{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:30:15Z","timestamp":1776400215161,"version":"3.51.2"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,5]]},"DOI":"10.1109\/icaic63015.2025.10848740","type":"proceedings-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:44:02Z","timestamp":1738176242000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Mapping Cyber Threats in IoT-Driven MSPs: An Explainable Machine Learning Approach for Remote Work Security"],"prefix":"10.1109","author":[{"given":"James","family":"Johnstone","sequence":"first","affiliation":[{"name":"George Washington University,Washington D.C,USA"}]},{"given":"Adewale","family":"Akinfaderin","sequence":"additional","affiliation":[{"name":"George Washington University,Washington D.C,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01843-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref4","article-title":"MITRE ATT&CK: Design and Philosophy","author":"Strom","year":"2020"},{"key":"ref5","article-title":"The Shifting Landscape of Cybersecurity: The Impact of Remote Work and COVID-19 on Data Breach Trends","author":"Ozer","year":"2024","journal-title":"arXiv preprint arXiv:2402.06650"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3240289"},{"key":"ref7","article-title":"The Untold Story of NotPetya, the Most Devastating Cyberattack in History","author":"Greenberg","year":"2018","journal-title":"Wired Magazine"},{"issue":"2","key":"ref8","first-page":"45","article-title":"Managed Service Providers and the Remote Work Paradigm: Cybersecurity Challenges and Solutions","volume":"8","author":"Dubina","year":"2022","journal-title":"Journal of Cybersecurity Research"},{"key":"ref9","article-title":"The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks","author":"Greenberg","year":"2023"},{"issue":"4","key":"ref10","first-page":"3247","article-title":"Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends, and Prospects for Emerging 5GIoT Scenarios","volume":"7","author":"Shafique","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref11","first-page":"108379","article-title":"Security Challenges in IoT Architectures","volume":"200","author":"Dom\u00ednguez-Bola\u00f1o","year":"2021","journal-title":"Computer Networks"},{"issue":"3","key":"ref12","first-page":"1","article-title":"A Survey on the Security of IoT and CPS: From Hardware to Application Layer","volume":"14","author":"Altulaihan","year":"2022","journal-title":"Journal of Internet Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"issue":"2","key":"ref14","first-page":"123","article-title":"Automated Hyperparameter Tuning in Machine Learning: A Review of State-of-the-Art Methods","volume":"10","author":"Wickramasinghe","year":"2021","journal-title":"ML Journal"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.827"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102494"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2910750"},{"key":"ref19","article-title":"Securing IoT devices against attacks that target critical infrastructure","year":"2022","journal-title":"Microsoft Threat Intelligence"},{"key":"ref20","article-title":"Nokia Threat Intelligence Report finds malicious IoT botnet activity has sharply increased","volume-title":"Nokia","year":"2023"},{"key":"ref21","article-title":"2023 ThreatLabz Report Indicates 400% Growth in IoT Malware Attacks","volume-title":"Zscaler Blog","author":"Gandhi","year":"2023"},{"key":"ref22","article-title":"Malware exploited critical Realtek SDK bug in millions of attacks","author":"Toulas","year":"2023","journal-title":"BleepingComputer"},{"key":"ref23","first-page":"83","article-title":"A Review on Cyber Crimes on the Internet of Things","volume-title":"Deep Learning for Security and Privacy Preservation in IoT","author":"Makkar"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2062\/1\/012013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/en13102509"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s23094539"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973178"},{"key":"ref28","first-page":"102586","article-title":"A Comparative Analysis of Machine Learning Techniques for Cybersecurity Threat Detection","volume":"54","author":"Hameed","year":"2020","journal-title":"Journal of Information Security and Applications"},{"key":"ref29","first-page":"2313","article-title":"A Survey of Security in Multi-Agent Systems","volume":"53","author":"Fryer","year":"2020","journal-title":"Artificial Intelligence Review"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8738613"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.05.010"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/1548512920951275"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3267831"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107337"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/s22155690"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3092054"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103445"},{"key":"ref38","article-title":"Understanding Random Forests: From Theory to Practice","author":"Louppe","year":"2014","journal-title":"arXiv:1407.7502"},{"key":"ref39","article-title":"Simplifying Random, Forests: On the Trade-off between Interpretability and Accuracy","author":"Rapp","year":"2019","journal-title":"arXiv preprint arXiv:1911.04393"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00077-7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3321\/j.issn:0529-6579.2007.z1.029"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-018-0697-0"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/math10060873"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/make3030027"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3092054"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069001"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3323573"}],"event":{"name":"2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)","location":"Houston, TX, USA","start":{"date-parts":[[2025,2,5]]},"end":{"date-parts":[[2025,2,7]]}},"container-title":["2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10848546\/10848537\/10848740.pdf?arnumber=10848740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:33:59Z","timestamp":1738215239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10848740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,5]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/icaic63015.2025.10848740","relation":{},"subject":[],"published":{"date-parts":[[2025,2,5]]}}}