{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:02Z","timestamp":1750221122655,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316729","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"550-554","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model"],"prefix":"10.1145","author":[{"given":"Ahmad","family":"Alshammari","sequence":"first","affiliation":[{"name":"Oakland University, Rochester, MI"}]},{"given":"Mohamed A.","family":"Zohdy","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, MI"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"issue":"3","key":"e_1_3_2_1_1_1","first-page":"459","article-title":"A taxonomy of attacks in RPL-based internet of things","author":"Mayzaud A.","year":"2016","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_2_1","unstructured":"D. Anstee Interviewee Chief Security Technologist - Arbor Networks {Interview}. 26 April 2017.  D. Anstee Interviewee Chief Security Technologist - Arbor Networks {Interview}. 26 April 2017."},{"key":"e_1_3_2_1_3_1","unstructured":"A. Cherepanov \"Industroyer: biggest threat to industrial control systems since Stuxnet \" WeLiveSecurity 12 June 2017. {Online}. Available: https:\/\/www.welivesecurity.com\/2017\/06\/12\/industroyer-biggest-threat-industrial-control-systems-since-stuxnet\/. {Accessed June 2017}.  A. Cherepanov \"Industroyer: biggest threat to industrial control systems since Stuxnet \" WeLiveSecurity 12 June 2017. {Online}. Available: https:\/\/www.welivesecurity.com\/2017\/06\/12\/industroyer-biggest-threat-industrial-control-systems-since-stuxnet\/. {Accessed June 2017}."},{"key":"e_1_3_2_1_4_1","unstructured":"Check Point Research Team \"Hacked in translation - from subtitles to complete takeover \" 23 May 2017. {Online}. Available: https:\/\/blog.checkpoint.com\/2017\/05\/23\/hacked-in-translation\/. {Accessed June 2017}.  Check Point Research Team \"Hacked in translation - from subtitles to complete takeover \" 23 May 2017. {Online}. Available: https:\/\/blog.checkpoint.com\/2017\/05\/23\/hacked-in-translation\/. {Accessed June 2017}."},{"key":"e_1_3_2_1_5_1","unstructured":"M. Kumar \"DDoS attack takes down central heating system amidst winter in finland \" 9 November 2016. {Online}. Available: http:\/\/thehackernews.com\/2016\/11\/heating-system-hacked.html. {Accessed June 2017}.  M. Kumar \"DDoS attack takes down central heating system amidst winter in finland \" 9 November 2016. {Online}. Available: http:\/\/thehackernews.com\/2016\/11\/heating-system-hacked.html. {Accessed June 2017}."},{"key":"e_1_3_2_1_6_1","unstructured":"G. Veerendra \"Hacking the internet of things (IoT) a case study on DTH vulnerabilities \" 17 October 2016. {Online}. Available: http:\/\/www.secpod.com\/resource\/whitepapers\/Hacking-IoT-A-Case-Study-on-Tata-Sky-DTH-Vulnerabilities.pdf. {Accessed June 2017}.  G. Veerendra \"Hacking the internet of things (IoT) a case study on DTH vulnerabilities \" 17 October 2016. {Online}. Available: http:\/\/www.secpod.com\/resource\/whitepapers\/Hacking-IoT-A-Case-Study-on-Tata-Sky-DTH-Vulnerabilities.pdf. {Accessed June 2017}."},{"key":"e_1_3_2_1_7_1","article-title":"A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications","author":"Lin J.","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"volume-title":"Vadgaon","year":"2015","author":"Pongle P.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"B. Young \"A taxonomy of IoT attacks \" 8 November 2016. {Online}. Available: https:\/\/www.linkedin.com\/pulse\/taxonomy-iot-attacks-bob-young. {Accessed June 2017}.  B. Young \"A taxonomy of IoT attacks \" 8 November 2016. {Online}. Available: https:\/\/www.linkedin.com\/pulse\/taxonomy-iot-attacks-bob-young. {Accessed June 2017}."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/505741.505743"},{"key":"e_1_3_2_1_11_1","unstructured":"L. Tingting J. Lemiere and L. Yang \"Proper initialization of hidden Markov models for industrial applications \" in IEEE China Summit and International Conference on Signal and Information Processing Xi'an 2014.  L. Tingting J. Lemiere and L. Yang \"Proper initialization of hidden Markov models for industrial applications \" in IEEE China Summit and International Conference on Signal and Information Processing Xi'an 2014."},{"key":"e_1_3_2_1_12_1","unstructured":"G. Pallavi \"Hidden Markov models \" 16 March 2015. {Online}. Available: https:\/\/www.slideshare.net\/shivangisaxena566\/hidden-markov-model-ppt. {Accessed May 2017}.  G. Pallavi \"Hidden Markov models \" 16 March 2015. {Online}. Available: https:\/\/www.slideshare.net\/shivangisaxena566\/hidden-markov-model-ppt. {Accessed May 2017}."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.823977"},{"volume-title":"Kowloon","year":"2015","author":"Zhang K.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.316"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2010.363.368"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2018.5203"},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"436","article-title":"Detecting distributed denial of service attacks using data mining techniques","author":"Alkasassbeh M.","year":"2016","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Evangelista D. Mezghani F. Nogueira M. & Santos A. (2016 March). Evaluation of sybil attack detection approaches in the internet of things content dissemination. In 2016 Wireless Days (WD) (pp. 1--6). IEEE.  Evangelista D. Mezghani F. Nogueira M. & Santos A. (2016 March). Evaluation of sybil attack detection approaches in the internet of things content dissemination. In 2016 Wireless Days (WD) (pp. 1--6). IEEE.","DOI":"10.1109\/WD.2016.7461513"},{"key":"e_1_3_2_1_20_1","unstructured":"Nsl-kdd data set for network-based intrusion detection systems Referred From: http:\/\/nsl.cs.unb.ca\/KDD\/NSLKDD.html March 2009.  Nsl-kdd data set for network-based intrusion detection systems Referred From: http:\/\/nsl.cs.unb.ca\/KDD\/NSLKDD.html March 2009."},{"issue":"12","key":"e_1_3_2_1_21_1","article-title":"A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection","volume":"2","author":"Revathi S.","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2009.145"}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:12Z","timestamp":1750208532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":22,"alternative-id":["10.1145\/3316615.3316729","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316729","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}