{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:09:14Z","timestamp":1730221754717,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/fmec62297.2024.10710268","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:38Z","timestamp":1728926558000},"page":"162-169","source":"Crossref","is-referenced-by-count":0,"title":["Advancing Threat Detection in Fog Computing: A Comprehensive Approach to Real-Time Analysis and Model Generation"],"prefix":"10.1109","author":[{"given":"Luc\u00eda Cuadrillero","family":"Paredes","sequence":"first","affiliation":[{"name":"University of Murcia,Faculty of Computer Science,Murcia,Spain"}]},{"given":"\u00c1ngel Luis Perales","family":"G\u00f3mez","sequence":"additional","affiliation":[{"name":"University of Murcia,Faculty of Computer Science,Murcia,Spain"}]},{"given":"\u00d3scar","family":"C\u00e1novas","sequence":"additional","affiliation":[{"name":"University of Murcia,Faculty of Computer Science,Murcia,Spain"}]},{"given":"Lorenzo Fern\u00e1ndez","family":"Maim\u00f3","sequence":"additional","affiliation":[{"name":"University of Murcia,Faculty of Computer Science,Murcia,Spain"}]},{"given":"F\u00e9lix J. Garc\u00eda","family":"Clemente","sequence":"additional","affiliation":[{"name":"University of Murcia,Faculty of Computer Science,Murcia,Spain"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2342509.2342513"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TDSC.2023.3266139"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ACCESS.2018.2803446"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s12652-018-0813-4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/JIOT.2020.3035474"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/CCNC.2018.8319238"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ACCESS.2020.3041951"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.eswa.2018.04.004","article-title":"Web traffic anomaly detection using c-lstm neural networks","volume":"106","author":"Kim","year":"2018","journal-title":"Expert Systems with Applications"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3416013.3426457"},{"key":"ref10","first-page":"100842","article-title":"Susan: A deep learning based anomaly detection framework for sustainable industry","volume":"37","author":"Luis","year":"2023","journal-title":"Sustainable Computing: Informatics and Systems"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/YEF-ECE.2018.8368933"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/BigDataService49289.2020.00009"},{"year":"2024","author":"Corporation","article-title":"Nvidia morpheus","key":"ref13"},{"year":"2024","author":"FKIE","article-title":"Pikabot","key":"ref14"},{"year":"2024","author":"Foundation (OISF)","article-title":"Suricata: open source ids\/ips\/nsm engine","key":"ref15"}],"event":{"name":"2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710134\/10710180\/10710268.pdf?arnumber=10710268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:57:32Z","timestamp":1728968252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/fmec62297.2024.10710268","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}