{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:10:48Z","timestamp":1730279448501,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/iwcmc51323.2021.9498759","type":"proceedings-article","created":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T22:27:05Z","timestamp":1628548025000},"page":"1483-1488","source":"Crossref","is-referenced-by-count":2,"title":["Grey Wolf Optimizer Enhanced SVM for IoT Fault Detection"],"prefix":"10.1109","author":[{"given":"Ines","family":"Rahmany","sequence":"first","affiliation":[]},{"given":"Hadhami","family":"Mnassri","sequence":"additional","affiliation":[]},{"given":"Tarek","family":"Moulahi","sequence":"additional","affiliation":[]},{"given":"Salim El","family":"Khediri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/15325000802046496"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2016.02.015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","article-title":"TON - IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-driven Intrusion Detection Systems","volume":"8","author":"abdullah","year":"2020","journal-title":"IEEE Access"},{"key":"ref14","first-page":"42","author":"mohammed ali","year":"2018","journal-title":"A survey of machine and deep learning methods for Internet of Things (IoT) security"},{"key":"ref15","first-page":"403","article-title":"Machine Learning Techniques to Reduce Error in the Internet of Things","author":"anisha","year":"2019","journal-title":"IEEE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2771226"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"journal-title":"Data Mining Concepts and Techniques","year":"2011","author":"han","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941110"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2710627"},{"key":"ref3","first-page":"1","article-title":"Real-time Room Occupancy Estimation with Bayesian Machine Learning using a Single PIR Sensor and Microcontroller","author":"charles leech","year":"2017","journal-title":"IEEE Sensors Applications Symposium (SAS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631434"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.jisa.2017.03.001","article-title":"Lightweight adaptive Random-Forest for IoT rule generation and execution","volume":"34","author":"menachem","year":"2017","journal-title":"Journal of Information Security and Applications"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/978-3-319-50127-7_11","article-title":"Deep Learning for Classification of Malware System Call Sequences Advances in Artificial Intelligence","author":"kolosnjaji","year":"2016","journal-title":"Lecture Notes in Computer Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref2","first-page":"1","article-title":"A Comprehensive Study of Security of Internet-of-Things","volume":"pp","author":"nia","year":"2017","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.060"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2013.09.011"},{"key":"ref20","article-title":"Smart Home Networks: Security Perspective and ML-based DDoS Detection","author":"al mtawa","year":"0","journal-title":"Accepted in The Canadian Conference on Electrical and Computer Engineering (CCECE)"}],"event":{"name":"2021 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2021,6,28]]},"location":"Harbin City, China","end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9497780\/9498576\/09498759.pdf?arnumber=9498759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:25Z","timestamp":1652197705000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9498759\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iwcmc51323.2021.9498759","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}