{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T09:04:20Z","timestamp":1724058260910},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T00:00:00Z","timestamp":1616544000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T00:00:00Z","timestamp":1616544000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s42979-021-00555-2","type":"journal-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T07:02:21Z","timestamp":1616569341000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["CRIDS: Correlation and Regression-Based Network Intrusion Detection System for IoT"],"prefix":"10.1007","volume":"2","author":[{"given":"Sarika","family":"Choudhary","sequence":"first","affiliation":[]},{"given":"Apurba","family":"Dey","sequence":"additional","affiliation":[]},{"given":"Nishtha","family":"Kesswani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,24]]},"reference":[{"key":"555_CR1","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","volume":"38","author":"AA Aburomman","year":"2016","unstructured":"Aburomman AA, Reaz MBI. A novel svm-knn-pso ensemble method for intrusion detection system. Appl Soft Comput. 2016;38:360\u201372.","journal-title":"Appl Soft Comput."},{"issue":"3","key":"555_CR2","doi-asserted-by":"publisher","first-page":"817","DOI":"10.3390\/s18030817","volume":"18","author":"B Ali","year":"2018","unstructured":"Ali B, Awad AI. Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors. 2018;18(3):817.","journal-title":"Sensors"},{"key":"555_CR3","doi-asserted-by":"crossref","unstructured":"Azmoodeh A, Dehghantanha A, Choo KKR. Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE transactions on sustainable computing 2018a.","DOI":"10.1109\/TSUSC.2018.2809665"},{"issue":"4","key":"555_CR4","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","volume":"9","author":"A Azmoodeh","year":"2018","unstructured":"Azmoodeh A, Dehghantanha A, Conti M, Choo KKR. Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Human Comput. 2018b;9(4):1141\u201352.","journal-title":"J Ambient Intell Human Comput"},{"key":"555_CR5","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","volume":"98","author":"H Bostani","year":"2017","unstructured":"Bostani H, Sheikhan M. Hybrid of anomaly-based and specification-based ids for internet of things using unsupervised OPF based on map reduce approach. Comput Commun. 2017;98:52\u201371.","journal-title":"Comput Commun"},{"issue":"5","key":"555_CR6","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JIOT.2016.2516102","volume":"3","author":"X Cao","year":"2016","unstructured":"Cao X, Shila DM, Cheng Y, Yang Z, Zhou Y, Chen J. Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks. IEEE Internet Things J. 2016;3(5):816\u201329.","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"555_CR7","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/JIOT.2014.2349899","volume":"1","author":"Q Chen","year":"2014","unstructured":"Chen Q, Abdelwahed S, Erradi A. A model-based validated autonomic approach to self-protect computing systems. IEEE Internet Things J. 2014;1(5):446\u201360.","journal-title":"IEEE Internet Things J"},{"key":"555_CR8","doi-asserted-by":"crossref","unstructured":"Choi H, Lee H, Lee H, Kim H. Botnet detection by monitoring group activities in dns traffic. In: 7th IEEE International conference on computer and information technology (CIT 2007), IEEE; 2007. p. 715\u2013720","DOI":"10.1109\/CIT.2007.90"},{"key":"555_CR9","doi-asserted-by":"crossref","unstructured":"Choudhary S, Kesswani N. Detection and prevention of routing attacks in internet of things. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE); 2018. p. 1537\u20131540.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00219"},{"key":"555_CR10","doi-asserted-by":"crossref","unstructured":"Choudhary S, Kesswani N. Cluster-based intrusion detection method for internet of things. In: 2019 IEEE\/ACS 16th international conference on computer systems and applications (AICCSA), IEEE; 2019a. p. 1\u20138.","DOI":"10.1109\/AICCSA47632.2019.9035319"},{"issue":"1","key":"555_CR11","doi-asserted-by":"publisher","first-page":"86","DOI":"10.4018\/IJISP.2019010107","volume":"13","author":"S Choudhary","year":"2019","unstructured":"Choudhary S, Kesswani N. A survey: intrusion detection techniques for internet of things. Int J Inform Security Privacy (IJISP). 