{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T07:51:10Z","timestamp":1771833070949,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,20]]},"DOI":"10.1109\/csndsp54353.2022.9908049","type":"proceedings-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T19:41:19Z","timestamp":1665085279000},"page":"338-343","source":"Crossref","is-referenced-by-count":9,"title":["ML-based Detection of Rank and Blackhole Attacks in RPL Networks"],"prefix":"10.1109","author":[{"given":"Philokypros P.","family":"Ioulianou","sequence":"first","affiliation":[{"name":"University of York,Department of Computer Science,York,United Kingdom"}]},{"given":"Vassilios G.","family":"Vassilakis","sequence":"additional","affiliation":[{"name":"University of York,Department of Computer Science,York,United Kingdom"}]},{"given":"Siamak F.","family":"Shahandashti","sequence":"additional","affiliation":[{"name":"University of York,Department of Computer Science,York,United Kingdom"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Microsoft Azure Machine Learning","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900651"},{"key":"ref14","article-title":"Decision forests, convolutional networks and the models in-between","author":"ioannou","year":"2016","journal-title":"arXiv 1603 01250"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7641-3_9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2006.1713148"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3068240"},{"key":"ref18","article-title":"Whitefield framework","author":"jadhav","year":"2022"},{"key":"ref19","article-title":"How to select algorithms for Azure Machine Learning","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.26636\/jtit.2019.131919"},{"key":"ref3","article-title":"Denial-of-service attacks and countermeasures in the RPL-based Internet of Things","author":"ioulianou","year":"2019","journal-title":"2nd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) in conjunction with ESORICS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP49049.2020.9249519"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP49049.2020.9249612"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2010009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/23335777.2020.1716268"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref1","first-page":"1","article-title":"A signature-based intrusion detection system for the Internet of things","author":"ioulianou","year":"2018","journal-title":"IEICE Information and Communication Technology Forum (ICTF)"},{"key":"ref9","article-title":"Google Cloud AutoML Custom Machine Learning Models","year":"2022"}],"event":{"name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","location":"Porto, Portugal","start":{"date-parts":[[2022,7,20]]},"end":{"date-parts":[[2022,7,22]]}},"container-title":["2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9907868\/9907893\/09908049.pdf?arnumber=9908049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:57:09Z","timestamp":1667516229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9908049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,20]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/csndsp54353.2022.9908049","relation":{},"subject":[],"published":{"date-parts":[[2022,7,20]]}}}