-4510","authenticated-orcid":false,"given":"Aymen","family":"Yahyaoui","sequence":"first","affiliation":[]},{"given":"Takoua","family":"Abdellatif","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9756-642X","authenticated-orcid":false,"given":"Sami","family":"Yangui","sequence":"additional","affiliation":[]},{"given":"Rabah","family":"Attia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761385"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2018.10.003"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8618-3_52"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2018.00019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2019.8927065"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2949629"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2017.8071998"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.108"},{"key":"ref30","first-page":"139","article-title":"A survey on reputation and trust management in wireless sensor networks","volume":"1","author":"srivastava","year":"2012","journal-title":"International Journal of Research in Engineering Science & Technology"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403743"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"2938","DOI":"10.3390\/s18092938","article-title":"A capillary computing architecture for dynamic Internet of Things: Orchestration of microservices from edge devices to fog and cloud providers","volume":"18","author":"taherizadeh","year":"2018","journal-title":"SENSORS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919514"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"2980","DOI":"10.3390\/s19132980","article-title":"Enabling the orchestration of IoT slices through edge and cloud microservice platforms","volume":"19","author":"fernandez","year":"2019","journal-title":"SENSORS"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICOS.2015.7377291"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIE.2010.5559708"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00285"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.05.076"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.11.001"},{"key":"ref64","first-page":"2502","article-title":"The beta reputation system","author":"j\u00f8sang","year":"2002","journal-title":"Proc 15th Bled Electron Commerce Conf"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/167575"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2018.8364074"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMET.2019.8673423"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7763\/IJFCC.2013.V2.164"},{"key":"ref67","year":"2020","journal-title":"NSL-KDD data"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3395352.3402621"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.2174\/1872212112666180402122150"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/IJHIoT.2018070104"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771153"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.10"},{"key":"ref21","author":"gold-bernstein","year":"2004","journal-title":"Enterprise Integration The Essential Guide to Integration Solutions"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICRMS.2014.7107261"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-019-00811-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2002.1173214"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060413000152"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.006"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11821-1_16"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1088\/0967-1846\/3\/3\/004"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2018.8364046"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2017.68"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2240299"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.006"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766574"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2018.00044"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2674661"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2701","DOI":"10.3390\/s20092701","article-title":"A panorama of cloud platforms for IoT applications across industries","volume":"20","author":"yangui","year":"2020","journal-title":"SENSORS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941978"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2016.7548853"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2020.1784611"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.03.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.40"},{"key":"ref19","first-page":"1","article-title":"Cloud-based computation offloading for mobile devices: State of the art","author":"jiao","year":"2013","journal-title":"Proc Future Netw Mobile Summit"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2013.06.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2704100"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"868","DOI":"10.3390\/s16060868","article-title":"A comparative study of anomaly detection techniques for smart city wireless sensor networks","volume":"16","author":"garcia-font","year":"2016","journal-title":"SENSORS"},{"key":"ref8","article-title":"Machine learning methods for better water quality prediction","volume":"578","author":"ahmed","year":"2019","journal-title":"J Hydrol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107119"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7509392"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2709942"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5220\/0006670100520062"},{"key":"ref48","first-page":"34","article-title":"An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach","volume":"10","author":"hosseinpour","year":"2016","journal-title":"Int J Digit Content Technol Appl"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.3390\/s19091977","article-title":"Towards deep-learning-driven intrusion detection for the Internet of Things","volume":"19","author":"thamilarasu","year":"2019","journal-title":"SENSORS"},{"key":"ref42","article-title":"Event and anomaly detection using tucker3 decomposition","author":"fanaee-t","year":"2014","journal-title":"arXiv 1406 3266"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2016.7548876"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845461"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2397316"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09343860.pdf?arnumber=9343860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T12:09:46Z","timestamp":1643285386000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9343860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3056149","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}