{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:12:29Z","timestamp":1768990349643,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,26]]},"DOI":"10.1145\/3556677.3556687","type":"proceedings-article","created":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T16:08:34Z","timestamp":1665245314000},"page":"120-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Hybrid Feature Selection for Efficient Detection of DDoS Attacks in IoT"],"prefix":"10.1145","author":[{"given":"Liang","family":"Hong","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Tenneessee State University, USA"}]},{"given":"Khadijeh","family":"Wehbi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Tennessee State University, United States"}]},{"given":"Tulha Hasan","family":"Alsalah","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Tennessee State University, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Yang Y. Wu L. Yin G. Li L. and Zhao H. 2017. A survey on security and privacy issues in Internet-of-Things.\u00a0IEEE Internet of Things Journal \u00a04(5) pp.1250-1258.  Yang Y. Wu L. Yin G. Li L. and Zhao H. 2017. A survey on security and privacy issues in Internet-of-Things.\u00a0IEEE Internet of Things Journal \u00a04(5) pp.1250-1258.","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Sonar K. and Upadhyay H. 2014. A survey: DDOS attack on Internet of Things.\u00a0International Journal of Engineering Research and Development \u00a010(11) pp.58-63.Alsboui T. Qin Y. Hill R. and Al-Aqrabi H. 2020. Enabling distributed intelligence for the Internet of Things with IOTA and mobile agents.\u00a0Computing \u00a0102(6) pp.1345-1363.  Sonar K. and Upadhyay H. 2014. A survey: DDOS attack on Internet of Things.\u00a0International Journal of Engineering Research and Development \u00a010(11) pp.58-63.Alsboui T. Qin Y. Hill R. and Al-Aqrabi H. 2020. Enabling distributed intelligence for the Internet of Things with IOTA and mobile agents.\u00a0Computing \u00a0102(6) pp.1345-1363.","DOI":"10.1007\/s00607-020-00806-9"},{"key":"e_1_3_2_1_3_1","first-page":"1345","volume-title":"Enabling distributed intelligence for the Internet of Things with IOTA and mobile agents.\u00a0Computing,\u00a0102(6)","author":"Alsboui T.","unstructured":"Alsboui , T. , Qin , Y. , Hill , R. and Al-Aqrabi , H. , 2020. Enabling distributed intelligence for the Internet of Things with IOTA and mobile agents.\u00a0Computing,\u00a0102(6) , pp. 1345 - 1363 . Alsboui, T., Qin, Y., Hill, R. and Al-Aqrabi, H., 2020. Enabling distributed intelligence for the Internet of Things with IOTA and mobile agents.\u00a0Computing,\u00a0102(6), pp.1345-1363."},{"key":"e_1_3_2_1_4_1","unstructured":"A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework  A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Wehbi K. Hong L. Al-salah T. and Bhutta A.A. 2019 April. A survey on machine learning based detection on DDoS attacks for IoT systems. In\u00a02019 SoutheastCon\u00a0(pp. 1-6). IEEE.  Wehbi K. Hong L. Al-salah T. and Bhutta A.A. 2019 April. A survey on machine learning based detection on DDoS attacks for IoT systems. In\u00a02019 SoutheastCon\u00a0(pp. 1-6). IEEE.","DOI":"10.1109\/SoutheastCon42311.2019.9020468"},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/www.mathworks.com\/products\/matlab.html LIMITS: Lightweight machine learning for IoT systems with resource limitations  https:\/\/www.mathworks.com\/products\/matlab.html LIMITS: Lightweight machine learning for IoT systems with resource limitations"},{"key":"e_1_3_2_1_7_1","unstructured":"LIMITS\n  : Lightweight machine learning for IoT systems with resource limitations  LIMITS: Lightweight machine learning for IoT systems with resource limitations"},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/medium.com\/@mehulved1503\/feature-selection-and-feature-extraction-in-machine-learning-an-overview-57891c595e96  https:\/\/medium.com\/@mehulved1503\/feature-selection-and-feature-extraction-in-machine-learning-an-overview-57891c595e96"},{"key":"e_1_3_2_1_9_1","volume-title":"In\u00a0ICC 2021-IEEE International Conference on Communications\u00a0(pp. 1-6). IEEE.","author":"Sanchez O.R.","unstructured":"Sanchez , O.R. , Repetto , M. , Carrega , A. , Bolla , R. and Pajo , J.F ., 2021, June. Feature selection evaluation towards a lightweight deep learning ddos detector . In\u00a0ICC 2021-IEEE International Conference on Communications\u00a0(pp. 1-6). IEEE. Sanchez, O.R., Repetto, M., Carrega, A., Bolla, R. and Pajo, J.F., 2021, June. Feature selection evaluation towards a lightweight deep learning ddos detector. In\u00a0ICC 2021-IEEE International Conference on Communications\u00a0(pp. 1-6). IEEE."