{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:33:36Z","timestamp":1743086016704,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1109\/iotsms59855.2023.10325714","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:56:38Z","timestamp":1700765798000},"page":"15-22","source":"Crossref","is-referenced-by-count":1,"title":["An Adaptive Flow-based NIDS for Smart Home Networks Against Malware Behavior Using XGBoost combined with Rough Set Theory"],"prefix":"10.1109","author":[{"given":"Nasser","family":"Alsabilah","sequence":"first","affiliation":[{"name":"Howard University,Dept. of Electrical Engineering &#x0026; Computer Science,Washington DC,USA"}]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Howard University,Dept. of Electrical Engineering &#x0026; Computer Science,Washington DC,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00038"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075503"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI49375.2020.00027"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298134"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.009"},{"article-title":"Deep learning vs. gradient boosting: Benchmarking state-of-the-art machine learning algorithms for credit scoring","year":"2022","author":"Schmitt","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.11.011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96068-1_2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_62800"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484507"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00062"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504162"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02810-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2019.8862720"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IDSTA50958.2020.9264143"},{"key":"ref17","article-title":"Machine learning for anomaly detection in iot networks: Malware analysis on the iot-23 data set","volume-title":"B.S. thesis","author":"Stoian","year":"2020"},{"article-title":"Random forest for malware classification","year":"2016","author":"Garcia","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9343-4_16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3020-3_6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s19010203"},{"issue":"3","key":"ref23","first-page":"287","article-title":"A novel technique for improvement of intrusion detection via combining random forrest and genetic algorithm","volume":"10","author":"Kazemitabar","year":"2019","journal-title":"Journal of Advanced Defense Science & Technology"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0029-9_50"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC57685.2022.10025331"},{"volume-title":"A labeled dataset with malicious and benign iot network traffic","year":"2020","author":"Parmisano","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-1461-5_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.trit.2016.11.001"},{"issue":"11","key":"ref29","first-page":"3450","article-title":"An intelligent approach of rough set in knowledge discovery databases","volume":"1","author":"Tripathy","year":"2007","journal-title":"International Journal of Computer and Information Engineering"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2006.344210"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"}],"event":{"name":"2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","start":{"date-parts":[[2023,10,23]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2023,10,25]]}},"container-title":["2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10325565\/10325665\/10325714.pdf?arnumber=10325714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T01:04:58Z","timestamp":1709427898000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10325714\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iotsms59855.2023.10325714","relation":{},"subject":[],"published":{"date-parts":[[2023,10,23]]}}}