2019b;13(1):86\u2013105.","journal-title":"Int J Inform Security Privacy (IJISP)"},{"key":"555_CR12","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N. Distributed attack detection scheme using deep learning approach for internet of things. Future Generation Comput Syst. 2018;82:761\u20138.","journal-title":"Future Generation Comput Syst."},{"key":"555_CR13","doi-asserted-by":"crossref","unstructured":"Jain SK, Kesswani N. Smart judiciary system: A smart dust based iot application. In: International conference on emerging technologies in computer engineering, Springer; 2019. p. 128\u2013140.","DOI":"10.1007\/978-981-13-8300-7_11"},{"issue":"13","key":"555_CR14","doi-asserted-by":"publisher","first-page":"4269","DOI":"10.1109\/JSEN.2017.2705045","volume":"17","author":"AC Jose","year":"2017","unstructured":"Jose AC, Malekian R. Improving smart home security: integrating logical sensing into smart home. IEEE Sens J. 2017;17(13):4269\u201386.","journal-title":"IEEE Sens J"},{"key":"555_CR15","doi-asserted-by":"publisher","unstructured":"Kim H, Smith J, Shin KG. Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of the 6th international conference on mobile systems, applications, and services, ACM, New York, NY, USA, MobiSys \u201908; 2008. p. 239\u2013252. https:\/\/doi.org\/10.1145\/1378600.1378627.","DOI":"10.1145\/1378600.1378627"},{"key":"555_CR16","doi-asserted-by":"crossref","unstructured":"Marchal S, Jiang X, State R, Engel T. A big data architecture for large scale security monitoring. In: 2014 IEEE international congress on big data, IEEE; 2014. p. 56\u201363.","DOI":"10.1109\/BigData.Congress.2014.18"},{"issue":"5","key":"555_CR17","doi-asserted-by":"publisher","first-page":"611","DOI":"10.3233\/JCS-150530","volume":"23","author":"A Merlo","year":"2015","unstructured":"Merlo A, Migliardi M, Fontanelli P. Measuring and estimating power consumption in android to support energy-based intrusion detection. J Comput Security. 2015;23(5):611\u201337.","journal-title":"J Comput Security"},{"key":"555_CR18","unstructured":"Pajouh HH, Javidan R, Khayami R, Ali D, Choo KKR. A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks. IEEE Transactions on Emerging Topics in Computing 2016."},{"issue":"4","key":"555_CR19","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/TLA.2015.7106364","volume":"13","author":"FA Teixeira","year":"2015","unstructured":"Teixeira FA, Vieira GM, Fonseca PM, Pereira FMQ, Wong HC, Nogueira JMS, Oliveira LB. Defending internet of things against exploits. IEEE Latin Am Trans. 2015;13(4):1112\u20139.","journal-title":"IEEE Latin Am Trans"},{"issue":"4","key":"555_CR20","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1109\/JIOT.2019.2946214","volume":"7","author":"A Yang","year":"2020","unstructured":"Yang A, Zhang C, Chen Y, Zhuansun Y, Liu H. Security and privacy of smart home systems based on the internet of things and stereo matching algorithms. IEEE Internet Things J. 2020;7(4):2521\u201330.","journal-title":"IEEE Internet Things J"},{"key":"555_CR21","unstructured":"Yang H. Tang R (2016) Power consumption based android malware detection. J Electr Comput Eng 2016."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00555-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42979-021-00555-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00555-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T07:03:42Z","timestamp":1616569422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42979-021-00555-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,24]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["555"],"URL":"https:\/\/doi.org\/10.1007\/s42979-021-00555-2","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,24]]},"assertion":[{"value":"8 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All the authors gave their consent for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"168"}}