{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:42:43Z","timestamp":1777891363138,"version":"3.51.4"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1109\/wincom55661.2022.9966466","type":"proceedings-article","created":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T22:22:13Z","timestamp":1670365333000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["TTIDS : A Time-Driven Trust Based Intrusion Detection System for IoT Networks"],"prefix":"10.1109","author":[{"given":"Mouad","family":"Choukhairi","sequence":"first","affiliation":[{"name":"Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco"}]},{"given":"Youssef","family":"Fakhri","sequence":"additional","affiliation":[{"name":"Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco"}]},{"given":"Mohamed","family":"Amnai","sequence":"additional","affiliation":[{"name":"Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2017.161"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983132"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947870"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0288-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0194-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462117"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.12691\/jcsa-1-3-1"},{"key":"ref14","first-page":"1296","article-title":"Contiki-based mitigation of UDP flooding attacks in the Internet of things","author":"malik","year":"2017","journal-title":"2017 International Conference on Computing Communication and Automation (ICCCA)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.04.001"},{"key":"ref16","first-page":"1","article-title":"A survey: At-tacks on RPL and 6LoWPAN in IoT","author":"pongle","year":"2015","journal-title":"2015 International Conference on Pervasive Computing (ICPC)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref18","first-page":"692","article-title":"A detailed classification of routing attacks against RPL in internet of things","author":"sharma","year":"2017","journal-title":"International Journal of Advance Research Ideas and Innovations in Technology 3 1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2973677"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2010.5508273"},{"key":"ref4","first-page":"34","article-title":"Vision and challenges for re-alising the Internet of Things","volume":"3 3","author":"sundmaeker","year":"2010","journal-title":"Cluster of European Research Projects on the Internet of Things European Commision"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069710"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577970"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.10.012"},{"key":"ref5","first-page":"1","article-title":"The internet of things: An overview","volume":"80","author":"rose","year":"2015","journal-title":"Internet Society (ISOC)"},{"key":"ref8","article-title":"Giacomo Morabito c","author":"atzori","year":"0","journal-title":"The Internet of Things A survey (2010)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/inventions4010022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref1","first-page":"488","article-title":"Industrial internet: Pushing the boundaries","author":"evans","year":"2012","journal-title":"General Electric Report"},{"key":"ref20","first-page":"459","article-title":"A Taxonomy of Attacks in RPL-based Internet of Things","volume":"18 3","author":"mayzaud","year":"2016","journal-title":"International Journal of Network Secu-rity"},{"key":"ref22","first-page":"266","article-title":"A survey of intrusion detection systems in wireless sensor networks","volume":"16 1","author":"butun","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2272099"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"},{"key":"ref23","first-page":"1","article-title":"Boudec. A robust reputation system for peer-to-peer and mobile ad-hoc networks","author":"buchegger","year":"2004","journal-title":"Proceedings of P2PEcon Cambridge MA USA"},{"key":"ref26","first-page":"26","article-title":"Belief and reputation based recommended trust computation in wireless sensor networks","volume":"155 8","author":"zhang","year":"2013","journal-title":"Sensors & Transducers"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.165"}],"event":{"name":"2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)","location":"Rabat, Morocco","start":{"date-parts":[[2022,10,26]]},"end":{"date-parts":[[2022,10,29]]}},"container-title":["2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9966415\/9966416\/09966466.pdf?arnumber=9966466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T14:36:01Z","timestamp":1672065361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9966466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/wincom55661.2022.9966466","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]}}}