{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:18Z","timestamp":1756273218868,"version":"3.44.0"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130026","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"42-49","source":"Crossref","is-referenced-by-count":0,"title":["Towards DoS Attack Detection for IoT Systems: A Cross-Layer Oriented Approach Based on Machine Learning Techniques"],"prefix":"10.1109","author":[{"given":"Dimitrios","family":"Tasiopoulos","sequence":"first","affiliation":[{"name":"University of Thessaly,Department of Digital Systems,Larissa,Greece"}]},{"given":"Apostolos","family":"Xenakis","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Digital Systems,Larissa,Greece"}]},{"given":"Alexios","family":"Lekidis","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Energy Systems,Larissa,Greece"}]},{"given":"Dimitrios","family":"Kosmanos","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Digital Systems,Larissa,Greece"}]},{"given":"Costas","family":"Chaikalis","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Digital Systems,Larissa,Greece"}]},{"given":"Vasileios","family":"Vlachos","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Economics,Volos,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/su13169463"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/IJACI.300794"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06986-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3022276"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.08.039"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icecs53924.2021.9665623"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6693316"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/mecon53876.2022.9752395"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icic50835.2020.9288571"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102416"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.3390\/app14072874","article-title":"Analysing the Performance of a TrustBased AODV in the Presence of a Flooding Attack","author":"Alzahrani","year":"2024","journal-title":"Appl. Sci"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/drcn60692.2024.10539153"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/repsgie.2018.8488836"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28183-9_39"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-024-06106-w"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104675"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2012.199"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/203814"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/globecom42002.2020.9322603"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/infocom53939.2023.10228877"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8889122"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom53373.2021.00144"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3214099"},{"key":"ref24","article-title":"Data driven intrusion detection for 6LoWPAN based IoT systems, Ad Hoc Networks","volume":"143","author":"Kerem","year":"2023"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/icesc48915.2020.9155770"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/eit51626.2021.9491885"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3292209"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/icict57646.2023.10134058"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/iitcee57236.2023.10090993"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-06915-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3422077"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/icdt61202.2024.10489560"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC58438.2023.10290399"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/iceconf57129.2023.10083735"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ic3se62002.2024.10593610"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/itc-egypt58155.2023.10206348"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3024219"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3202807"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.12.064"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2024.200381"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tencon54134.2021.9707254"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/icaeca52838.2021.9675609"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221146"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/3ict56508.2022.9990664"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/csndsp54353.2022.9908049"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/2804291"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ssd61670.2024.10549143"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10022-7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.007"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/globecom54140.2023.10437158"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/iccworkshops57953.2023.10283675"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2024.110356"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/icjece.2021.3053231"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/icrito61523.2024.10522321"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3029191"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123765"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/B-HTC50970.2020.9297969"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2024.100289"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2021.3049160"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/infocom41043.2020.9155382"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2022.3225846"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM58377.2023.10356224"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/tmlcn.2024.3417806"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/cns59707.2023.10288657"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.01.021"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/milcom52596.2021.9653112"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-021-01950-2"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100573"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130026.pdf?arnumber=11130026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:41Z","timestamp":1756271441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130026","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}