{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:37:11Z","timestamp":1732041431520},"reference-count":34,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004541","name":"Ministry of Education, India","doi-asserted-by":"publisher","award":["2020R1I1A3058605"],"id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020930","name":"Ministry of Education, Kenya","doi-asserted-by":"publisher","award":["4199990113966"],"id":[{"id":"10.13039\/501100020930","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["ICT Express"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1016\/j.icte.2022.04.007","type":"journal-article","created":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T01:55:48Z","timestamp":1650592548000},"page":"313-321","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":53,"title":["Uniting cyber security and machine learning: Advantages, challenges and future research"],"prefix":"10.1016","volume":"8","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9898-0921","authenticated-orcid":false,"given":"Mohammad","family":"Wazid","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6730-3060","authenticated-orcid":false,"given":"Vinay","family":"Chamola","sequence":"additional","affiliation":[]},{"given":"Youngho","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.icte.2022.04.007_b1","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","article-title":"Security of the internet of things: Vulnerabilities, attacks, and countermeasures","volume":"22","author":"Butun","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"12","key":"10.1016\/j.icte.2022.04.007_b2","doi-asserted-by":"crossref","first-page":"9531","DOI":"10.1109\/JIOT.2020.3007130","article-title":"Deep-learning-enabled security issues in the internet of things","volume":"8","author":"Lv","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.icte.2022.04.007_b3","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.comcom.2020.07.012","article-title":"BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme","volume":"161","author":"Wang","year":"2020","journal-title":"Comput. Commun."},{"issue":"8","key":"10.1016\/j.icte.2022.04.007_b4","doi-asserted-by":"crossref","first-page":"6393","DOI":"10.1109\/JIOT.2020.3042174","article-title":"Industrial internet-of-things security enhanced with deep learning approaches for smart cities","volume":"8","author":"Magaia","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"21","key":"10.1016\/j.icte.2022.04.007_b5","doi-asserted-by":"crossref","first-page":"15652","DOI":"10.1109\/JIOT.2020.3038009","article-title":"Efficient security and authentication for edge-based internet of medical things","volume":"8","author":"Parah","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.icte.2022.04.007_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2021.102558","article-title":"Effective malware detection scheme based on classified behavior graph in IIoT","volume":"120","author":"Sun","year":"2021","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.icte.2022.04.007_b7","doi-asserted-by":"crossref","first-page":"6801","DOI":"10.1109\/TIP.2021.3098245","article-title":"No-reference quality assessment for screen content images using visual edge model and AdaBoosting neural network","volume":"30","author":"Yang","year":"2021","journal-title":"IEEE Trans. Image Process."},{"issue":"C","key":"10.1016\/j.icte.2022.04.007_b8","article-title":"Trustworthy authorization method for security in industrial internet of things","volume":"121","author":"Zhao","year":"2021","journal-title":"Ad Hoc Netw."},{"issue":"5","key":"10.1016\/j.icte.2022.04.007_b9","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","article-title":"Examining smart-card security under the threat of power analysis attacks","volume":"51","author":"Messerges","year":"2002","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.icte.2022.04.007_b10","series-title":"Theoretical and Experimental Methods for Defending Against DDOS Attacks","first-page":"33","article-title":"Chapter 3 - problem solving, investigating ideas, and solutions","author":"Soltanian","year":"2016"},{"issue":"4","key":"10.1016\/j.icte.2022.04.007_b11","doi-asserted-by":"crossref","first-page":"6668","DOI":"10.1109\/JIOT.2019.2909745","article-title":"EveDroid: Event-aware android malware detection against model degrading for IoT devices","volume":"6","author":"Lei","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.icte.2022.04.007_b12","series-title":"31st