{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:00:03Z","timestamp":1767852003435,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/iotsms62296.2024.10710299","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:50Z","timestamp":1728926570000},"page":"98-105","source":"Crossref","is-referenced-by-count":3,"title":["CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution"],"prefix":"10.1109","author":[{"given":"Ali","family":"Deveci","sequence":"first","affiliation":[{"name":"Hacettepe University,WISE Lab.,Ankara,Turkey"}]},{"given":"Selim","family":"Y\u0131lmaz","sequence":"additional","affiliation":[{"name":"Hacettepe University,WISE Lab.,Ankara,Turkey"}]},{"given":"Sevil","family":"Sen","sequence":"additional","affiliation":[{"name":"Hacettepe University,WISE Lab.,Ankara,Turkey"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Number of IoT Devices (2024) explodingtopics.com","year":"2024"},{"key":"ref2","article-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"Alexander","year":"2012","journal-title":"RFC 6550"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30229-9_12"},{"key":"ref5","article-title":"Exploring placement of intrusion detection systems in rpl-based internet of things","author":"Yilmaz","year":"2023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2069063.2069076"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-801538-4.00004-5"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.swevo.2011.08.001","article-title":"A multi-objective artificial bee colony algorithm","volume":"2","author":"Akbari","year":"2012","journal-title":"Swarm and Evolutionary Computation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s22186765"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61746-2_16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.2018.25905181"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029191"},{"issue":"3","key":"ref14","first-page":"290","article-title":"An intrusion prediction technique based on co-evolutionary immune system for network security (coco-idp)","volume":"9","author":"Ahmadi","year":"2009","journal-title":"Int. J. Netw. Secur"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10852-007-9061-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103215"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2824250"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4813"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1709-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2019.8789961"},{"key":"ref21","article-title":"Genetic programming: an introduction: on the automatic evolution of computer programs and its applications","author":"Banzhaf","year":"1998"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096029"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00175355"},{"key":"ref24","article-title":"A java-based evolutionary computation research system","year":"2022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"},{"key":"ref26","article-title":"IoT, Communication between TI Sensortag and Zolertia Z1-piratefache.ch","year":"2023"}],"event":{"name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","location":"Malm\u00f6, Sweden","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710136\/10710182\/10710299.pdf?arnumber=10710299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:58:01Z","timestamp":1728968281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710299\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iotsms62296.2024.10710299","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}