{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:54Z","timestamp":1750219854597,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3603882","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"576-582","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Abnormal Traffic Detection of Internet of Things Based on Feature Selection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9301-7978","authenticated-orcid":false,"given":"Yongrui","family":"Liu","sequence":"first","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3977-7046","authenticated-orcid":false,"given":"Zhimei","family":"Lv","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0562-1094","authenticated-orcid":false,"given":"Zhongjin","family":"Liu","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Global System for Mobile Communications assembly. The Mobile Economy 2020[EB\/OL].(2020-03)[2022-06-01].https:\/\/www.gsma.com\/mobileeconomy\/wp-content\/uploads\/2020\/03\/GSMA_MobileEconomy2020_Global.pdf  Global System for Mobile Communications assembly. The Mobile Economy 2020[EB\/OL].(2020-03)[2022-06-01].https:\/\/www.gsma.com\/mobileeconomy\/wp-content\/uploads\/2020\/03\/GSMA_MobileEconomy2020_Global.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Nadav Liebermann. SAM Seamless Network. 2021 IoTSecurity Landscape [EB\/OL].(2021-04-07)[2022-06-01]. https:\/\/securingsam.com\/2021-iot-security-landscape\/  Nadav Liebermann. SAM Seamless Network. 2021 IoTSecurity Landscape [EB\/OL].(2021-04-07)[2022-06-01]. https:\/\/securingsam.com\/2021-iot-security-landscape\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2925929"},{"key":"e_1_3_2_1_4_1","volume-title":"Applied Sciences","author":"Shen Su","year":"2019","unstructured":"Shen Su , Yanbin Sun, Xiangsong Gao , Jing Qiu, Zhihong Tian . A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection[J] . Applied Sciences , 2019 , 9(3). Shen Su, Yanbin Sun, Xiangsong Gao, Jing Qiu, Zhihong Tian. A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection[J]. Applied Sciences, 2019, 9(3)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69304-8_20"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"volume-title":"Proceedings of 2010 IEEE International Symposium on Circuits and Systems. IEEE","author":"Lecun Y","key":"e_1_3_2_1_8_1","unstructured":"Lecun Y , Kavukcuoglu K , Cle\u00b4ment Farabet . Convolutional Networks and Applications in Vision[C] . Proceedings of 2010 IEEE International Symposium on Circuits and Systems. IEEE , 2010: 253-256. Lecun Y, Kavukcuoglu K, Cle\u00b4ment Farabet. Convolutional Networks and Applications in Vision[C]. Proceedings of 2010 IEEE International Symposium on Circuits and Systems. IEEE, 2010: 253-256."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Hochreiter S Schmidhuber J. Longshort\u2013term memory[J].Neural computation 1997 9(8):1735\u20131780.  Hochreiter S Schmidhuber J. Longshort\u2013term memory[J].Neural computation 1997 9(8):1735\u20131780.","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107298019"},{"key":"e_1_3_2_1_12_1","volume-title":"Building auto-encoder intrusion detection system based on random forest feature selection.\u00a0Computers & Security, 95, 101851","author":"Li X.","year":"2020","unstructured":"Li , X. , Chen , W. , Zhang , Q. , & Wu , L. ( 2020 ). Building auto-encoder intrusion detection system based on random forest feature selection.\u00a0Computers & Security, 95, 101851 . Li, X., Chen, W., Zhang, Q., & Wu, L. (2020). Building auto-encoder intrusion detection system based on random forest feature selection.\u00a0Computers & Security, 95, 101851."},{"issue":"1","key":"e_1_3_2_1_13_1","first-page":"89","volume":"23","author":"Wind","year":"2017","unstructured":"JIANG G Q, XIE P, HE H B, Wind turbine fault detection using denoising autoencoder with temporal information[J]. IEEE \/ ASME Transactions on Mechatronics , 2017 , 23 ( 1 ) : 89 - 100 . JIANG G Q, XIE P, HE H B, Wind turbine fault detection using denoising autoencoder with temporal information[J]. IEEE \/ ASME Transactions on Mechatronics, 2017, 23(1) : 89-100.","journal-title":"ASME Transactions on Mechatronics"},{"key":"e_1_3_2_1_14_1","volume-title":"A multi-head attention-based transformer model for traffic flow forecasting with a comparative analysis to recurrent neural networks. Expert Systems with Applications, 202, 117275","author":"Reza S.","year":"2022","unstructured":"Reza , S. , Ferreira , M. C. , Machado , J. J. M. , & Tavares , J. M. R. ( 2022 ). A multi-head attention-based transformer model for traffic flow forecasting with a comparative analysis to recurrent neural networks. Expert Systems with Applications, 202, 117275 . Reza, S., Ferreira, M. C., Machado, J. J. M., & Tavares, J. M. R. (2022). A multi-head attention-based transformer model for traffic flow forecasting with a comparative analysis to recurrent neural networks. Expert Systems with Applications, 202, 117275."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3603882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:11Z","timestamp":1750178831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":15,"alternative-id":["10.1145\/3603781.3603882","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3603882","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}