{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:55:43Z","timestamp":1776275743192,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100018693","name":"HORIZON EUROPE Framework Programme","doi-asserted-by":"publisher","award":["101070214"],"award-info":[{"award-number":["101070214"]}],"id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3605162","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Explainable AI-based Intrusion Detection in the Internet of Things"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5318-151X","authenticated-orcid":false,"given":"Marios","family":"Siganos","sequence":"first","affiliation":[{"name":"K3Y Ltd, Bulgaria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1605-9413","authenticated-orcid":false,"given":"Panagiotis","family":"Radoglou-Grammatikis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia, Greece and K3Y Ltd, Bulgaria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2878-6060","authenticated-orcid":false,"given":"Igor","family":"Kotsiuba","sequence":"additional","affiliation":[{"name":"Durham University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0959-598X","authenticated-orcid":false,"given":"Evangelos","family":"Markakis","sequence":"additional","affiliation":[{"name":"Hellenic Mediterranean University, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3656-277X","authenticated-orcid":false,"given":"Ioannis","family":"Moscholios","sequence":"additional","affiliation":[{"name":"University of Peloponnese, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5981-5683","authenticated-orcid":false,"given":"Sotirios","family":"Goudos","sequence":"additional","affiliation":[{"name":"Aristotle University of Thessaloniki, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6042-0355","authenticated-orcid":false,"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia, Greece"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3186589"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.11.003"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00441-2"},{"key":"e_1_3_2_1_5_1","unstructured":"Scott Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. http:\/\/arxiv.org\/abs\/1705.07874"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Shraddha Mane and Dattaraj Rao. 2021. Explaining Network Intrusion Detection System Using Explainable AI Framework. https:\/\/doi.org\/10.48550\/ARXIV.2103.07110","DOI":"10.48550\/ARXIV.2103.07110"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11193079"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3093905"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500354"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3183390"}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy","acronym":"ARES 2023"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605162","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3605162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:38Z","timestamp":1750178258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":12,"alternative-id":["10.1145\/3600160.3605162","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3605162","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}