{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:14:56Z","timestamp":1752282896586,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.23919\/cnsm52442.2021.9615588","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:30:34Z","timestamp":1638477034000},"page":"180-186","source":"Crossref","is-referenced-by-count":3,"title":["An Ensemble Learning-Based Architecture for Security Detection in IoT Infrastructures"],"prefix":"10.23919","author":[{"given":"Adrien","family":"Hemmer","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Abderrahim","sequence":"additional","affiliation":[]},{"given":"Remi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502992"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.10.006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2017.02.058"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49161-1_2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rpg.2020.0224"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2014.6847454"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS50059.2020.00014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3098593.3098594"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/wics.61"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8_8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-8208-z"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3"},{"year":"2021","key":"ref29","article-title":"Datasets related to the SecureIoT European Project"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.001"},{"key":"ref8","first-page":"32","article-title":"Active event correlation in bro ids to detect multi-stage attacks","author":"chen","year":"0","journal-title":"Fourth IEEE International Workshop on Information Assurance (IWIA '06) vol 1 IEEE Computer Society"},{"key":"ref7","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2019918763"},{"key":"ref9","article-title":"An intrusion alert correlator based on prerequisites of intrusions","author":"ning","year":"2002","journal-title":"USAF Technical Report"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110411"},{"key":"ref23","article-title":"Comparative assessment of process mining for supporting iot predictive security","author":"hemmer","year":"2020","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977892"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3182\/20130902-3-CN-3020.00044"}],"event":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2021,10,25]]},"location":"Izmir, Turkey","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 17th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615441\/9615442\/09615588.pdf?arnumber=9615588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T20:53:32Z","timestamp":1647896012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/cnsm52442.2021.9615588","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}