{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T18:54:05Z","timestamp":1769108045083,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,24]]},"DOI":"10.1109\/ccece58730.2023.10288813","type":"proceedings-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T17:50:58Z","timestamp":1698342658000},"page":"432-437","source":"Crossref","is-referenced-by-count":3,"title":["Anomaly Detection for IoT Networks: Empirical Study"],"prefix":"10.1109","author":[{"given":"Marwa A.","family":"Elsayed","sequence":"first","affiliation":[{"name":"Dalhousie University,Faculty of Computer Science,Halifax,NS,Canada,B3H 4R2"}]},{"given":"Patrick","family":"Russell","sequence":"additional","affiliation":[{"name":"Dalhousie University,Faculty of Computer Science,Halifax,NS,Canada,B3H 4R2"}]},{"given":"Biswajit","family":"Nandy","sequence":"additional","affiliation":[{"name":"Solana Networks,Ottawa,Canada"}]},{"given":"Nabil","family":"Seddigh","sequence":"additional","affiliation":[{"name":"Solana Networks,Ottawa,Canada"}]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[{"name":"Dalhousie University,Faculty of Computer Science,Halifax,NS,Canada,B3H 4R2"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108214"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT55906.2022.9931222"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2022.100142"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00173"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.12.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s21020446"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01843-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86514-6_1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154271"},{"key":"ref18","first-page":"1312","article-title":"Auto-encoding variational bayes","author":"kingma","year":"2013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-191432"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101565"},{"key":"ref4","first-page":"93","article-title":"Rule Generation for Signature Based Detection Systems of Cyber Attacks in IoT Environments","volume":"8","author":"soe","year":"2019","journal-title":"Bulletin of Networking Computing Systems and Software"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.042"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC47002.2019.00056"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.007"}],"event":{"name":"2023 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)","location":"Regina, SK, Canada","start":{"date-parts":[[2023,9,24]]},"end":{"date-parts":[[2023,9,27]]}},"container-title":["2023 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10288628\/10288648\/10288813.pdf?arnumber=10288813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T19:00:21Z","timestamp":1700506821000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10288813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,24]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ccece58730.2023.10288813","relation":{},"subject":[],"published":{"date-parts":[[2023,9,24]]}}}