{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:52:33Z","timestamp":1763664753837,"version":"3.37.3"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1109\/smc52423.2021.9658711","type":"proceedings-article","created":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T20:34:35Z","timestamp":1641501275000},"page":"1919-1926","source":"Crossref","is-referenced-by-count":6,"title":["Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning"],"prefix":"10.1109","author":[{"given":"Jose","family":"Roldan-Gomez","sequence":"first","affiliation":[]},{"given":"Juan","family":"Boubeta-Puig","sequence":"additional","affiliation":[]},{"given":"Juan Manuel","family":"Castelo Gomez","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Carrillo-Mondejar","sequence":"additional","affiliation":[]},{"given":"Jose Luis","family":"Martinez Martinez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113251"},{"key":"ref11","first-page":"1301","article-title":"A survey on machine learning: concept, algorithms and applications","volume":"5","author":"das","year":"2017","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2404803"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1511-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24965-5_85"},{"article-title":"A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security","year":"2018","author":"al-garadi","key":"ref15"},{"year":"2021","key":"ref16","article-title":"Complex event processor"},{"year":"2020","key":"ref17","article-title":"Streaming Integrator"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"ref19","first-page":"1093","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017"},{"key":"ref4","article-title":"Complex Event Processing in Distributed Systems","author":"luckham","year":"1998","journal-title":"Stanford University Tech Rep"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781119198697"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/34.908974"},{"year":"2021","key":"ref8","article-title":"Esper"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.06.021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"year":"2021","key":"ref9","article-title":"Siddhi"},{"key":"ref1","article-title":"Projecting the growth and economic impact of the Internet of things","volume":"15","author":"thierer","year":"2015","journal-title":"Mercatus Center at George Mason University"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03603-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00176"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC49727.2020.00016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3041121"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548210"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.07.009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323766"}],"event":{"name":"2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","start":{"date-parts":[[2021,10,17]]},"location":"Melbourne, Australia","end":{"date-parts":[[2021,10,20]]}},"container-title":["2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9658572\/9658575\/09658711.pdf?arnumber=9658711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:30Z","timestamp":1652201790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9658711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/smc52423.2021.9658711","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]}}}