{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T13:09:31Z","timestamp":1769087371713,"version":"3.49.0"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"NSF through the \u201cAI Institute for Future Edge Networks and Distributed Intelligence (AI-EDGE)\u201d","award":["2112471"],"award-info":[{"award-number":["2112471"]}]},{"name":"Project SERICS under the MUR National Recovery and Resilience Plan funded by the European Union\u2014NextGenerationEU","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,4,1]]},"DOI":"10.1109\/jiot.2023.3333948","type":"journal-article","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T19:31:40Z","timestamp":1700508700000},"page":"12579-12601","source":"Crossref","is-referenced-by-count":9,"title":["Kalis2.0\u2014A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6030-0027","authenticated-orcid":false,"given":"Antonino","family":"Rullo","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Modeling, Electronics, and Systems, University of Calabria, Rende, Italy"}]},{"given":"Daniele","family":"Midi","sequence":"additional","affiliation":[{"name":"Devices &#x0026; Services, Google, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7148-0000","authenticated-orcid":false,"given":"Anand","family":"Mudjerikar","sequence":"additional","affiliation":[{"name":"Devices &#x0026; Services, Google, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4029-7051","authenticated-orcid":false,"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Lawson Computer Science Department, Purdue University, West Lafayette, IN, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s20215997"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref3","volume-title":"Bitdefender Box","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref5","volume-title":"CERT","year":"2023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600993"},{"key":"ref7","volume-title":"Norton Core","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00257"},{"key":"ref9","volume-title":"SENSE","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.01.024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3262614"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103271"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.01.002"},{"key":"ref14","volume-title":"ZingBox","year":"2023"},{"key":"ref15","first-page":"1","article-title":"ContexloT: Towards providing contextual integrity to appified IoT platforms","volume-title":"Proc. NDSS","author":"Jia"},{"key":"ref16","volume-title":"Kali Linux","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.269"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881998"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02696-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.021"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"165","DOI":"10.4028\/www.scientific.net\/AMR.366.165","article-title":"An artificial immune-based distributed intrusion detection model for the Internet of Things","volume":"366","author":"Liu","year":"2011","journal-title":"Adv. Mater. Res."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9361348"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3210"},{"key":"ref24","first-page":"255","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","volume-title":"Proc. 6th Annu. Int. Conf. Mobile Comput. Netw.","author":"Marti"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.104"},{"key":"ref26","volume-title":"CVE","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860484"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.26"},{"key":"ref29","volume-title":"National Vulnerability Database","year":"2023"},{"key":"ref30","volume-title":"ChipWhisperer","year":"2023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101491"},{"key":"ref32","volume-title":"Blip: An implementation of 6lowpan in tinyos","author":"Nithin","year":"2023"},{"key":"ref33","volume-title":"Open Web Application Security Project","year":"2023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087175"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.011"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0998-6"},{"key":"ref38","volume-title":"Penteston","year":"2023"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s18103236"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.55"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625143"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.48"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3139293"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_23"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103118"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2864536"},{"key":"ref50","first-page":"397","article-title":"6thSense: A context-aware sensor-based attack detector for smart devices","volume-title":"Proc. 26th USENIX Security Symp.","author":"Sikder"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359840"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6632747"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2973677"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246098"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/10479190\/10323290-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10479190\/10323290.pdf?arnumber=10323290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T20:50:49Z","timestamp":1711659049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,1]]},"references-count":55,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3333948","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,1]]}}}