{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T07:59:26Z","timestamp":1769155166690,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/acit47987.2019.8991097","type":"proceedings-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T04:38:32Z","timestamp":1581655112000},"page":"252-254","source":"Crossref","is-referenced-by-count":33,"title":["IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS"],"prefix":"10.1109","author":[{"given":"Mohammad M.","family":"Shurman","sequence":"first","affiliation":[{"name":"Jordan Univ. of Science and Technology,Network Engineering and Security Dept.,Irbid,Jordan"}]},{"given":"Rami M.","family":"Khrais","sequence":"additional","affiliation":[{"name":"Jordan Univ. of Science and Technology,Network Engineering and Security Dept.,Irbid,Jordan"}]},{"given":"Abdulrahman A.","family":"Yateem","sequence":"additional","affiliation":[{"name":"Jordan Univ. of Science and Technology,Computer Engineering Department,Irbid,Jordan"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2014.02.08"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1364\/OPN.28.9.000026"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-94"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2013.6751036"},{"key":"ref14","article-title":"Hybrid Intrusion Detection System","author":"zekrifa","year":"2014","journal-title":"Master thesis"},{"key":"ref15","article-title":"A survey on anomaly and signature based intrusion detection system (IDS)","volume":"4","author":"gangwar","year":"2014","journal-title":"Int Journal of Engineering Research and Applications"},{"key":"ref4","article-title":"A Signature-based Intrusion Detection System for the Internet of Things","author":"ioulianou","year":"2018","journal-title":"Communications and information technology Forum"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.12.001"},{"key":"ref6","author":"dabbagh","year":"2019","journal-title":"Internet of things security and privacy Internet of Things from Hype to Reality"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICETECH.2016.7569352"},{"key":"ref8","author":"dalati","year":"2017","journal-title":"Towards More Enterprise Security for IoT"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.9790\/0661-180405117121"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2015.7375704"},{"key":"ref1","article-title":"Anomaly intrusion detection design using hybrid of unsupervised and supervised neural network","volume":"1","author":"bahrololum","year":"2009","journal-title":"International Journal of Computer Networks & Communications (IJCNC)"},{"key":"ref9","article-title":"Towards IoT-DDOS Prevention using Edge Computing","author":"bhardwaj","year":"2018","journal-title":"Proceedings of USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18)"}],"event":{"name":"2019 International Arab Conference on Information Technology (ACIT)","location":"Al Ain, United Arab Emirates","start":{"date-parts":[[2019,12,3]]},"end":{"date-parts":[[2019,12,5]]}},"container-title":["2019 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8976374\/8990967\/08991097.pdf?arnumber=8991097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:25:33Z","timestamp":1756754733000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8991097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/acit47987.2019.8991097","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}