{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:03:17Z","timestamp":1769011397468,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["U1713212"],"award-info":[{"award-number":["U1713212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["61836005"],"award-info":[{"award-number":["61836005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["61702341"],"award-info":[{"award-number":["61702341"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province-Outstanding Youth Program","doi-asserted-by":"publisher","award":["2019B151502018"],"award-info":[{"award-number":["2019B151502018"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technology Research Project of Shenzhen City","award":["JSGG20180507182904693"],"award-info":[{"award-number":["JSGG20180507182904693"]}]},{"name":"Public Technology Platform of Shenzhen City","award":["GGFW2018021118145859"],"award-info":[{"award-number":["GGFW2018021118145859"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/jiot.2020.3024645","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T20:38:58Z","timestamp":1600461538000},"page":"3554-3566","source":"Crossref","is-referenced-by-count":56,"title":["Edge Intelligence (EI)-Enabled HTTP Anomaly Detection Framework for the Internet of Things (IoT)"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3563-8672","authenticated-orcid":false,"given":"Yufei","family":"An","sequence":"first","affiliation":[{"name":"Guangdong Laboratory of Artificial Intelligence and Digital Economy, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1006-7594","authenticated-orcid":false,"given":"F. Richard","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information Technology, Carleton University, Ottawa, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2208-962X","authenticated-orcid":false,"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[{"name":"Guangdong Laboratory of Artificial Intelligence and Digital Economy, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6203-1254","authenticated-orcid":false,"given":"Jianyong","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangdong Laboratory of Artificial Intelligence and Digital Economy, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3529-2640","authenticated-orcid":false,"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[{"name":"Guangdong Laboratory of Artificial Intelligence and Digital Economy, Shenzhen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref39","year":"2020","journal-title":"VirusTotal"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-1609"},{"key":"ref33","first-page":"595","article-title":"Hypertext transfer protocol (http\/1.1): Semantics and content","volume":"30","author":"danielsson","year":"2017","journal-title":"Faculty of Arts and Sciences"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0484-y"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.010"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0046"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1782-2"},{"key":"ref36","first-page":"761","article-title":"An unsupervised method for detection of XSS attack","volume":"19","author":"goswami","year":"2017","journal-title":"Int J Netw Security"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2925415"},{"key":"ref34","author":"flanders","year":"2019","journal-title":"A simple and intuitive algorithm for preventing directory traversal attacks"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800344"},{"key":"ref40","author":"gim\u00e9nez","year":"2010","journal-title":"HTTP dataset CSIC"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2019.8760106"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0344-y"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2017.04.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854842"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.07.019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800479"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771228"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2017.8314974"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2015.7224759"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9102"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070516"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-018-0123-6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity.2017.56"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.874579"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895751"},{"key":"ref7","author":"chalapathy","year":"2018","journal-title":"Anomaly Detection using One-Class Neural Networks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416345"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2950242"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2018.8686880"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.937"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997375"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_121"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2018.10660"},{"key":"ref26","author":"niedermaier","year":"2019","journal-title":"Efficient intrusion detection on low-performance industrial IoT edge node devices"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-19353-9_2"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9358034\/09199895.pdf?arnumber=9199895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:53Z","timestamp":1652194433000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9199895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":40,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3024645","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}