{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:27:41Z","timestamp":1775665661259,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006156","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T06:05:34Z","timestamp":1582610734000},"page":"5249-5258","source":"Crossref","is-referenced-by-count":34,"title":["Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach"],"prefix":"10.1109","author":[{"given":"Ramesh","family":"Paudel","sequence":"first","affiliation":[]},{"given":"Timothy","family":"Muncy","sequence":"additional","affiliation":[]},{"given":"William","family":"Eberle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"2712","article-title":"Robust random cut forest based anomaly detection on streams","author":"guha","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.42"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213560"},{"key":"ref34","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref10","author":"wei","year":"2018","journal-title":"Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939783"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","article-title":"A survey of intrusion detection in internet of things","volume":"84","author":"zarpelao","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906930"},{"key":"ref17","article-title":"Classifying iot devices in smart environments using network traffic characteristics","author":"sivanathan","year":"2018","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406118"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339670"},{"key":"ref28","first-page":"355","article-title":"Random-walk computation of similarities between nodes of a graph with application to collaborative recommendation","author":"pirotte","year":"2007","journal-title":"IEEE Transactions on Knowledge & Data Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2560919"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098264"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2006.44"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref8","article-title":"Iot security techniques based on machine learning","author":"xiao","year":"2018","journal-title":"arXiv preprint arXiv 1801 00257"},{"key":"ref7","year":"2014","journal-title":"Proofpoint Uncovers Internet of Things (IoT) Cyberattack"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983271"},{"key":"ref9","author":"khandelwal","year":"2016","journal-title":"Friday&#x2019;s Massive DDoS Attack Came from Just 100 000 Hacked IoT Devices"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314352"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213013600130"},{"key":"ref22","first-page":"38","article-title":"Detecting the onset of a network layer dos attack with a graph-based approach","author":"paudel","year":"2019","journal-title":"FLAIRS Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2007-11606"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.20"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220040"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref25","first-page":"21","article-title":"On the resemblance and containment of documents","author":"broder","year":"1997","journal-title":"Proceedings Compression and Complexity of SEQUENCES 1997 (Cat No 97TB100171)"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2019,12,9]]},"end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006156.pdf?arnumber=9006156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:53:06Z","timestamp":1658094786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006156","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}