{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T19:10:08Z","timestamp":1755976208337,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3633624.3633625","type":"proceedings-article","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T06:38:38Z","timestamp":1706510318000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Visualization of Attack Behavior Data in IoT Network Traffic"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6847-8120","authenticated-orcid":false,"given":"Phornsawan","family":"Roemsri","sequence":"first","affiliation":[{"name":"Computer Science, Texas Tech University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8322-0014","authenticated-orcid":false,"given":"Tommy","family":"Dang","sequence":"additional","affiliation":[{"name":"Computer Science, Texas Tech University, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.13.5.524-529"},{"key":"e_1_3_2_1_2_1","article-title":"Network intrusion detection system using neural network classification of attack behavior","volume":"6","author":"Al-Jarrah Omar","year":"2015","unstructured":"Omar Al-Jarrah and Ahmad Arafat. 2015. Network intrusion detection system using neural network classification of attack behavior. Journal of Advances in Information Technology Vol 6, 1 (2015).","journal-title":"Journal of Advances in Information Technology"},{"key":"e_1_3_2_1_3_1","volume-title":"IoT virtualization: A survey of software definition & function virtualization techniques for internet of things. arXiv preprint arXiv:1902.10910","author":"Alam Iqbal","year":"2019","unstructured":"Iqbal Alam, Kashif Sharif, Fan Li, Zohaib Latif, Md\u00a0Monjurul Karim, Boubakr Nour, Sujit Biswas, and Yu Wang. 2019. IoT virtualization: A survey of software definition & function virtualization techniques for internet of things. arXiv preprint arXiv:1902.10910 (2019)."},{"key":"e_1_3_2_1_4_1","volume-title":"The internet of things: A survey. Computer networks 54, 15","author":"Atzori Luigi","year":"2010","unstructured":"Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The internet of things: A survey. Computer networks 54, 15 (2010), 2787\u20132805."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1179\/000870403235002042"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95189-8_8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2018.8709230"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8379532"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"e_1_3_2_1_10_1","unstructured":"Plotly\u00a0Technologies Inc.2015. Collaborative data science. Montreal QC. https:\/\/plot.ly"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00504-9"},{"key":"e_1_3_2_1_12_1","first-page":"99","article-title":"Emerging intuitionistic fuzzy classifiers for intrusion detection system","volume":"2","author":"Kavitha B","year":"2011","unstructured":"B Kavitha, S Karthikeyan, and P\u00a0Sheeba Maybell. 2011. Emerging intuitionistic fuzzy classifiers for intrusion detection system. Journal of Advances in Information Technology 2, 2 (2011), 99\u2013108.","journal-title":"Journal of Advances in Information Technology"},{"volume-title":"Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). Commun. ACM.","author":"Liang X.","key":"e_1_3_2_1_13_1","unstructured":"X. Liang and Y. Kim. 2021. A survey on security attacks and solutions in the IoT network., In Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). Commun. ACM."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/math9050500"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"S. Mathivanan and P. Jayagopal. 2019. A big data virtualization role in agriculture: a comprehensive review.Walailak Journal of Science and Technology (WJST) 16 2 (2019) 55\u201370.","DOI":"10.48048\/wjst.2019.3620"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139241"},{"key":"e_1_3_2_1_17_1","article-title":"Performance of machine learning techniques in anomaly detection with basic feature selection strategy-a network intrusion detection system","volume":"13","author":"Pranto Md\u00a0Badiuzzaman","year":"2022","unstructured":"Md\u00a0Badiuzzaman Pranto, Md\u00a0Hasibul\u00a0Alam Ratul, Md\u00a0Mahidur Rahman, Ishrat\u00a0Jahan Diya, and Zunayeed-Bin Zahir. 2022. Performance of machine learning techniques in anomaly detection with basic feature selection strategy-a network intrusion detection system. J. Adv. Inf. Technol 13, 1 (2022).","journal-title":"J. Adv. Inf. Technol"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409228"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-019-00588-3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.3.3.147-154"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108125"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.13.5.456-461"}],"event":{"name":"BDSIC 2023: 2023 5th International Conference on Big-data Service and Intelligent Computation","acronym":"BDSIC 2023","location":"Singapore Singapore"},"container-title":["Proceedings of the 2023 5th International Conference on Big-data Service and Intelligent Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3633624.3633625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3633624.3633625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:37:57Z","timestamp":1755974277000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3633624.3633625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":22,"alternative-id":["10.1145\/3633624.3633625","10.1145\/3633624"],"URL":"https:\/\/doi.org\/10.1145\/3633624.3633625","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-01-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}