{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:50:59Z","timestamp":1765889459789,"version":"3.37.3"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,6]]},"DOI":"10.1109\/comsnets63942.2025.10885573","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:58Z","timestamp":1740081958000},"page":"1148-1153","source":"Crossref","is-referenced-by-count":3,"title":["Streamlined Data Pipeline for Real-Time Threat Detection and Model Inference"],"prefix":"10.1109","author":[{"given":"Rajkanwar","family":"Singh","sequence":"first","affiliation":[{"name":"VIT-AP University,School of Computer Science &#x0026; Engineering,Amaravati,Andhra Pradesh,India"}]},{"given":"Aravindan","family":"V","sequence":"additional","affiliation":[{"name":"VIT-AP University,School of Computer Science &#x0026; Engineering,Amaravati,Andhra Pradesh,India"}]},{"given":"Sanket","family":"Mishra","sequence":"additional","affiliation":[{"name":"VIT-AP University,School of Computer Science &#x0026; Engineering,Amaravati,Andhra Pradesh,India"}]},{"given":"Sunil Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education,Department of Computer Science and Engineering,Manipal,Karnataka,India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s41870-023-01585-0"},{"key":"ref2","article-title":"SensorNetGuard: A Dataset for Identifying Malicious Sensor Nodes","volume-title":"IEEE Dataport","author":"Raghunath K M","year":"2023"},{"year":"2024","author":"Him","article-title":"Leveraging Artificial Intelligence and Machine Learning for Real-Time Threat Intelligence: Enhancing Incident Response Capabilities","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICCCNT56998.2023.10307506"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/s11042-023-17151-6"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.3390\/systems12040126"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/COMPSAC61105.2024.00355"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICOA58279.2023.10308826"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s10586-023-04168-7"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1038\/s41598-023-45065-8"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ISDFS58141.2023.10131800"},{"year":"2011","author":"Kreps","journal-title":"Kafka: a Distributed Messaging System for Log Processing","key":"ref12"},{"key":"ref13","first-page":"28","article-title":"Apache flink: Stream and batch processing in a single engine","volume":"36","author":"Carbone","year":"2015","journal-title":"IEEE Data(base) Engineering Bulletin"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.23919\/ICPE2023-ECCEAsia54778.2023.10213616"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.55549\/epstem.1406274"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/access.2018.2886457"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/access.2022.3186095"}],"event":{"name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","start":{"date-parts":[[2025,1,6]]},"location":"Bengaluru, India","end":{"date-parts":[[2025,1,10]]}},"container-title":["2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885406\/10885547\/10885573.pdf?arnumber=10885573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:00Z","timestamp":1740122640000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/comsnets63942.2025.10885573","relation":{},"subject":[],"published":{"date-parts":[[2025,1,6]]}}}