{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:45:04Z","timestamp":1778604304711,"version":"3.51.4"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/jiot.2024.3459015","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T18:00:44Z","timestamp":1726164044000},"page":"41261-41272","source":"Crossref","is-referenced-by-count":11,"title":["Spatial Data Transformation and Vision Learning for Elevating Intrusion Detection in IoT Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3472-0108","authenticated-orcid":false,"given":"Van-Linh","family":"Nguyen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering and the Advanced Institute of Manufacturing with High-Tech Innovations, National Chung Cheng University, Chiayi, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0285-1254","authenticated-orcid":false,"given":"Hao-Ping","family":"Tsai","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3364-8084","authenticated-orcid":false,"given":"Hyundong","family":"Shin","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Kyung Hee University, Yongin, South Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4703-4836","authenticated-orcid":false,"given":"Trung Q.","family":"Duong","sequence":"additional","affiliation":[{"name":"School of Electronics, Electrical Engineering and Computer Science, Memorial University, St. John&#x2019;s, NL, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"The largest L7 DDoS attack.","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3126811"},{"issue":"1","key":"ref3","article-title":"A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks","volume":"36","author":"Mukhaini","year":"2024","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3342638"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3175710"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110251","article-title":"Multi-domain collaborative two-level DDoS detection via hybrid deep learning","volume":"242","author":"Feng","year":"2024","journal-title":"Comput. Netw."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops59551.2024.10615938"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050101"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3347170"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3359043"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3041049"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-90923-y"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101752","article-title":"A deep learning method with wrapper based feature extraction for wireless intrusion detection system","volume":"92","author":"Kasongo","year":"2020","journal-title":"Comput. Secur."},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.107871","article-title":"Composite and efficient DDoS attack detection framework for B5G networks","volume":"188","author":"Amaizu","year":"2021","journal-title":"Comput. Netw."},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2020.106738","article-title":"Near real-time security system applied to SDN environments in IoT networks using convolutional neural network","volume":"86","author":"de Assis","year":"2020","journal-title":"Comput. Elect. Eng."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2022.12.009","article-title":"Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced capuchin search algorithm","volume":"175","author":"Asgharzadeh","year":"2023","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.simpat.2019.102031","article-title":"Deep recurrent neural network for IoT intrusion detection system","volume":"101","author":"Almiani","year":"2020","journal-title":"Simulat. Model. Pract. Theory"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108076","article-title":"LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system","volume":"192","author":"Gupta","year":"2021","journal-title":"Comput. Netw."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3310794"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3294259"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.ins.2023.03.052","article-title":"DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks","volume":"634","author":"Ding","year":"2023","journal-title":"Inf. Sci."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500458"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123791"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971776"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3119055"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3196942"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3210189"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3192035"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034156"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3229005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3376434"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035967"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3404778"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109809","article-title":"DoS\/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol","volume":"231","author":"Alatram","year":"2023","journal-title":"Comput. Netw."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref38","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2021","journal-title":"arXiv:2010.11929"},{"key":"ref39","article-title":"Attention is all you need","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Vaswani","year":"2017"},{"key":"ref40","article-title":"Better plain ViT baselines for ImageNet-1k","author":"Beyer","year":"2022","journal-title":"arXiv:2205.01580"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685953"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3332284"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10786863\/10679216.pdf?arnumber=10679216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:03:14Z","timestamp":1733954594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":42,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3459015","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,15]]}}}