{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:26:50Z","timestamp":1756992410749,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.23919\/icact.2019.8702032","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:58:41Z","timestamp":1556837921000},"page":"1143-1152","source":"Crossref","is-referenced-by-count":11,"title":["Detecting Anomalous Network Traffic in IoT Networks"],"prefix":"10.23919","author":[{"given":"Dang Hai","family":"Hoang","sequence":"first","affiliation":[]},{"given":"Ha","family":"Duong Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"5","article-title":"Network traffic anomaly detection in the condition of noisy training dataset","volume":"1","author":"nguyen","year":"2016","journal-title":"SCAN Journal of information technology and communication"},{"key":"ref38","first-page":"1","article-title":"Some aspects of Minkowski distance","author":"geer","year":"1995","journal-title":"Research Report"},{"key":"ref33","article-title":"INVITED: Can IoT be Secured: Emerging Challenges in Connecting the Unconnected","author":"winget","year":"2016","journal-title":"DAC 2016"},{"key":"ref32","first-page":"34","article-title":"A Study on Security Issues and Challenges in IoT","volume":"3","author":"vijayalakshmi","year":"2016","journal-title":"Intl Journal of Engineering Sciences & Management Research"},{"key":"ref31","first-page":"99","article-title":"Security Framework for IoT Systems","volume":"14","author":"pasha","year":"2016","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"ref30","first-page":"186","article-title":"A practical application of a robust multivariate outlier detection method","author":"franklin","year":"0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.141"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3109761.3109791"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682640"},{"key":"ref34","article-title":"A Two-layer Dimention Reduction and Two-tier Classification Model for Anomaly-based Intrusion Detection in IoT Backbone Networks","author":"pajough","year":"2016","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2016.01.024"},{"year":"0","key":"ref40","article-title":"Traffic data from Kyoto University&#x2019;s Honeypots"},{"key":"ref11","first-page":"387","article-title":"Statistical techniques in anomaly intrusion detection system","volume":"5","author":"om","year":"2012","journal-title":"Advanced Engine Technology"},{"key":"ref12","first-page":"172","article-title":"A novel anomaly detection scheme based on principle component classifier","author":"shyu","year":"2003","journal-title":"Proc IEEE Foundations and New Directions of Data Mining Workshop"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062248"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254895"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.45"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962595"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.023"},{"key":"ref28","first-page":"644","article-title":"A model for network traffic anomaly detection","volume":"4","author":"nguyen","year":"2015","journal-title":"ICACT Transactions on Advanced Communications Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2294492"},{"key":"ref3","first-page":"34","article-title":"A Study on Security Issues and Challenges in IoT","volume":"3","author":"vijayalakshmi","year":"2016","journal-title":"Engineering Sciences & Management Research"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2016.7508146"},{"key":"ref29","first-page":"622","article-title":"A cluster-based algorithm for anomaly detection in time series using Mahalanobis distance","author":"nascimento","year":"2015","journal-title":"Proc Int Conf Artificial Intelligence"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2336610"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.01.009"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref20","first-page":"1","article-title":"Robust methods for unsupervised PCA-based anomaly detection","author":"kwitt","year":"2006","journal-title":"Proc IEEE\/IST Workshop Monitoring Attack Detection and Mitigation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2012.34033"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1145\/1403375.1403658","article-title":"An efficient FPGA implementation of principle component analysis based network intrusion detection system","author":"das","year":"2008","journal-title":"Proc Design Automation and Test in Europe"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2013.5412"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.99"},{"article-title":"Network Traffic Anomaly Detection","year":"2014","author":"huang","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.2.09"}],"event":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2019,2,17]]},"location":"PyeongChang Kwangwoon_Do, Korea (South)","end":{"date-parts":[[2019,2,20]]}},"container-title":["2019 21st International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8694794\/8701885\/08702032.pdf?arnumber=8702032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T09:10:46Z","timestamp":1663405846000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8702032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":40,"URL":"https:\/\/doi.org\/10.23919\/icact.2019.8702032","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}