{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:13:48Z","timestamp":1772043228614,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1109\/ic3i59117.2023.10397636","type":"proceedings-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T18:27:08Z","timestamp":1706293628000},"page":"2650-2654","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing Network Security in IoT Using Machine Learning- Based Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Himanshu","family":"Sharma","sequence":"first","affiliation":[{"name":"GLA University,Computer Engineering and Applications,Mathura,India"}]},{"given":"Devvret","family":"Verma","sequence":"additional","affiliation":[{"name":"Graphic Era University,Department of Biotechnology,Dehradun,India"}]},{"given":"Aditya","family":"Rana","sequence":"additional","affiliation":[{"name":"J P University of Engineering Technology,Guna,Himachal Pradesh,India"}]},{"given":"S. Lakshmana","family":"Chari","sequence":"additional","affiliation":[{"name":"Institute of Aeronautical Engineering,Department of Computer Sc. &#x0026; Engg.,Hyderabad,India"}]},{"given":"Rohit","family":"Kumar","sequence":"additional","affiliation":[{"name":"Lloyd Institute of Management and Technology,Greater Noida,India"}]},{"given":"Naveen","family":"Kumar","sequence":"additional","affiliation":[{"name":"Lloyd Law College,Greater Noida,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.07.029"},{"key":"ref3","first-page":"129","article-title":"Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures","volume-title":"Internet of Things (IoT) in 5G Mobile Technologies","author":"Al-Obaidat","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"issue":"5","key":"ref5","first-page":"1","article-title":"Deep learning for IoT big data and streaming analytics: A survey","volume":"52","author":"Bhuyan","year":"2019","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"3","key":"ref6","first-page":"4218","article-title":"Intrusion detection in IoT systems through anomaly detection and IoT honeycombs: A survey","volume":"6","author":"Carullo","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref7","first-page":"95","article-title":"Anomaly intrusion detection system in IoT ecosystems","volume":"89","author":"Mahmood","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"ref8","first-page":"983","article-title":"On the feasibility of online malware detection with performance counters","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","author":"Perdisci"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/iciem59379.2023.10166939"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.11.274"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12508-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7982-8_25"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-020-02049-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12273-020-0650-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2697440"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2899264"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2017.8107272"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/ctm2.28"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/(issn)2001-1326"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2023.3278748"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/ctm2.28"}],"event":{"name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","location":"Gautam Buddha Nagar, India","start":{"date-parts":[[2023,9,14]]},"end":{"date-parts":[[2023,9,16]]}},"container-title":["2023 6th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10397581\/10397594\/10397636.pdf?arnumber=10397636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T18:26:17Z","timestamp":1706898377000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10397636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ic3i59117.2023.10397636","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]}}}