{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:01:36Z","timestamp":1774022496546,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,17]]},"DOI":"10.1109\/bigdata55660.2022.10020355","type":"proceedings-article","created":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T14:35:23Z","timestamp":1674743723000},"page":"6332-6336","source":"Crossref","is-referenced-by-count":15,"title":["Botnet Attack Intrusion Detection In IoT Enabled Automated Guided Vehicles"],"prefix":"10.1109","author":[{"given":"Sumaiya","family":"Shaikh","sequence":"first","affiliation":[{"name":"Lords Institute of Engineering and Technology,Department of CSE,Hyderabad,India"}]},{"given":"Ch.","family":"Rupa","sequence":"additional","affiliation":[{"name":"VR Siddhartha Engineering College,Department of CSE,Vijayawada,India"}]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Brandon University,Department of Math and Computer Science,Canada"}]},{"given":"Thippa","family":"Reddy Gadekallu","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology,School of Information Technology and Engineering,India"}]}],"member":"263","reference":[{"key":"ref13","article-title":"RS based Multimedia Concealed Data Detection","author":"rupa","year":"2021","journal-title":"Journal of the Institution of Engineers Serie (B)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-014-0014-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8614931"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.007"},{"key":"ref11","article-title":"survey on misbehaviour detection in cooperative intelligent transportation systems","author":"van der heijden","year":"2018","journal-title":"IEEE Commun Surveys Tutor"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56991-8_49"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.08.006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC47002.2019.00056"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1186\/s13677-018-0123-6","article-title":"Intrusion Detection System for IoT &#x2013; based smart environments: A Survey","volume":"7","author":"mohamed","year":"2018","journal-title":"Journal of Cloud Computing Advances Systems and Applications"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"101","DOI":"10.4018\/IJDCF.20210901.oa6","article-title":"Multimedia Concealed Data Detection Using Quantitative Steganalysis","volume":"13","author":"ch","year":"2021","journal-title":"International Journal of Digital Crime and Forensics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721736"},{"key":"ref19","article-title":"Snort The Open - Source Network Intrusion Detection System","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0159-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2013.6653738"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON45594.2018.8986969"},{"key":"ref26","article-title":"IoT botnet detection via power consumption modeling","volume":"15","author":"jung","year":"2019","journal-title":"Smart Heal"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2838339"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2011.6022060"},{"key":"ref21","article-title":"Development of an application system for identifying Stego images","author":"sumaiya","year":"2018","journal-title":"International Journal of Computer Science, Engineering and Applications"},{"key":"ref28","first-page":"1","article-title":"A Visualized Botnet Detection system based deep learning for the internet of things networks of smart cities","volume":"9994","author":"alazab","year":"0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9024726"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref8","article-title":"Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks, RFC 6282 (Proposed Standard)","author":"hui","year":"2014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512494"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2012.53"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3213299.3213304"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"ref6","first-page":"1223","article-title":"A technical overview of LoRa and LoRaWAN, 2015. White paper, LoRa Alliance","volume":"15","author":"abduvaliyev","year":"2013","journal-title":"2013 On the vital areas of intrusion detection systems in wireless sensor networks Commun Surv Tutor IEEE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883583"}],"event":{"name":"2022 IEEE International Conference on Big Data (Big Data)","location":"Osaka, Japan","start":{"date-parts":[[2022,12,17]]},"end":{"date-parts":[[2022,12,20]]}},"container-title":["2022 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10020192\/10020156\/10020355.pdf?arnumber=10020355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T17:09:53Z","timestamp":1676912993000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10020355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,17]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/bigdata55660.2022.10020355","relation":{},"subject":[],"published":{"date-parts":[[2022,12,17]]}}}