{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:05:28Z","timestamp":1740099928613,"version":"3.37.3"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100009105","name":"Ministry of Internal Affairs and Communications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,9]]},"DOI":"10.1109\/ccnc49032.2021.9369568","type":"proceedings-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T21:35:06Z","timestamp":1615498506000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Network Scan Failure and Delay Estimation of IoT Wireless Equipment using Scenario Detection Technique"],"prefix":"10.1109","author":[{"given":"Babatunde","family":"Ojetunde","sequence":"first","affiliation":[]},{"given":"Kenta","family":"Suzuki","sequence":"additional","affiliation":[]},{"given":"Kazuto","family":"Yano","sequence":"additional","affiliation":[]},{"given":"Yoshinori","family":"Suzuki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Finding the most similar textual documents using Case-Based Reasoning","year":"2019","author":"mihajlovic","key":"ref10"},{"journal-title":"Maximally Consistent Sampling and the Jaccard Index of Probability Distributions","year":"2018","author":"moulton","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045710"},{"key":"ref13","first-page":"106","article-title":"The elements of statistical learning: data mining, inference, and prediction","author":"hastie","year":"2009","journal-title":"Chapter 4"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1609\/aaai.v25i1.7926","article-title":"Linear discriminant analysis: new formulation and overfit analysis","author":"luo","year":"2011","journal-title":"Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2007.35"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"journal-title":"A 2 System simulation scenarios","article-title":"3GPP TS 36.814 v9.2.0","year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6938963"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr035"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2803446"},{"journal-title":"Machine learning based anomaly detection for 5G networks","year":"2020","author":"lam","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41278-3_74"},{"key":"ref7","article-title":"Machine learning methods for network intrusion detection","author":"alkasassbeh","year":"2018","journal-title":"Icccnt 2018 - The 20TH International Conference On Computing Communication And Networking Technologies"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179324"},{"journal-title":"JSOF white paper","year":"2020","author":"kol","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2016.14"}],"event":{"name":"2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2021,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2021,1,12]]}},"container-title":["2021 IEEE 18th Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9369428\/9369448\/09369568.pdf?arnumber=9369568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T23:53:47Z","timestamp":1698018827000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9369568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ccnc49032.2021.9369568","relation":{},"subject":[],"published":{"date-parts":[[2021,1,9]]}}}