{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:53:39Z","timestamp":1762005219565,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/meco49872.2020.9134241","type":"proceedings-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T20:30:08Z","timestamp":1594153808000},"page":"1-6","source":"Crossref","is-referenced-by-count":36,"title":["IoT Network Attack Detection and Mitigation"],"prefix":"10.1109","author":[{"given":"Erol","family":"Gelenbe","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Frohlich","sequence":"additional","affiliation":[]},{"given":"Mateusz","family":"Nowak","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Aikaterini","family":"Protogerou","sequence":"additional","affiliation":[]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89183-3_2"},{"journal-title":"Weight initialization for random neural network reinforcement learning (appl no 15\/718 901)","year":"2019","author":"salam","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2474406"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538809"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2013.6727820"},{"key":"ref37","first-page":"1700","article-title":"Call admission control in atm using the diffusion model","author":"mang","year":"0","journal-title":"Proceedings of GLOBECOM'96 1996 IEEE Global Telecommunications Conference 3"},{"key":"ref36","first-page":"7","article-title":"Energy-aware routing in the cognitive packet network","author":"gelenbe","year":"2011","journal-title":"Energy"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1993.5.1.154"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"ref10","article-title":"Securing internet of things (iot) with software defined networking (sdn)","author":"kalkan","year":"2017","journal-title":"IEEE Communications Magazine"},{"key":"ref11","article-title":"Ghost: Safeguarding home iot environments with personalised real-time risk control","author":"collen","year":"0","journal-title":"Recent Cybersecurity Research in Europe Proceedings of the 2018 ISCIS Security Workshop Imperial College London"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700587"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2018.8531004"},{"journal-title":"Iot network risk assessment and mitigation The seriot approach","year":"2020","author":"baldini","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1186778.1186782"},{"journal-title":"Deep learning on graphs A survey","year":"2018","author":"zhang","key":"ref16"},{"key":"ref17","article-title":"Relational inductive biases, deep learning, and graph networks","author":"battaglia","year":"2018","journal-title":"ArXiv"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2006.873213"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600514"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.183"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073806"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2335312"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600614"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2992559"},{"journal-title":"Open Networking Foundation","article-title":"Openflow switch specification, version 1.3.5","year":"2015","key":"ref29"},{"key":"ref5","article-title":"Preface: Current research on cybersecurity in europe","volume":"821","author":"gelenbe","year":"0","journal-title":"Proceedings of the 2018 ISCIS Security Workshop Recent Cybersecurity Research in Europe"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.45"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/15501320600642718"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119341451.ch10"},{"key":"ref9","article-title":"Energy life-time of wireless nodes with and without energy harvesting under network attacks","volume":"821","author":"gelenbe","year":"0","journal-title":"Proceedings of the 2018 ISCIS Security Workshop Recent Cybersecurity Research in Europe"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2746186"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511138"},{"journal-title":"Programmable Networks for IP Service Deployment","year":"2004","author":"galis","key":"ref22"},{"key":"ref21","first-page":"22","volume":"17","author":"tsarouchis","year":"0","journal-title":"A policy-based management architecture for active and programmable networks"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805395-9.00001-0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2007.4295666"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71682-4_5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2636810"}],"event":{"name":"2020 9th Mediterranean Conference on Embedded Computing (MECO)","start":{"date-parts":[[2020,6,8]]},"location":"Budva, Montenegro","end":{"date-parts":[[2020,6,11]]}},"container-title":["2020 9th Mediterranean Conference on Embedded Computing (MECO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9125448\/9134063\/09134241.pdf?arnumber=9134241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:53:49Z","timestamp":1656453229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9134241\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/meco49872.2020.9134241","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}