{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:22:22Z","timestamp":1774599742092,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,7]]},"DOI":"10.1145\/3628797.3628930","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T15:25:34Z","timestamp":1701876334000},"page":"816-823","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Machine Learning-Based Anomaly Packets Detection for Smart Home"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5102-4595","authenticated-orcid":false,"given":"Thanh Binh","family":"Nguyen","sequence":"first","affiliation":[{"name":"University of Information Technology, Viet Nam and Vietnam National University Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2517-5047","authenticated-orcid":false,"given":"Duc Dang Khoi","family":"Nguyen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Ho Chi Minh City International University, Viet Nam and Vietnam National University Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6543-6698","authenticated-orcid":false,"given":"Binh Nguyen","family":"Le Nguyen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Ho Chi Minh City International University, Viet Nam and Vietnam National University Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6597-0209","authenticated-orcid":false,"given":"Tan","family":"Le","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Ho Chi Minh City International University, Viet Nam and Vietnam National University Ho Chi Minh City, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19173663"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS55353.2022.9811109"},{"key":"e_1_3_2_1_4_1","volume-title":"Neural Networks: Tricks of the Trade","author":"Bottou L\u00e9on","unstructured":"L\u00e9on Bottou. 2012. Stochastic gradient descent tricks. In Neural Networks: Tricks of the Trade: Second Edition. Springer, 421\u2013436."},{"key":"e_1_3_2_1_5_1","volume-title":"Random forests. Machine learning 45","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random forests. Machine learning 45 (2001), 5\u201332."},{"key":"e_1_3_2_1_6_1","volume-title":"d.]. Support-vector networks, machine learning, 20 (3)(1995) 273\u2013297","author":"Cortes C","unstructured":"C Cortes and V Vapnik. [n. d.]. Support-vector networks, machine learning, 20 (3)(1995) 273\u2013297. Google Scholar Google Scholar Digital Library Digital Library ([n. d.])."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6689134"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.10.007"},{"key":"e_1_3_2_1_10_1","volume-title":"Internet of Things-ICIOT","author":"Georgakopoulos Dimitrios","year":"2018","unstructured":"Dimitrios Georgakopoulos and Liang-Jie Zhang. 2018. Internet of Things-ICIOT 2018. Springer."},{"key":"e_1_3_2_1_11_1","volume-title":"Extremely randomized trees. Machine learning 63","author":"Geurts Pierre","year":"2006","unstructured":"Pierre Geurts, Damien Ernst, and Louis Wehenkel. 2006. Extremely randomized trees. Machine learning 63 (2006), 3\u201342."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the thirteenth international conference on artificial intelligence and statistics. JMLR Workshop and Conference Proceedings, 249\u2013256","author":"Glorot Xavier","year":"2010","unstructured":"Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the thirteenth international conference on artificial intelligence and statistics. JMLR Workshop and Conference Proceedings, 249\u2013256."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501823"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3343440","article-title":"A systematic review on imbalanced data challenges in machine learning: Applications and solutions","volume":"52","author":"Kaur Harsurinder","year":"2019","unstructured":"Harsurinder Kaur, Husanbir\u00a0Singh Pannu, and Avleen\u00a0Kaur Malhi. 2019. A systematic review on imbalanced data challenges in machine learning: Applications and solutions. ACM Computing Surveys (CSUR) 52, 4 (2019), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.11.003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_17_1","unstructured":"Y Liang and N Vankayalapati. [n. d.]. Machine Learning and Deep Learning Methods for Better Anomaly Detection in IoT-23 Dataset Cybersecurity. Preprint. Available online: https:\/\/github. com\/yliang725\/Anomaly-Detection-IoT23 (accessed on 22 December 2022) ([n. d.])."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2445094"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Karlen Mkrtchyan. [n. d.]. Learning SVM from Distributed Non-Linearly Separable Datasets with Kernel Methods. International Journal of New Technology and Research 4 8 ([n. d.]) 263015.","DOI":"10.31871\/IJNTR.4.8.56"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/19401493.2017.1354919"},{"key":"e_1_3_2_1_21_1","volume-title":"Czech Republic","author":"Parmisano A","year":"2020","unstructured":"A Parmisano, Sebastian Garcia, and MJ Erquiaga. 2020. A labeled dataset with malicious and benign iot network traffic. Stratosphere Laboratory: Praha, Czech Republic (2020)."},{"key":"e_1_3_2_1_22_1","volume-title":"Induction of decision trees. Machine learning 1","author":"Quinlan Ross","year":"1986","unstructured":"J.\u00a0Ross Quinlan. 1986. Induction of decision trees. Machine learning 1 (1986), 81\u2013106."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2018.04.004"},{"key":"e_1_3_2_1_24_1","volume-title":"Learning with kernels: support vector machines, regularization, optimization, and beyond","author":"Scholkopf Bernhard","unstructured":"Bernhard Scholkopf and Alexander\u00a0J Smola. 2018. Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT press."},{"key":"e_1_3_2_1_25_1","unstructured":"Nicolas-Alin Stoian. 2020. Machine learning for anomaly detection in iot networks: Malware analysis on the iot-23 data set. B.S. thesis. University of Twente."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ViTECoN.2019.8899618"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/info11050279"},{"key":"e_1_3_2_1_28_1","volume-title":"Support vector machine. Machine learning models and algorithms for big data classification: thinking with examples for effective learning","author":"Suthaharan Shan","year":"2016","unstructured":"Shan Suthaharan and Shan Suthaharan. 2016. Support vector machine. Machine learning models and algorithms for big data classification: thinking with examples for effective learning (2016), 207\u2013235."},{"key":"e_1_3_2_1_29_1","volume-title":"Bayes","author":"Swinburne Richard","year":"2004","unstructured":"Richard Swinburne. 2004. Bayes\u2019 theorem. Revue Philosophique de la France Et de l 194, 2 (2004)."},{"key":"e_1_3_2_1_30_1","volume-title":"Android application analysis using machine learning techniques. AI in Cybersecurity","author":"Takahashi Takeshi","year":"2019","unstructured":"Takeshi Takahashi and Tao Ban. 2019. Android application analysis using machine learning techniques. AI in Cybersecurity (2019), 181\u2013205."},{"key":"e_1_3_2_1_31_1","first-page":"69","article-title":"Classification of an imbalanced data set using decision tree algorithms","volume":"79","author":"Truica Ciprian-Octavian","year":"2017","unstructured":"Ciprian-Octavian Truica and Catalin\u00a0Adrian Leordeanu. 2017. Classification of an imbalanced data set using decision tree algorithms. Univ. Politech. Bucharest Sci. Bull. Ser. C Electr. Eng. Comput. Sci 79 (2017), 69\u201384.","journal-title":"Univ. Politech. Bucharest Sci. Bull. Ser. C Electr. Eng. Comput. Sci"}],"event":{"name":"SOICT 2023: The 12th International Symposium on Information and Communication Technology","location":"Ho Chi Minh Vietnam","acronym":"SOICT 2023"},"container-title":["Proceedings of the 12th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628930","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628797.3628930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:22:48Z","timestamp":1755778968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628930"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,7]]},"references-count":31,"alternative-id":["10.1145\/3628797.3628930","10.1145\/3628797"],"URL":"https:\/\/doi.org\/10.1145\/3628797.3628930","relation":{},"subject":[],"published":{"date-parts":[[2023,12,7]]},"assertion":[{"value":"2023-12-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}