{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:23:32Z","timestamp":1773771812757,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3242102.3242145","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"259-263","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["An Intrusion Detection System for Constrained WSN and IoT Nodes Based on Binary Logistic Regression"],"prefix":"10.1145","author":[{"given":"Christiana","family":"Ioannou","sequence":"first","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]},{"given":"Vasos","family":"Vassiliou","sequence":"additional","affiliation":[{"name":"University of Cyprus &amp; RISE Research Center on Interactive Media, Smart Systems and Emerging Technologies, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2071026"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089765"},{"key":"e_1_3_2_1_3_1","volume-title":"Powertrace: Network-Level Power Profiling for Low-power Wireless Networks. Technical Report","author":"Dunkels A.","year":"2011"},{"key":"e_1_3_2_1_4_1","volume-title":"The Impact of Network Layer Attacks in Wireless Sensor Networks. In International Workshop on Secure Internet of Things (SIoT","author":"Ioannou C.","year":"2016"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989293.2989305"},{"key":"e_1_3_2_1_6_1","volume-title":"An Intrusion Detection System for Wireless Sensor Networks. In 2017 24rd International Conference on Telecommunications (ICT).","author":"Ioannou C."},{"key":"e_1_3_2_1_7_1","unstructured":"MAXFOR Technology Inc 2011. Sensor Network Makes Sensational World. MAXFOR Technology Inc.  MAXFOR Technology Inc 2011. Sensor Network Makes Sensational World. MAXFOR Technology Inc."},{"key":"e_1_3_2_1_8_1","unstructured":"Moteiv Corporation 2006. Tmote Sky Ultra Low Power IEEE 802.15.4 compliant wireless sensor module. Moteiv Corporation.  Moteiv Corporation 2006. Tmote Sky Ultra Low Power IEEE 802.15.4 compliant wireless sensor module. Moteiv Corporation."},{"key":"e_1_3_2_1_9_1","unstructured":"Fredrik \u00d6sterlind. 2011. Improving Low-Power Wireless Protocols With TimingAccurate Simulation. (2011).  Fredrik \u00d6sterlind. 2011. Improving Low-Power Wireless Protocols With TimingAccurate Simulation. (2011)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"e_1_3_2_1_11_1","unstructured":"US-CERT. 2016. Alert (TA16--288A) Heightened DDoS Threat Posed by Mirai and Other Botnets. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA16--288A  US-CERT. 2016. Alert (TA16--288A) Heightened DDoS Threat Posed by Mirai and Other Botnets. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA16--288A"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","location":"Montreal QC Canada","acronym":"MSWIM '18","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242102.3242145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:36Z","timestamp":1750207416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":12,"alternative-id":["10.1145\/3242102.3242145","10.1145\/3242102"],"URL":"https:\/\/doi.org\/10.1145\/3242102.3242145","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}