{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:59:59Z","timestamp":1768971599889,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724974","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["RLAD: Reinforcement Learning based Anomaly Detection system for IoT devices in smart homes"],"prefix":"10.1109","author":[{"given":"Angela Raj","family":"Chadha","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Dept. of Computer Science and Engineering,Chennai,India"}]},{"given":"Kethamreddy Karthikeya","family":"Reddy","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Dept. of Computer Science and Engineering,Chennai,India"}]},{"given":"S","family":"Sountharrajan","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Dept. of Computer Science and Engineering,Chennai,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAI58407.2023.10136687"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108651"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00708-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN55119.2022.9829561"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s22218085"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3224023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ccece49351.2022.9918216"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3011726"},{"issue":"1","key":"ref9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.18280\/ria.350102","article-title":"Attack and anomaly detection in IoT networks using supervised machine learning approaches","volume":"35","author":"Tyagi","year":"2021","journal-title":"Revued\u2019Intelligence Artificielle"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iscc53001.2021.9631384"},{"key":"ref11","article-title":"Institute of Electrical and Electronics Engineers. South African Section, & Institute of Electrical and Electronics Engineers","author":"Liu Zhipeng","year":"2020","journal-title":"Anomaly Detection on loT Network Intrusion Using Machine Learning"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/cenim51130.2020.9297958"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2019.00080"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100059","article-title":"Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches","author":"Hasan","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icisce48695.2019.00014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/apnoms56106.2022.9919904"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2022.3200906"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107132"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35644-5_14"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7769"},{"issue":"3-4","key":"ref22","first-page":"17","article-title":"Effective feature selection for hybrid wireless iot network intrusion detection systems using machine learning techniques (2021) Ad-Hoc and Sensor Wireless Networks","volume":"49","author":"Nivaashini"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kamand, India","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724974.pdf?arnumber=10724974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T07:14:46Z","timestamp":1732691686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724974","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}