{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:12:53Z","timestamp":1761808373050,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/aiccsa47632.2019.9035319","type":"proceedings-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T03:08:51Z","timestamp":1584414531000},"page":"1-8","source":"Crossref","is-referenced-by-count":20,"title":["Cluster-Based Intrusion Detection Method for Internet of Things"],"prefix":"10.1109","author":[{"given":"Sarika","family":"Choudhary","sequence":"first","affiliation":[]},{"given":"Nishtha","family":"Kesswani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2014.57"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/info7020025"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.12.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2019010107"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055252"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/167575"},{"key":"ref19","article-title":"A multi-dimensional approach towards intrusion detection system","author":"thakur","year":"2012","journal-title":"ArXiv Preprint"},{"key":"ref4","article-title":"Transmission of ipv6 packets over ieee 802.15. 4 networks","author":"montenegro","year":"2007","journal-title":"Tech Rep"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4919"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982146"},{"key":"ref5","article-title":"Rfc 7252: The constrained application protocol (coap)","author":"shelby","year":"2014","journal-title":"Internet Engineering Task Force"},{"journal-title":"Lightweight security solutions for the Internet Of Things","year":"2013","author":"raza","key":"ref8"},{"journal-title":"Security Considerations in the IP-based Internet of Things","year":"2013","author":"garcia-morchon","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.01.012"},{"key":"ref1","first-page":"97","article-title":"That &#x2018;internet of things' thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref20","article-title":"Survey of security and privacy issues of internet of things","author":"borgohain","year":"2015","journal-title":"ArXiv Preprint"},{"journal-title":"Z-Buffer Rendering from CSG The Trickle Algorithm","year":"1989","author":"division","key":"ref22"},{"key":"ref21","article-title":"A survey on detection of sinkhole attack in wireless sensor network","author":"kibirige","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00219"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2014.6934253"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2016.7881893"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-1766-z"}],"event":{"name":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2019,11,3]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006726\/9035208\/09035319.pdf?arnumber=9035319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:49:38Z","timestamp":1658155778000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/aiccsa47632.2019.9035319","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}