{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T16:32:55Z","timestamp":1775233975567,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/cisti.2018.8399291","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T22:29:31Z","timestamp":1530224971000},"page":"1-7","source":"Crossref","is-referenced-by-count":87,"title":["Intrusion detection systems in Internet of Things: A literature review"],"prefix":"10.23919","author":[{"given":"Leonel","family":"Santos","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Rabadao","sequence":"additional","affiliation":[]},{"given":"Ramiro","family":"Goncalves","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883583"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.84"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2011.6022060"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2011.6098218"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04492-2_66"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref36","first-page":"1337","article-title":"DEMO: an IDS framework for internet of things empowered by 6Lo WP AN","author":"kasinathan","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security CCS'13 ACM"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2013.6724156"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121912.00006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref2","first-page":"1","article-title":"The Internet of Things-A survey of topics and trends","author":"whitmore","year":"2014","journal-title":"Information Systems Frontiers"},{"key":"ref1","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"keele","year":"2007","journal-title":"Technical report Ver 2 3 EBSE Technical Report EBSE"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-94"},{"key":"ref24","first-page":"159","article-title":"A survey on intrusion detection systems in mobile ad hoc netwotks","volume":"2","author":"anantvalee","year":"2017","journal-title":"Wireless Network Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269717"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10844-0_29"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1484"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055252"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EMTC.2014.6996632"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2015.7237154"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997468"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7514162"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref14","year":"0","journal-title":"OWASP Internet of Things Project"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"ref16","article-title":"Computer security threat monitoring and surveillance","author":"anderson","year":"1980","journal-title":"Technical Report James P Anderson Company"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63859"},{"key":"ref18","author":"vacca","year":"2013","journal-title":"Computer and Information Security Handbook"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2490428.2490456"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.104"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.010"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2015.7410342"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5120\/21565-4589"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444797"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/info7020025"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7262-5_137"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2014.57"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140344"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/s141224188"}],"event":{"name":"2018 13th Iberian Conference on Information Systems and Technologies (CISTI)","location":"Caceres","start":{"date-parts":[[2018,6,13]]},"end":{"date-parts":[[2018,6,16]]}},"container-title":["2018 13th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8390719\/8398632\/08399291.pdf?arnumber=8399291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T22:35:51Z","timestamp":1531780551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8399291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":50,"URL":"https:\/\/doi.org\/10.23919\/cisti.2018.8399291","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}