{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:40:44Z","timestamp":1773974444974,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/syscon48628.2021.9447099","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:20:08Z","timestamp":1623273608000},"page":"1-8","source":"Crossref","is-referenced-by-count":25,"title":["Network Traffic Flow Based Machine Learning Technique for IoT Device Identification"],"prefix":"10.1109","author":[{"given":"Imtiaz","family":"Ullah","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qusay H.","family":"Mahmoud","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.284"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055253"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8256018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583538"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20305-3_11"},{"key":"ref16","volume":"72","year":"2012","journal-title":"The Royal Academy of Engineering Smart infrastructure the future"},{"key":"ref17","year":"0","journal-title":"Aposemat IoT-23 A Labeled Dataset with Malicious and Benign IoT Network Traffic"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref19","year":"0","journal-title":"IoT-AD-20"},{"key":"ref4","author":"doyne","year":"0","journal-title":"Hackers Used New Weapons to Disrupt Major Websites across US"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref3","first-page":"2177","article-title":"IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT","author":"miettinen","year":"2017","journal-title":"Proc - Int Conf Distrib Comput Syst"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref5","year":"0","journal-title":"FCC Adopts Broadband Consumer Privacy Rules"},{"key":"ref8","first-page":"167","article-title":"Managed certificate whitelisting - A basis for internet of things security in industrial automation applications","author":"falk","year":"2014","journal-title":"Secur 2014 - 8th Int Conf Emerg Secur Information Syst Technol"},{"key":"ref7","first-page":"756","article-title":"D&#x00CF;oT: A federated self-learning anomaly detection system for IoT","volume":"2019 july","author":"nguyen","year":"2019","journal-title":"Proc - Int Conf Distrib Comput Syst"},{"key":"ref2","author":"apthorpe","year":"2017","journal-title":"A Smart Home Is No Castle Privacy Vulnerabilities of Encrypted IoT Traffic"},{"key":"ref9","first-page":"167","article-title":"Passive data link layer 802.11 wireless device driver fingerprinting","author":"franklin","year":"2006","journal-title":"15th Conf on USENIX security Symp"},{"key":"ref1","year":"0","journal-title":"Internet of things (iot) connected devices installed base worldwide from 2015 to 2025"},{"key":"ref20","first-page":"134","article-title":"A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks","volume":"2020","author":"ullah","year":"2020","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"ref22","volume":"12109","author":"ullah","year":"2020","journal-title":"A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258163"},{"key":"ref24","first-page":"2160","article-title":"A Hybrid Model for Anomaly-based Intrusion Detection in SCADA Networks","author":"ullah","year":"2020","journal-title":"Proc - 2017 IEEE Int Conf Big Data Big Data 2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2017.7946654"},{"key":"ref26","article-title":"A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks","volume":"9","author":"ullah","year":"2020","journal-title":"2019 16th IEEE Annu Consum Commun Netw Conf (CCNC) Las Vegas NV USA"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030530"}],"event":{"name":"2021 IEEE International Systems Conference (SysCon)","location":"Vancouver, BC, Canada","start":{"date-parts":[[2021,4,15]]},"end":{"date-parts":[[2021,5,15]]}},"container-title":["2021 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9447020\/9447051\/09447099.pdf?arnumber=9447099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:21Z","timestamp":1652197341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447099\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/syscon48628.2021.9447099","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]}}}