{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T04:17:11Z","timestamp":1728533831224},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,25]]},"DOI":"10.1109\/icecet61485.2024.10698326","type":"proceedings-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T17:33:15Z","timestamp":1728408795000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Cyber Security Threats Detection and Protection in IoT Devices Using S-Run-Based Deep Neural Network"],"prefix":"10.1109","author":[{"given":"Pragati","family":"Rana","sequence":"first","affiliation":[{"name":"Pimpri Chinchwad College of Engineering,Nigdi, Pune,India"}]},{"given":"B P","family":"Patil","sequence":"additional","affiliation":[{"name":"Army Institute of Technology,Pune,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107810"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4016073"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3220622"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3803"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/math11010233"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iccr56254.2022.9996072"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.09.023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130115"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3165809"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11020198"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11111717"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11091502"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8951961"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3168533"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09591-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s22010360"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIKE51210.2021.9410675"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.036735"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/info14010041"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMPTELIX.2017.8004032"}],"event":{"name":"2024 International Conference on Electrical, Computer and Energy Technologies (ICECET)","start":{"date-parts":[[2024,7,25]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,7,27]]}},"container-title":["2024 International Conference on Electrical, Computer and Energy Technologies (ICECET"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10697983\/10697986\/10698326.pdf?arnumber=10698326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T05:58:47Z","timestamp":1728453527000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10698326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,25]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icecet61485.2024.10698326","relation":{},"subject":[],"published":{"date-parts":[[2024,7,25]]}}}