{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:05:48Z","timestamp":1725764748822},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T00:00:00Z","timestamp":1684368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T00:00:00Z","timestamp":1684368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,18]]},"DOI":"10.1109\/eit57321.2023.10187263","type":"proceedings-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T17:22:40Z","timestamp":1690305760000},"page":"300-303","source":"Crossref","is-referenced-by-count":1,"title":["Utilizing Computer Vision Algorithms to Detect and Classify Cyberattacks in IoT Environments in Real-Time"],"prefix":"10.1109","author":[{"given":"Mikhail","family":"Gromov","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A."}]},{"given":"David","family":"Arnold","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A."}]},{"given":"Jafar","family":"Saniie","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A."}]}],"member":"263","reference":[{"journal-title":"Jetson Nano Developer Kit","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES48979.2020.00046"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RTC56148.2022.9945055"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8757060"},{"key":"ref11","article-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1. 0. 0) [Data set]","author":"garcia","year":"2020","journal-title":"Zenodo"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA.2017.12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RTC56148.2022.9945060"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/eIT53891.2022.9814003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"}],"event":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","start":{"date-parts":[[2023,5,18]]},"location":"Romeoville, IL, USA","end":{"date-parts":[[2023,5,20]]}},"container-title":["2023 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10187212\/10187216\/10187263.pdf?arnumber=10187263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:37:44Z","timestamp":1692034664000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10187263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,18]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/eit57321.2023.10187263","relation":{},"subject":[],"published":{"date-parts":[[2023,5,18]]}}}