{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T16:13:10Z","timestamp":1777047190029,"version":"3.51.4"},"reference-count":34,"publisher":"Tsinghua University Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Big Data Min. Anal."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.26599\/bdma.2023.9020027","type":"journal-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T17:46:40Z","timestamp":1713808000000},"page":"500-511","source":"Crossref","is-referenced-by-count":14,"title":["An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks"],"prefix":"10.26599","volume":"7","author":[{"given":"Selvam","family":"Saravanan","sequence":"first","affiliation":[{"name":"Amrita School of Computing, Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Bengaluru,India,560035"}]},{"given":"Uma Maheswari","family":"Balasubramanian","sequence":"additional","affiliation":[{"name":"Amrita School of Computing, Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Bengaluru,India,560035"}]}],"member":"11138","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00806-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22866"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2971952"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICINIS.2015.53"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2934664"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3190664"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2483499"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/1548512920951275"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26989-4_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-016-9168-2"},{"key":"ref12","article-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0)","volume-title":"Zenodo","author":"Sebastian","year":"2000"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03249-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.2100012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3109076"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3108464"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685338"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3212003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00097"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities4010021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4143"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9347990"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89500-0_55"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.076"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00087"},{"key":"ref27","first-page":"2327","article-title":"CADE: Detecting and explaining concept drift samples for security applications","author":"Yang","journal-title":"Proc. 30th USENIX Security Symp."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486864"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7118"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105607"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3167005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108719"},{"issue":"1","key":"ref33","first-page":"1235","article-title":"MLlib: Machine learning in apache spark","volume":"17","author":"Meng","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IMCERT57083.2023.10075102"}],"container-title":["Big Data Mining and Analytics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8254253\/10506765\/10506766.pdf?arnumber=10506766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T19:13:38Z","timestamp":1714763618000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10506766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":34,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.26599\/bdma.2023.9020027","relation":{},"ISSN":["2096-0654","2097-406X"],"issn-type":[{"value":"2096-0654","type":"print"},{"value":"2097-406X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}