{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:37:28Z","timestamp":1763728648128},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361433","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T14:38:38Z","timestamp":1703515118000},"page":"0471-0477","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion Detection System for IoT Based on Complex Networks and Machine Learning"],"prefix":"10.1109","author":[{"given":"Mortada","family":"Termos","sequence":"first","affiliation":[{"name":"CESI LINEACT UR 7527,Strasbourg,France"}]},{"given":"Zakariya","family":"Ghalmane","sequence":"additional","affiliation":[{"name":"CESI LINEACT UR 7527,Strasbourg,France"}]},{"given":"Mohamed-El-Amine","family":"Brahmia","sequence":"additional","affiliation":[{"name":"CESI LINEACT UR 7527,Strasbourg,France"}]},{"given":"Ahmad","family":"Fadlallah","sequence":"additional","affiliation":[{"name":"Lebanese University,Faculty of Sciences,Cornputer Science department,Beirut,Lebanon"}]},{"given":"Ali","family":"Jaber","sequence":"additional","affiliation":[{"name":"Lebanese University,Faculty of Sciences,Cornputer Science department,Beirut,Lebanon"}]},{"given":"Mourad","family":"Zghal","sequence":"additional","affiliation":[{"name":"CESI LINEACT UR 7527,Strasbourg,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v56i1.248"},{"key":"ref5","article-title":"Network traffic anomaly detection using recurrent neural networks","author":"Radford","year":"2018","journal-title":"arXiv preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3176317"},{"key":"ref7","first-page":"11","article-title":"Complex systems","author":"Ivan","year":"2018","journal-title":"Self-organizing Coalitions for Managing Complexity: Agent-based Simulation of Evolutionary Game Theory Models using Dynamic Social Networks for Interdisci-plinary Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-46507-y"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-019-0591-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SDS57574.2022.10062873"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"ref16","article-title":"A graph-based clustering algorithm for anomaly intrusion detection","volume-title":"ICCSE 2012 - Proceedings of 2012 7th International Conference on Computer Science and Education","author":"Zhou","year":"2012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-020-09347-0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025685"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: an introduction","author":"Newman","year":"2010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/00018730601170527"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.03.006"},{"journal-title":"Iot network intrusion dataset","year":"2019","author":"Kang","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2003.1228503"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361433.pdf?arnumber=10361433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T15:45:02Z","timestamp":1705074302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361433","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}