{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:08:55Z","timestamp":1749787735030,"version":"3.41.0"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tsc.2025.3563680","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T17:33:50Z","timestamp":1745861630000},"page":"1557-1572","source":"Crossref","is-referenced-by-count":0,"title":["ML-Based Intrusion Detection as a Service: Traffic Split Offloading and Cost Allocation in a Multi-Tier Architecture"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5378-2622","authenticated-orcid":false,"given":"Didik","family":"Sudyana","sequence":"first","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3695-5784","authenticated-orcid":false,"given":"Yuan-Cheng","family":"Lai","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Taiwan University of Science and Technology, Taipei, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5226-4396","authenticated-orcid":false,"given":"Ying-Dar","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2018-4057","authenticated-orcid":false,"given":"Piotr","family":"Cho\u0142da","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, AGH University of Krakow, Krak&#x00F3;w, Poland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151248"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3259474"},{"issue":"2018","key":"ref5","first-page":"1","article-title":"MEC in 5G networks","volume":"28","author":"Kekki","year":"2018","journal-title":"ETSI White Paper"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8369023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701270"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109662"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988854"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD54268.2022.9776147"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3029248"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000286"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2020.101157"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685361"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001675"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09548-7"},{"key":"ref17","article-title":"Hybrid approach to intrusion detection in fog-based IoT environments","volume":"180","author":"Antonio","year":"2020","journal-title":"Comput. Netw."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102031"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3203427"},{"article-title":"CICFlowMeter","year":"2018","author":"Lashkari","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet50428.2020.9265461"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102564"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40552-5_4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2937342"},{"article-title":"Analysis: The economics of edge computing","year":"2020","author":"Madden","key":"ref26"},{"author":"Sudyana","key":"ref27","article-title":"Github repository containing code for the paper \u2019ml-based intrusion detection as a service: Traffic split offloading and cost allocation in a multi-tier architecture\u2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3101862"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3111838"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/11031152\/10979500.pdf?arnumber=10979500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T17:43:15Z","timestamp":1749750195000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10979500\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":29,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2025.3563680","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}