{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:50:25Z","timestamp":1746845425849,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,20]]},"DOI":"10.1109\/csndsp54353.2022.9908058","type":"proceedings-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T15:41:19Z","timestamp":1665070879000},"page":"326-331","source":"Crossref","is-referenced-by-count":5,"title":["iDAM: A Distributed MUD Framework for Mitigation of Volumetric Attacks in IoT Networks"],"prefix":"10.1109","author":[{"given":"Suvrima","family":"Datta","sequence":"first","affiliation":[{"name":"IIIT Naya Raipur,Dept of CSE,India"}]},{"given":"Aneesh","family":"Bhattacharya","sequence":"additional","affiliation":[{"name":"IIIT Naya Raipur,Dept of CSE,India"}]},{"given":"Risav","family":"Rana","sequence":"additional","affiliation":[{"name":"IIIT Naya Raipur,Dept of CSE,India"}]},{"given":"U.","family":"Venkanna","sequence":"additional","affiliation":[{"name":"IIIT Naya Raipur,Dept of CSE,India"}]}],"member":"263","reference":[{"journal-title":"MUD Maker tool","year":"2021","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229566"},{"key":"ref12","first-page":"49","article-title":"Soft mud: Implementing manufacturer usage descriptions on openflow sdn switches","author":"ranganathan","year":"2019","journal-title":"Proc IEEE Int Conf Netw"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110329"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229571"},{"key":"ref15","first-page":"756","article-title":"D&#x00EF;ot: A federated self-learning anomaly detection system for iot","author":"nguyen","year":"2019","journal-title":"Proc ICDCS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394528"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref18","first-page":"582","author":"sch\u00f6lkopf","year":"2000","journal-title":"Proc Advances in Neural Information Processing Systems"},{"article-title":"IoT Network Intrusion Dataset","year":"2019","author":"kang","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3055843"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102143"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120626"},{"key":"ref5","article-title":"Hades-iot: A practical and effective host-based anomaly detection system for iot devices","author":"breitenbacher","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2997898"},{"year":"2021","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417277"},{"key":"ref1","article-title":"Consumer, commercial and industrial iot (in) security: Attack taxonomy and case studies","volume":"9","author":"xenofontos","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314352"},{"journal-title":"Scapy","year":"0","author":"biondi","key":"ref20"}],"event":{"name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","start":{"date-parts":[[2022,7,20]]},"location":"Porto, Portugal","end":{"date-parts":[[2022,7,22]]}},"container-title":["2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9907868\/9907893\/09908058.pdf?arnumber=9908058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T18:56:26Z","timestamp":1667501786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9908058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,20]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/csndsp54353.2022.9908058","relation":{},"subject":[],"published":{"date-parts":[[2022,7,20]]}}}