{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T04:03:02Z","timestamp":1747540982954,"version":"3.40.5"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,9]]},"DOI":"10.1109\/icst62759.2024.10992183","type":"proceedings-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T17:42:08Z","timestamp":1747417328000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["ADCS-IoT: Anomaly Detection with Cryptographic Security Framework for the Internet of Things"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1636-7424","authenticated-orcid":false,"given":"Sonam","family":"Lata","sequence":"first","affiliation":[{"name":"IILM University,Department of Computer Science and Engineering,Gurugram,Haryana,India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8447-198X","authenticated-orcid":false,"given":"Fadwa","family":"Alrowais","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University,Department of Computer Sciences,Riyadh,Saudi Arabia,11671"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1477-8759","authenticated-orcid":false,"given":"Shabana","family":"Urooj","sequence":"additional","affiliation":[{"name":"College of Engineering, Princess Nourah Bint Abdulrahman University,Department of Electrical Engineering,Riyadh,Saudi Arabia,11671"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5120\/11507-7224"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193210"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCS.2007.4292737"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78262-1_183"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icacite51222.2021.9404734"},{"issue":"1","key":"ref7","article-title":"A Discussion on Elliptic Curve Cryptography and Its Applications","volume":"9","author":"Kumar Verma","year":"2012","journal-title":"JCSI International Journal of Computer Science Issues"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT47987.2019.8991097"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref11","article-title":"The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet","volume-title":"CSO Online","author":"Fruhlinger","year":"2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"journal-title":"Interpreting deep learning: the machine learning rorschach test?","year":"2018","author":"Charles","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3100509"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/aina.2016.158"},{"journal-title":"An efficient one-class SVM for anomaly detection in the internet of things","year":"2021","author":"Yang","key":"ref16"},{"key":"ref17","article-title":"A comparison of data streaming frameworks for anomaly detection in embedded systems","volume-title":"Proceedings of the 1 st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec)","author":"Dunne","year":"2018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952917"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2921912"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LifeTech.2019.8884057"},{"volume-title":"IoT Network Intrusion Dataset","year":"2019","author":"Kang","key":"ref21"}],"event":{"name":"2024 17th International Conference on Sensing Technology (ICST)","start":{"date-parts":[[2024,12,9]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,12,11]]}},"container-title":["2024 17th International Conference on Sensing Technology (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10991955\/10991991\/10992183.pdf?arnumber=10992183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:07:19Z","timestamp":1747458439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10992183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icst62759.2024.10992183","relation":{},"subject":[],"published":{"date-parts":[[2024,12,9]]}}}