},{"key":"e_1_3_2_1_10_1","volume-title":"In\u00a02019 International Conference on Cyberworlds (CW)\u00a0(pp. 324-327)","author":"Guerra-Manzanares A.","unstructured":"Guerra-Manzanares , A. , Bahsi , H. and N\u00f5mm , S ., 2019, October. Hybrid feature selection models for machine learning based botnet detection in IoT networks . In\u00a02019 International Conference on Cyberworlds (CW)\u00a0(pp. 324-327) . IEEE. Guerra-Manzanares, A., Bahsi, H. and N\u00f5mm, S., 2019, October. Hybrid feature selection models for machine learning based botnet detection in IoT networks. In\u00a02019 International Conference on Cyberworlds (CW)\u00a0(pp. 324-327). IEEE."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Kamarudin M.H. Maple C. and Watson T. 2019. Hybrid feature selection technique for intrusion detection system.\u00a0 International Journal of High Performance Computing and Networking \u00a013 (2) pp.232-240.  Kamarudin M.H. Maple C. and Watson T. 2019. Hybrid feature selection technique for intrusion detection system.\u00a0 International Journal of High Performance Computing and Networking \u00a013 (2) pp.232-240.","DOI":"10.1504\/IJHPCN.2019.097503"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Roopak M. Tian G.Y. and Chambers J. 2020. Multi-objective-based feature selection for DDoS attack detection in IoT networks.\u00a0IET Networks \u00a09(3) pp.120-127.  Roopak M. Tian G.Y. and Chambers J. 2020. Multi-objective-based feature selection for DDoS attack detection in IoT networks.\u00a0IET Networks \u00a09(3) pp.120-127.","DOI":"10.1049\/iet-net.2018.5206"},{"key":"e_1_3_2_1_13_1","volume-title":"Accessed","author":"The Canadian Institute for Cybersecurity.","year":"2019","unstructured":"The Canadian Institute for Cybersecurity. ( 2019 ). Datasets . Accessed : Oct. 31, 2019. [Online]. Available : https:\/\/www.unb.ca\/cic\/datasets\/index.html The Canadian Institute for Cybersecurity. (2019). Datasets. Accessed: Oct. 31, 2019. [Online]. Available: https:\/\/www.unb.ca\/cic\/datasets\/index.html"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Mohammadi S. Desai V. and Karimipour H. 2018 October. Multivariate mutual information-based feature selection for cyber intrusion detection. In\u00a02018 IEEE electrical power and energy Conference (EPEC)\u00a0(pp. 1-6). IEEE.  Mohammadi S. Desai V. and Karimipour H. 2018 October. Multivariate mutual information-based feature selection for cyber intrusion detection. In\u00a02018 IEEE electrical power and energy Conference (EPEC)\u00a0(pp. 1-6). IEEE.","DOI":"10.1109\/EPEC.2018.8598326"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0814-8"},{"key":"e_1_3_2_1_16_1","unstructured":"Classification of Twitter Contents using Chi-Square and K-Nearest Neighbour Algorithm  Classification of Twitter Contents using Chi-Square and K-Nearest Neighbour Algorithm"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMANTIC.2018.8549748"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Ratmana D.O. Shidik G.F. Fanani A.Z. and Pramunendar R.A. 2020 September. Evaluation of Feature Selections on Movie Reviews Sentiment. In\u00a02020 International Seminar on Application for Technology of Information and Communication (iSemantic)\u00a0(pp. 567-571). IEEE.  Ratmana D.O. Shidik G.F. Fanani A.Z. and Pramunendar R.A. 2020 September. Evaluation of Feature Selections on Movie Reviews Sentiment. In\u00a02020 International Seminar on Application for Technology of Information and Communication (iSemantic)\u00a0(pp. 567-571). IEEE.","DOI":"10.1109\/iSemantic50169.2020.9234287"},{"key":"e_1_3_2_1_19_1","volume-title":"In\u00a0Proceedings of 3rd international conference on computer vision and image processing\u00a0(pp. 227-242)","author":"Shekar B.H.","unstructured":"Shekar , B.H. and Dagnew , G ., 2020. L1-regulated feature selection and classification of microarray cancer data using deep learning . In\u00a0Proceedings of 3rd international conference on computer vision and image processing\u00a0(pp. 227-242) . Springer, Singapore. Shekar, B.H. and Dagnew, G., 2020. L1-regulated feature selection and classification of microarray cancer data using deep learning. In\u00a0Proceedings of 3rd international conference on computer vision and image processing\u00a0(pp. 227-242). Springer, Singapore."}],"event":{"name":"ICDLT 2022: 2022 6th International Conference on Deep Learning Technologies","location":"Xi'an China","acronym":"ICDLT 2022"},"container-title":["Proceedings of the 2022 6th International Conference on Deep Learning Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3556677.3556687","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3556677.3556687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:01Z","timestamp":1750182541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3556677.3556687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":19,"alternative-id":["10.1145\/3556677.3556687","10.1145\/3556677"],"URL":"https:\/\/doi.org\/10.1145\/3556677.3556687","relation":{},"subject":[],"published":{"date-parts":[[2022,7,26]]},"assertion":[{"value":"2022-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}