{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:03:37Z","timestamp":1766268217067,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,11]]},"DOI":"10.1109\/aipr57179.2022.10092209","type":"proceedings-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T19:01:19Z","timestamp":1681153279000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["IoT Anomaly Detection Using a Multitude of Machine Learning Algorithms"],"prefix":"10.1109","author":[{"given":"Maria","family":"Balega","sequence":"first","affiliation":[{"name":"Indiana University of Pennsylvania,Dept. of Math and Computer Science,Indiana,PA,U.S.A"}]},{"given":"Waleed","family":"Farag","sequence":"additional","affiliation":[{"name":"Indiana University of Pennsylvania,Dept. of Math and Computer Science,Indiana,PA,U.S.A"}]},{"given":"Soundararajan","family":"Ezekiel","sequence":"additional","affiliation":[{"name":"Indiana University of Pennsylvania,Dept. of Math and Computer Science,Indiana,PA,U.S.A"}]},{"given":"Xin-Wen","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Mary Washington,Dept. of Computer Science,Fredericksburg,VA,U.S.A"}]},{"given":"Alicia","family":"Deak","sequence":"additional","affiliation":[{"name":"Indiana University of Pennsylvania,Dept. of Math and Computer Science,Indiana,PA,U.S.A"}]},{"given":"Zaryn","family":"Good","sequence":"additional","affiliation":[{"name":"Indiana University of Pennsylvania,Dept. of Math and Computer Science,Indiana,PA,U.S.A"}]}],"member":"263","reference":[{"article-title":"Global iot and non-iot connections 2010-2025","year":"2021","author":"Vailshery","key":"ref1"},{"article-title":"Interview with kevin ashton - inventor of iot: Is driven by the users","year":"2018","author":"Cole","key":"ref2"},{"article-title":"What are iot devices? -definition from techtarget.com","year":"2022","author":"Posey","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958185"},{"article-title":"Iot-23: A labeled dataset with malicious and benign iot network traffic (version 1.0.0)","year":"2020","author":"Garcia","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906930"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC48915.2020.9155761"},{"issue":"9","key":"ref10","article-title":"Edge machine learning for ai-enabled iot devices: A review","volume-title":"Sensors","volume":"20","author":"Merenda","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s22010140"},{"article-title":"Machine learning for anomaly detection in iot networks : Malware analysis on the iot-23 data set","year":"2020","author":"Stoian","key":"ref12"},{"year":"2020","key":"ref13","article-title":"What is machine learning?"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"issue":"4","key":"ref15","article-title":"A machine-learning-based prediction method for hypertension outcomes based on medical data","volume-title":"Diagnostics","volume":"9","author":"Chang","year":"2019"},{"volume-title":"Xgboost documentation","year":"2021","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/0-387-34239-7","volume-title":"Estimation of Dependences Based on Empirical Data","author":"Vapnik","year":"2006"},{"issue":"2.5","key":"ref19","first-page":"3","article-title":"Tutorial on support vector machine (svm)","volume":"37","author":"Jakkula","year":"2006","journal-title":"School of EECS, Washington State University"},{"article-title":"Support vector machines(svm) \u2014 an overview","year":"2018","author":"Pupale","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2019.9.6.872"},{"year":"2022","key":"ref22","article-title":"Deep Convolutional Neural Networks"},{"author":"Bilogur","key":"ref23","article-title":"Full batch, mini-batch, and online learning"},{"year":"2022","key":"ref24","article-title":"Options for training deep learning neural network"},{"article-title":"The 3 most important composite classification metrics","year":"2020","author":"Hale","key":"ref25"},{"year":"2022","key":"ref26","article-title":"Root mean square error (rmse)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"}],"event":{"name":"2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","start":{"date-parts":[[2022,10,11]]},"location":"DC, USA","end":{"date-parts":[[2022,10,13]]}},"container-title":["2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10091955\/10092198\/10092209.pdf?arnumber=10092209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T07:34:00Z","timestamp":1710401640000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10092209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/aipr57179.2022.10092209","relation":{},"subject":[],"published":{"date-parts":[[2022,10,11]]}}}