{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:29:52Z","timestamp":1750181392100,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,17]]},"DOI":"10.1109\/bigdata55660.2022.10020894","type":"proceedings-article","created":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T14:35:23Z","timestamp":1674743723000},"page":"5662-5671","source":"Crossref","is-referenced-by-count":1,"title":["Explaining IoT Attacks: An Effective and Efficient Semi-Supervised Learning Framework"],"prefix":"10.1109","author":[{"given":"Giuseppe","family":"Cascavilla","sequence":"first","affiliation":[{"name":"TU\/e,JADS,The Netherlands"}]},{"given":"Reinier","family":"Zwart","sequence":"additional","affiliation":[{"name":"JADS,The Netherlands"}]},{"given":"Damian A.","family":"Tamburri","sequence":"additional","affiliation":[{"name":"TU\/e,JADS,The Netherlands"}]},{"given":"Alfredo","family":"Cuzzocrea","sequence":"additional","affiliation":[{"name":"University of Calabria,Italy"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00056"},{"year":"2018","key":"ref35","article-title":"Daactive semi-supervised clustering algorithms for scikit-learn"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2016.7740316"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761792"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1270"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.025"},{"key":"ref36","first-page":"2837","article-title":"Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance","volume":"11","author":"vinh","year":"2010","journal-title":"The Journal of Machine Learning Research"},{"journal-title":"Keras","year":"2015","author":"chollet","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074855"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00637-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.152"},{"key":"ref32","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102494"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11721-007-0004-y","article-title":"The biological principles of swarm intelligence","volume":"1","author":"garnier","year":"2007","journal-title":"Swarm Intelligence"},{"key":"ref17","article-title":"Approximate query answering on sensor network data streams","volume":"49","author":"cuzzocrea","year":"2004","journal-title":"GeoSensor Networks"},{"key":"ref39","article-title":"k-means++: The advantages of careful seeding","author":"arthur","year":"2006","journal-title":"Stanford Tech Rep"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-019-05855-6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1957.1057418"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2242-4.ch006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.5"},{"key":"ref24","article-title":"Semi-supervised clustering by seeding","author":"basu","year":"2002","journal-title":"Proceedings of 19th International Conference on Machine Learning (ICML-2002"},{"key":"ref23","first-page":"5567","article-title":"An experimental study of ssh attacks by using honeypot decoys","volume":"6","author":"kheirkhah","year":"2013","journal-title":"Indian Journal of Science and Technology"},{"article-title":"Cowrie ssh and telnet honeypot","year":"2019","author":"oosterhof","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.31"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3349290"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2003.1193935"},{"article-title":"What are attackers after on iot devices? an approach based on a multi-phased multi-faceted iot honeypot ecosystem and data clustering","year":"2021","author":"tabari","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.350"},{"key":"ref28","article-title":"Python 3 reference manual createspace","author":"van rossum","year":"2009","journal-title":"Scotts Valley CA"},{"year":"2016","key":"ref27","article-title":"T-pot - the all in one multi honeypot plattform"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-92bf1922-00a"},{"article-title":"Ddos attack that disrupted internet was largest of its kind in history, experts say","year":"2016","author":"woolf","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00080"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/b18050"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref6","first-page":"1","article-title":"Requirements for a future ews-cyber defence in the internet of the future","author":"golling","year":"2011","journal-title":"2011 3rd International Conference on Cyber Conflict"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2018.8631494"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IDEAS.2005.41"}],"event":{"name":"2022 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2022,12,17]]},"location":"Osaka, Japan","end":{"date-parts":[[2022,12,20]]}},"container-title":["2022 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10020192\/10020156\/10020894.pdf?arnumber=10020894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T17:07:59Z","timestamp":1676912879000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10020894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,17]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/bigdata55660.2022.10020894","relation":{},"subject":[],"published":{"date-parts":[[2022,12,17]]}}}