{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T04:28:42Z","timestamp":1726115322258},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813368347"},{"type":"electronic","value":"9789813368354"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-33-6835-4_19","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T04:20:32Z","timestamp":1612412432000},"page":"287-296","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SMOTE-Based Framework for IoT Botnet Attack Detection"],"prefix":"10.1007","author":[{"given":"Abdulaziz","family":"Aborujilah","sequence":"first","affiliation":[]},{"given":"Rasheed Mohammad","family":"Nassr","sequence":"additional","affiliation":[]},{"given":"AbdulAleem","family":"Al- Othmani","sequence":"additional","affiliation":[]},{"given":"Nor Azlina","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Zalizah Awang","family":"Long","sequence":"additional","affiliation":[]},{"given":"Mohd Nizam","family":"Husen","sequence":"additional","affiliation":[]},{"given":"Tawfik","family":"Al-Hadhrami","sequence":"additional","affiliation":[]},{"given":"Hideya","family":"Ochiai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Mokhtar, S.A., Ali, S.H.S., Al-Sharafi, A., Aborujilah, A.: Organizational factors in the adoption of cloud computing in E-Learning. In: Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014 (2014)","DOI":"10.1109\/ACSAT.2014.40"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Aborujilah, A., Ismail, M.N., Musa, S.: Detecting TCP SYN based flooding attacks by analyzing CPU and network resources performance. In: Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014 (2014)","DOI":"10.1109\/ACSAT.2014.34"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.: Secure cryptography testbed implementation for scada protocols security. In: 2013 International Conference on Advanced Computer Science Applications and Technologies, pp. 315\u2013320 (2013)","DOI":"10.1109\/ACSAT.2013.69"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"19_CR5","doi-asserted-by":"publisher","DOI":"10.1201\/b16023","volume-title":"RapidMiner: Data Mining Use Cases and Business Analytics Applications","author":"M Hofmann","year":"2016","unstructured":"Hofmann, M., Klinkenberg, R.: RapidMiner: Data Mining Use Cases and Business Analytics Applications. CRC Press, Boca Raton (2016)"},{"key":"19_CR6","unstructured":"Kumagai, A., Iwata, T., Fujiwara, Y.: Transfer anomaly detection by inferring latent domain representations. In: Advances in Neural Information Processing Systems, pp. 2471\u20132481 (2019)"},{"key":"19_CR7","doi-asserted-by":"publisher","DOI":"10.1201\/9780429499661","volume-title":"Introduction to the Theory of Neural Computation","author":"JA Hertz","year":"2018","unstructured":"Hertz, J.A.: Introduction to the Theory of Neural Computation. CRC Press, Boca Raton (2018)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20136 (2016)","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135 (2016)","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Roy, S.S., Mallik, A., Gulati, R., Obaidat, M.S., Krishna, P.V.: A deep learning based artificial neural network approach for intrusion detection. In: International Conference on Mathematics and Computing, pp. 44\u201353 (2017)","DOI":"10.1007\/978-981-10-4642-1_5"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1613\/jair.1.11192","volume":"61","author":"A Fern\u00e1ndez","year":"2018","unstructured":"Fern\u00e1ndez, A., Garcia, S., Herrera, F., Chawla, N.V.: SMOTE for learning from imbalanced data: progress and challenges, marking the 15-year anniversary. J. Artif. Intell. Res. 61, 863\u2013905 (2018)","journal-title":"J. Artif. Intell. Res."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Wang, S., Liu, W., Wu, J., Cao, L., Meng, Q., Kennedy, P.J.: Training deep neural networks on imbalanced data sets. In: 2016 International Joint Conference on Neural Networks (IJCNN), pp. 4368\u20134374. IEEE (2016)","DOI":"10.1109\/IJCNN.2016.7727770"},{"issue":"7","key":"19_CR13","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., et al.: DDoS in the IoT: mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"issue":"2","key":"19_CR14","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76\u201379 (2017)","journal-title":"Computer"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Hallman, R., et al.: IoDDoS\u2014the internet of distributed denial of service attacks: a case study of the mirai malware and IoT-based botnets. In: Proceedings 2nd International Conference Internet of Things, Big Data, and Security (IoTBDS 17), pp. 47\u201358 (2017)","DOI":"10.5220\/0006246600470058"},{"issue":"3","key":"19_CR16","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., Elovici, Y.: N-baiot\u2014network-based detection of IoT botnet attacks using deep autoencoders. IEEE Perv. Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Perv. Comput."},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Liu, R., Hall, L.O., Bowyer, K.W., Goldgof, D.B., Gatenby, R., Ben Ahmed, K.: Synthetic minority image over-sampling technique: how to improve AUC for glioblastoma patient survival prediction. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1357\u20131362 (2017)","DOI":"10.1109\/SMC.2017.8122802"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-6835-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T21:53:49Z","timestamp":1619301229000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-6835-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789813368347","9789813368354"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-6835-4_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}