{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:09:17Z","timestamp":1767704957086,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508113","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"270-279","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Device-Type Profiling for Network Access Control Systems using Clustering-Based Multivariate Gaussian Outlier Score"],"prefix":"10.1145","author":[{"given":"Musa","family":"Muhammad","sequence":"first","affiliation":[{"name":"CUSC, Coventry University, UK"}]},{"given":"Uchenna","family":"Daniel Ani","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Aminu Aliyu","family":"Abdullahi","sequence":"additional","affiliation":[{"name":"Federal University Dutse, Nigeria"}]},{"given":"Petar","family":"Radanliev","sequence":"additional","affiliation":[{"name":"University of Oxford, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32498-7_31"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE.2013.6719923"},{"key":"e_1_3_2_1_3_1","first-page":"44","article-title":"Survey on access control and management issues in cloud and BYOD environment","volume":"6","author":"Almarhabi Khalid","year":"2017","unstructured":"Khalid Almarhabi , Kamal Jambi , Fathy Eassa , and Omar Batarfi . 2017 . Survey on access control and management issues in cloud and BYOD environment . International Journal of Computer Science and Mobile Computing 6 (2017), 44 \u2013 54 . Khalid Almarhabi, Kamal Jambi, Fathy Eassa, and Omar Batarfi. 2017. Survey on access control and management issues in cloud and BYOD environment. International Journal of Computer Science and Mobile Computing 6 (2017), 44\u201354.","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"e_1_3_2_1_4_1","unstructured":"Seham Alnefaie and Omar Batarfi. [n.d.]. Secure Remote Mobile Screening (SRMS) Framework for Bring Your Own Device (BYOD). ([n. d.]).  Seham Alnefaie and Omar Batarfi. [n.d.]. Secure Remote Mobile Screening (SRMS) Framework for Bring Your Own Device (BYOD). ([n. d.])."},{"key":"e_1_3_2_1_5_1","volume-title":"Network intrusion detection with threat agent profiling. Security and Communication Networks 2018","author":"Bajto\u0161 Tom\u00e1\u0161","year":"2018","unstructured":"Tom\u00e1\u0161 Bajto\u0161 , Andrej Gajdo\u0161 , Lenka Kleinov\u00e1 , Katar\u00edna Lu\u010divjansk\u00e1 , and Pavol Sokol . 2018. Network intrusion detection with threat agent profiling. Security and Communication Networks 2018 ( 2018 ). Tom\u00e1\u0161 Bajto\u0161, Andrej Gajdo\u0161, Lenka Kleinov\u00e1, Katar\u00edna Lu\u010divjansk\u00e1, and Pavol Sokol. 2018. Network intrusion detection with threat agent profiling. Security and Communication Networks 2018 (2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_7_1","volume-title":"The Learning Workshop, Vol.\u00a04. Utah, 51","author":"Breuel Thomas","year":"2010","unstructured":"Thomas Breuel and Faisal Shafait . 2010 . Automlp: Simple, effective, fully automated learning rate and size adjustment . In The Learning Workshop, Vol.\u00a04. Utah, 51 . Thomas Breuel and Faisal Shafait. 2010. Automlp: Simple, effective, fully automated learning rate and size adjustment. In The Learning Workshop, Vol.\u00a04. Utah, 51."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23300-5_26"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2000 IEEE Workshop on Information Assurance and Security.","author":"Fortier C","year":"2000","unstructured":"Stephen\u00a0 C Fortier and Lee\u00a0 A Shombert . 2000 . Network profiling and data visualization . In Proceedings of the 2000 IEEE Workshop on Information Assurance and Security. Stephen\u00a0C Fortier and Lee\u00a0A Shombert. 2000. Network profiling and data visualization. In Proceedings of the 2000 IEEE Workshop on Information Assurance and Security."},{"volume-title":"Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE)","author":"Gill Manmeet\u00a0Singh","key":"e_1_3_2_1_10_1","unstructured":"Manmeet\u00a0Singh Gill , Dale Lindskog , and Pavol Zavarsky . 2018. Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection. In 2018 17th IEEE International Conference On Trust , Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE) . IEEE , 885\u2013890. Manmeet\u00a0Singh Gill, Dale Lindskog, and Pavol Zavarsky. 2018. Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, 885\u2013890."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557554"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sandeep Gupta Attaullah Buriro and Bruno Crispo. 2018. Demystifying authentication concepts in smartphones: Ways and types to secure access. Mobile Information Systems(2018).  Sandeep Gupta Attaullah Buriro and Bruno Crispo. 2018. Demystifying authentication concepts in smartphones: Ways and types to secure access. Mobile Information Systems(2018).","DOI":"10.1155\/2018\/2649598"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354798"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol.\u00a02.","author":"Koh Eun\u00a0Byol","year":"2014","unstructured":"Eun\u00a0Byol Koh , Joohyung Oh , and Chaete Im . 2014 . A study on security threats and dynamic access control technology for BYOD, smart-work environment . In Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol.\u00a02. Eun\u00a0Byol Koh, Joohyung Oh, and Chaete Im. 2014. A study on security threats and dynamic access control technology for BYOD, smart-work environment. In Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol.\u00a02."},{"key":"e_1_3_2_1_16_1","unstructured":"Abdelmajid Lakbabi Ghizlane Orhanou and Said\u00a0El Hajji. 2013. Network Access Control Technology-Proposition to contain new security challenges. arXiv preprint arXiv:1304.0807(2013).  Abdelmajid Lakbabi Ghizlane Orhanou and Said\u00a0El Hajji. 2013. Network Access Control Technology-Proposition to contain new security challenges. arXiv preprint arXiv:1304.0807(2013)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2010.26"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647593.728889"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150531"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341325.3342004"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3105573"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0644-x"},{"key":"e_1_3_2_1_23_1","unstructured":"Portnox. [n.d.]. The Importance of a NAC Solution Introduction \u2013 The Growing Demand for NAC Solutions Full Coverage of Top CIS Controls. http:\/\/www.portnox.com  Portnox. [n.d.]. The Importance of a NAC Solution Introduction \u2013 The Growing Demand for NAC Solutions Full Coverage of Top CIS Controls. http:\/\/www.portnox.com"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815713"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6060004"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2016.2569858"},{"volume-title":"CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from https:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. https:\/\/doi.org\/10.15783\/C78G67","author":"Uluagac Selcuk","key":"e_1_3_2_1_27_1","unstructured":"A.\u00a0 Selcuk Uluagac . 2014. CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from https:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. https:\/\/doi.org\/10.15783\/C78G67 10.15783\/C78G67 A.\u00a0Selcuk Uluagac. 2014. CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from https:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. https:\/\/doi.org\/10.15783\/C78G67"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.023"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105214"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":29,"alternative-id":["10.1145\/3508072.3508113","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508113","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}