{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:36:14Z","timestamp":1730234174307,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T00:00:00Z","timestamp":1650585600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T00:00:00Z","timestamp":1650585600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,22]]},"DOI":"10.1109\/icccs55155.2022.9846730","type":"proceedings-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:40Z","timestamp":1660593760000},"page":"676-683","source":"Crossref","is-referenced-by-count":0,"title":["An Intrusion Detection Algorithm for Resource-Constrained IoT"],"prefix":"10.1109","author":[{"given":"Zhongke","family":"Lu","sequence":"first","affiliation":[{"name":"Beijing University of Aeronautics and Astronautics,School of Cyber Science and Technology,Beijing,China"}]},{"given":"Yuqing","family":"Lan","sequence":"additional","affiliation":[{"name":"Beijing University of Aeronautics and Astronautics,School of Software, School of Cyber Science and Technology,Beijing,China"}]},{"given":"Jianhai","family":"Du","sequence":"additional","affiliation":[{"name":"Beijing University of Aeronautics and Astronautics,School of Cyber Science and Technology,Beijing,China"}]},{"given":"Yixuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Aeronautics and Astronautics,School of Cyber Science and Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"GA-iForest: An Efficient Isolated Forest Framework Based on Genetic Algorithm for Numerical Data Outlier Detection[J]","author":"li","year":"2019","journal-title":"Transactions of Nanjing University of Aeronautics and Astronautics"},{"article-title":"Data Structures and Algorithms with Object-Oriented Design Patterns in Java","year":"1999","author":"preiss","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93025-1_4"},{"journal-title":"Chi Square and Tests for Proportions","year":"2019","author":"aberson","key":"ref13"},{"article-title":"A Modified AUC for Training Convolutional Neural Networks: Taking Confidence into Account","year":"2020","author":"namdar","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050006"},{"key":"ref3","article-title":"Isolation Forest and Local Outlier Factor for Credit Card Fraud Detection System","volume":"9","author":"veeramani","year":"2020","journal-title":"International Journal of Engineering and Advanced Technology"},{"key":"ref6","article-title":"Histogram-based Outlier Score (HBOS): A fast Unsupervised Anomaly Detection Algorithm","author":"goldstein","year":"2012","journal-title":"KI-2012 Poster and Demo Track"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23499-7_5"},{"key":"ref8","article-title":"Extended isolation forest[J]","author":"hariri","year":"2019","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1187\/4\/042084"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5120\/13715-1478"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3338840.3355641"}],"event":{"name":"2022 7th International Conference on Computer and Communication Systems (ICCCS)","start":{"date-parts":[[2022,4,22]]},"location":"Wuhan, China","end":{"date-parts":[[2022,4,25]]}},"container-title":["2022 7th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9845797\/9845820\/09846730.pdf?arnumber=9846730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:24:57Z","timestamp":1662409497000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9846730\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,22]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icccs55155.2022.9846730","relation":{},"subject":[],"published":{"date-parts":[[2022,4,22]]}}}