{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:44:23Z","timestamp":1778150663935,"version":"3.51.4"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3325929","type":"journal-article","created":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T14:16:54Z","timestamp":1697725014000},"page":"119462-119480","source":"Crossref","is-referenced-by-count":53,"title":["IoT Network Anomaly Detection in Smart Homes Using Machine Learning"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8681-6382","authenticated-orcid":false,"given":"Nadeem","family":"Sarwar","sequence":"first","affiliation":[{"name":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5161-6441","authenticated-orcid":false,"given":"Imran Sarwar","family":"Bajwa","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6071-1029","authenticated-orcid":false,"given":"Muhammad Zunnurain","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University Lahore Campus, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5088-9571","authenticated-orcid":false,"given":"Muhammad","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"given":"Khizra","family":"Saleem","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3116612"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0043"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1386"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICICA.2014.73"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE52839.2021.00007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/sym12010088"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"hossin","year":"2015","journal-title":"International Journal of Data Mining &amp; Knowledge Management Process"},{"key":"ref31","first-page":"30","article-title":"Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques","author":"koroniotis","year":"2017","journal-title":"Proc Int Conf Mobile Netw Manag"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"ref33","volume":"2","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction"},{"key":"ref10","author":"steinberg","year":"2014","journal-title":"These Devices May Be Spying On You (Even In Your Own Home)"},{"key":"ref32","first-page":"72","article-title":"All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection","author":"pahl","year":"2018","journal-title":"Proc 14th Int Conf Netw Service Manag (CNSM)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CBI.2017.8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/app13095427"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8882378"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/s19091977"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700067"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2942271"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.195"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8845833"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966066"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref20","first-page":"59","article-title":"AntibIoTic: Protecting IoT devices against DDoS attacks","author":"donno","year":"2016","journal-title":"Proc Int Conf Softw Eng Defence Appl"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106432"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9122152"},{"key":"ref22","author":"albasir","year":"2020","journal-title":"Detection of anomalous behavior of IoT\/CPS devices using their power signals"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.11.007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-019-00338-7"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3188311"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2017.8316459"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2011.05.012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISMSIT50672.2020.9254703"},{"key":"ref8","author":"ali","year":"2016","journal-title":"Internet of Things based smart homes Security risk assessment and recommendations"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990529"},{"key":"ref9","first-page":"127","article-title":"Research on data mining models for the Internet of Things","author":"bin","year":"2010","journal-title":"Proc Int Conf Image Anal Process"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2013.08.043"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/app12105015"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10287977.pdf?arnumber=10287977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T18:40:57Z","timestamp":1754678457000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10287977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3325929","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}