{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:14:33Z","timestamp":1772554473794,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,9]]},"DOI":"10.1109\/sds64317.2024.10883899","type":"proceedings-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:19:35Z","timestamp":1739902775000},"page":"115-122","source":"Crossref","is-referenced-by-count":8,"title":["Advancing IoT Security: A Review of Intrusion Detection Systems Challenges and Emerging Solutions"],"prefix":"10.1109","author":[{"given":"Tamara","family":"Zhukabayeva","sequence":"first","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Faculty of Information Technology,Astana,Kazakhstan"}]},{"given":"Elhadj","family":"Benkhelifa","sequence":"additional","affiliation":[{"name":"Staffordshire University,Smart Systems, AI and Cybersecurity Research Centre,UK"}]},{"given":"Dina","family":"Satybaldina","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Information Security and Cryptology,Astana,Kazakhstan"}]},{"given":"Ateeq Ur","family":"Rehman","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Faculty of Information Technology,Astana,Kazakhstan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3480011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IoT-SIU.2019.8777334"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3468897"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/PEMWN62766.2024.10737546"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3462735"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AICTC58357.2024.10735034"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121912.00006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.20"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3473289"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396943"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568495"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2012.6531064"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2808691"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3473289"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108771"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110227"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2024.3465516"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101307"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18767-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00814-4"},{"key":"ref27","article-title":"Hybrid network intrusion detection systems: A systematic review","author":"Seiba","year":"2023","journal-title":"Scientific and practical cyber security journal"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00609-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599758"},{"key":"ref30","article-title":"Software-defined networking (sdn) and network function virtualization (nfv) in telecommunication: A computer science perspective","author":"Kenner","year":"2024"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-35863-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107231"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3126811"}],"event":{"name":"2024 11th International Conference on Software Defined Systems (SDS)","location":"Gran Canaria, Spain","start":{"date-parts":[[2024,12,9]]},"end":{"date-parts":[[2024,12,11]]}},"container-title":["2024 11th International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10883772\/10883884\/10883899.pdf?arnumber=10883899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:07Z","timestamp":1740081907000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10883899\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/sds64317.2024.10883899","relation":{},"subject":[],"published":{"date-parts":[[2024,12,9]]}}}