{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:19:44Z","timestamp":1771611584038,"version":"3.50.1"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Culture, Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture, Sports and Tourism in 202"},{"name":"Strategic Networking and Development Program funded by the Ministry of Science and ICT through the National Research Foundation of Korea","award":["RS-2023-00277267"],"award-info":[{"award-number":["RS-2023-00277267"]}]},{"DOI":"10.13039\/501100002383","name":"King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Project number","doi-asserted-by":"publisher","award":["RSP2024R184"],"award-info":[{"award-number":["RSP2024R184"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3413600","type":"journal-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T17:46:47Z","timestamp":1718214407000},"page":"116609-116621","source":"Crossref","is-referenced-by-count":12,"title":["Enhancing IoT Security With Trust Management Using Ensemble XGBoost and AdaBoost Techniques"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0038-3772","authenticated-orcid":false,"given":"Kamran Ahmad","family":"Awan","sequence":"first","affiliation":[{"name":"Department of Information Technology, The University of Haripur, Haripur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8896-547X","authenticated-orcid":false,"given":"Ikram Ud","family":"Din","sequence":"additional","affiliation":[{"name":"Department of Information Technology, The University of Haripur, Haripur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8253-9709","authenticated-orcid":false,"given":"Ahmad","family":"Almogren","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9824-1950","authenticated-orcid":false,"given":"Byung-Seo","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Software and Communications Engineering, Hongik University, Sejong, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence, Abu Dhabi, United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3361801"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-022-01937-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100721"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3248970"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3372518"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3377550"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.07.259"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3237893"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3326356"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/iot4010002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2021.1962677"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3270620"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3327327"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.011.2200547"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3236983"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3280465"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3260256"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12091"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221203"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00585-w"},{"key":"ref22","article-title":"Behaviour-based trust assessment in the Internet of Things systems using multi-classifier ensemble learning and Dempster\u2013Shafer fusion","author":"Aaqib","year":"2023","journal-title":"Available SSRN"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105670"},{"key":"ref24","volume-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic","author":"Garcia","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.07.026"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15035-8_108"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICBAIE52039.2021.9389997"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10555251.pdf?arnumber=10555251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T10:27:31Z","timestamp":1725013651000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10555251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3413600","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}