{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T03:32:38Z","timestamp":1772076758879,"version":"3.50.1"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency through the Open, Programmable, Secure 5G Program","doi-asserted-by":"publisher","award":["HR001120C0160"],"award-info":[{"award-number":["HR001120C0160"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tnet.2024.3408675","type":"journal-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:48:18Z","timestamp":1717696098000},"page":"3929-3944","source":"Crossref","is-referenced-by-count":24,"title":["Correlation-Aware Neural Networks for DDoS Attack Detection in IoT Systems"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0017-9701","authenticated-orcid":false,"given":"Arvin","family":"Hekmati","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Southern California, Los Angeles, CA, USA"}]},{"given":"Jiahe","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Southern California, Los Angeles, CA, USA"}]},{"given":"Tamoghna","family":"Sarkar","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3225-2306","authenticated-orcid":false,"given":"Nishant","family":"Jethwa","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7318-6176","authenticated-orcid":false,"given":"Eugenio","family":"Grippo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9994-9931","authenticated-orcid":false,"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[{"name":"Department of Computer Science and the Department of Electrical and Computer Engineering, University of Southern California, Los Angeles, CA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE.2016.7589556"},{"key":"ref2","volume-title":"Number of Internet of Things (IoT) Connected Devices Worldwide From 2019 To 2021, With Forecasts From 2022 To 2030","year":"2022"},{"key":"ref3","volume-title":"Internet of Things Research Study\u20142014 Report","year":"2022"},{"key":"ref4","volume-title":"Internet of Things Research Study\u20142015 Report","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514286"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22540-6_42"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101650"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA.2017.12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2018.8585344"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00599-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3493695"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN54977.2022.9868942"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2002.1167058"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC48522.2020.9200909"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2018.8589104"},{"key":"ref23","volume-title":"NSL-KDD Dataset","year":"2022"},{"key":"ref24","volume-title":"University of New Brunswick `DDoS Evaluation Dataset (CICDDoS2019)","year":"2019"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN50289.2020.9289894"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1504\/ijsnet.2020.109720"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106906"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3049942"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3279615"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2007.350758"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2022.05.002"},{"issue":"4","key":"ref33","first-page":"1247","article-title":"Security for the Internet of Things: A survey of existing mechanisms, protocols and open research issues","volume":"33","author":"G\u00f6rmus","year":"2018","journal-title":"J. Fac. Eng. Archit. Gazi Univ."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12122563"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728533"},{"key":"ref36","volume-title":"IoT-MQTT based denial of service attack modelling and detection","author":"Syed","year":"2020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s22020567"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2020.1767484"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/camad.2018.8514971"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2018.8553722"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2017.8284731"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2996502"},{"key":"ref44","volume-title":"The CTU-13 Dataset. A Labeled Dataset With Botnet, Normal and Background Traffic","year":"2022"},{"issue":"16","key":"ref45","doi-asserted-by":"crossref","first-page":"4372","DOI":"10.3390\/s20164372","article-title":"Machine learning-based IoT-botnet attack detection with sequential architecture","volume":"20","author":"Soe","year":"2020","journal-title":"Sensors"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/NoF50125.2020.9249198"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767194"},{"key":"ref48","volume-title":"DARPA 2000 Intrustion Detection Scenario Specific Data Sets","year":"2021"},{"key":"ref49","volume-title":"The CAIDA UCSD `DDoS Attack 2007 Dataset","year":"2007"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref51","volume-title":"University of New Brunswick `CSE-CIC-IDS2018 on AWS","year":"2018"},{"key":"ref52","volume-title":"University of New South Wales, The Bot-IoT Dataset","year":"2021"},{"key":"ref53","volume-title":"A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks","year":"2021"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106187"},{"key":"ref55","volume-title":"Python Fitter Library","year":"2023"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/72.159058"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref59","first-page":"1","article-title":"Attention is all you need","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Vaswani"},{"key":"ref60","article-title":"Autoencoders","author":"Bank","year":"2020","journal-title":"arXiv:2003.05991"},{"key":"ref61","volume-title":"Classification on Imbalanced Data","year":"2022"},{"key":"ref62","first-page":"1","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Lundberg"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3625687.3628392"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/90\/10720541\/10550165.pdf?arnumber=10550165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T04:36:55Z","timestamp":1729226215000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10550165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":63,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3408675","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}