{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:03:06Z","timestamp":1769720586390,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1109\/wincom59760.2023.10323032","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:07:27Z","timestamp":1700680047000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["IA Applied to IIoT Intrusion Detection: An Overview"],"prefix":"10.1109","author":[{"given":"Abdelilah","family":"Serhane","sequence":"first","affiliation":[{"name":"Ibn Tofail University,Faculty of Sciences, Laboratory of Research in Informatics (LaRI),Kenitra,Morocco"}]},{"given":"El-Mehdi","family":"Hamzaoui","sequence":"additional","affiliation":[{"name":"National Centre for Nuclear Science and Technology (CNESTEN-Morocco)"}]},{"given":"Khalil","family":"Ibrahimi","sequence":"additional","affiliation":[{"name":"Ibn Tofail University,Faculty of Sciences, Laboratory of Research in Informatics (LaRI),Kenitra,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/gcwcn.2018.8668630"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2021.3138703"},{"key":"ref3","article-title":"An Overview of Explainable Artificial Intelligence for Cyber Security","volume":"1025","author":"Khoulimi","year":"2022","journal-title":"Explainable Artificial Intelligence for Cyber Security. Studies in Computational Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09496-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100365"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2021.0120411"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/iccike47802.2019.9004362"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref9","article-title":"The BoT-IoT dataset Available online and can be downloaded from"},{"key":"ref10","article-title":"Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)","volume-title":"Selected Papers from the 12th International Networking Conference. INC 2020. Lecture Notes in Networks and Systems","volume":"180","author":"Hindy"},{"key":"ref11","article-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]","author":"Garcia","year":"2020","journal-title":"Zenodo"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref13","article-title":"The ToN-IoT dataset Available online and can be downloaded from"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2871719"},{"key":"ref15","article-title":"The UNSW-NB 15 dataset Available online and can be downloaded from"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref17","article-title":"The CIC-IDS2017 dataset Available online and can be downloaded from"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/cisda.2009.5356528"},{"key":"ref19","article-title":"NSL-KDD dataset dataset Available online and can be downloaded from"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/prdc47002.2019.00056"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3140015"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc.2019.8666588"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/atnac.2018.8615294"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6689134"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/isncc.2016.7746067"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7154587"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.181"}],"event":{"name":"2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)","location":"Istanbul, Turkiye","start":{"date-parts":[[2023,10,26]]},"end":{"date-parts":[[2023,10,28]]}},"container-title":["2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10322877\/10322879\/10323032.pdf?arnumber=10323032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:28:51Z","timestamp":1710361731000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wincom59760.2023.10323032","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]}}}