{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:03:51Z","timestamp":1774551831082,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728969","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:02Z","timestamp":1647030422000},"page":"317-322","source":"Crossref","is-referenced-by-count":7,"title":["OWASP IoT Top 10 based Attack Dataset for Machine Learning"],"prefix":"10.23919","author":[{"given":"Nay Myat","family":"Min","sequence":"first","affiliation":[{"name":"Mahidol University,Faculty of Information and Communication Technology,Nakhon Pathom,Thailand"}]},{"given":"Vasaka","family":"Visoottiviseth","sequence":"additional","affiliation":[{"name":"Mahidol University,Faculty of Information and Communication Technology,Nakhon Pathom,Thailand"}]},{"given":"Songpon","family":"Teerakanok","sequence":"additional","affiliation":[{"name":"Mahidol University,Faculty of Information and Communication Technology,Nakhon Pathom,Thailand"}]},{"given":"Nariyoshi","family":"Yamai","sequence":"additional","affiliation":[{"name":"Institute of Engineering, Tokyo University of Agriculture and Technology (TUAT),Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref10","year":"2021","journal-title":"IDS 2018 | Datasets | Research | Canadian Institute for Cybersecurity | UNB"},{"key":"ref11","article-title":"Flow-based benchmark data sets for intrusion detection","author":"ring","year":"2017","journal-title":"Undefined"},{"key":"ref12","year":"2021","journal-title":"(PDF) Creation of Flow-Based Data Sets for Intrusion Detection"},{"key":"ref13","volume":"12109","author":"ullah","year":"2020","journal-title":"A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"ref15","year":"2021","journal-title":"Applications | Research | Canadian Institute for Cybersecurity | UNB"},{"key":"ref16","year":"2021","journal-title":"AI Sol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref3","first-page":"12","article-title":"Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation","volume":"2","author":"lippmann","year":"2000","journal-title":"Proceedings 2000 DARPA Information Survivability Conference and Exposition"},{"key":"ref6","author":"tavallaee","year":"2009","journal-title":"A Detailed Analysis of the KDD CUP 99 Data Set A Detailed Analysis of the KDD CUP 99 Data Set"},{"key":"ref5","year":"2021","journal-title":"KDD Cup 1999 data"},{"key":"ref8","article-title":"UNSW-NB1s5: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"moustafa","year":"2015","journal-title":"2015 Military Communications and Information Systems Conference MilCIS 2015 - Proceedings"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2015.3.1924"},{"key":"ref2","year":"2018","journal-title":"OWASP Top 10 Internet of Things"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v18i5.15911"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","location":"PyeongChang Kwangwoon_Do, Korea, Republic of","start":{"date-parts":[[2022,2,13]]},"end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728969.pdf?arnumber=9728969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:29:30Z","timestamp":1653341370000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728969","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}