International Conference on Neural Information Processing Systems","first-page":"3520","article-title":"Certified defenses for data poisoning attacks","author":"Steinhardt","year":"2017"},{"key":"10.1016\/j.icte.2022.04.007_b13","doi-asserted-by":"crossref","unstructured":"M. Aladag, F.O. Catak, E. Gul, Preventing Data Poisoning Attacks By Using Generative Models, in: 1st International Informatics and Software Engineering Conference, UBMYK, Ankara, Turkey, 2019, pp. 1\u20135, http:\/\/dx.doi.org\/10.1109\/UBMYK48245.2019.8965459.","DOI":"10.1109\/UBMYK48245.2019.8965459"},{"key":"10.1016\/j.icte.2022.04.007_b14","first-page":"1","article-title":"A robust approach for privacy data protection: IoT security assurance using generative adversarial imitation learning","author":"Huang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.icte.2022.04.007_b15","series-title":"2016 IEEE Symposium on Security and Privacy","first-page":"582","article-title":"Distillation as a defense to adversarial perturbations against deep neural networks","author":"Papernot","year":"2016"},{"key":"10.1016\/j.icte.2022.04.007_b16","doi-asserted-by":"crossref","unstructured":"N. Papernot, A Marauder\u2019s Map of Security and Privacy in Machine Learning, in: 11th ACM Workshop on Artificial Intelligence and Security, Toronto, Canada, 2018.","DOI":"10.1145\/3270101.3270102"},{"issue":"2","key":"10.1016\/j.icte.2022.04.007_b17","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MNET.001.1800547","article-title":"Mobility enabled security for optimizing IoT based intelligent applications","volume":"34","author":"Pirbhulal","year":"2020","journal-title":"IEEE Netw."},{"key":"10.1016\/j.icte.2022.04.007_b18","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1016\/j.future.2017.12.012","article-title":"Optimization of real-time traffic network assignment based on IoT data using DBN and clustering model in smart city","volume":"108","author":"Yang","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"10.1016\/j.icte.2022.04.007_b19","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MNET.2018.1800151","article-title":"Intelligent network security monitoring based on optimum-path forest clustering","volume":"33","author":"Guimaraes","year":"2019","journal-title":"IEEE Netw."},{"key":"10.1016\/j.icte.2022.04.007_b20","series-title":"Computer Aided Verification","first-page":"281","article-title":"The AVISPA tool for the automated validation of internet security protocols and applications","author":"Armando","year":"2005"},{"issue":"1","key":"10.1016\/j.icte.2022.04.007_b21","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Syst."},{"key":"10.1016\/j.icte.2022.04.007_b22","doi-asserted-by":"crossref","unstructured":"M. Abdalla, P.A. Fouque, D. Pointcheval, Password-based authenticated key exchange in the three-party setting, in: 8th International Workshop on Theory and Practice in Public Key Cryptography, PKC\u201905, in: Lecture Notes in Computer Science, vol. 3386, Les Diablerets, Switzerland, 2005, pp. 65\u201384.","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"10.1016\/j.icte.2022.04.007_b23","doi-asserted-by":"crossref","first-page":"64411","DOI":"10.1109\/ACCESS.2019.2916886","article-title":"A multimodal malware detection technique for android IoT devices using various features","volume":"7","author":"Kumar","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.icte.2022.04.007_b24","doi-asserted-by":"crossref","unstructured":"H.-T. Nguyen, Q.-D. Ngo, V.-H. Le, IoT Botnet Detection Approach Based on PSI graph and DGCNN classifier, in: 2018 IEEE International Conference on Information Communication and Signal Processing, ICICSP, Singapore, Singapore, 2018, pp. 118\u2013122.","DOI":"10.1109\/ICICSP.2018.8549713"},{"key":"10.1016\/j.icte.2022.04.007_b25","doi-asserted-by":"crossref","unstructured":"S.M. Pudukotai\u00a0Dinakarrao, H. Sayadi, H.M. Makrani, C. Nowzari, S. Rafatirad, H. Homayoun, Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks, in: Design, Automation Test in Europe Conference Exhibition, DATE, Florence, Italy, 2019, pp. 776\u2013781.","DOI":"10.23919\/DATE.2019.8715057"},{"key":"10.1016\/j.icte.2022.04.007_b26","doi-asserted-by":"crossref","unstructured":"J. Su, D.V. Vasconcellos, S. Prasad, D. Sgandurra, Y. Feng, K. Sakurai, Lightweight Classification of IoT Malware Based on Image Recognition, in: IEEE 42nd Annual Computer Software and Applications Conference, Vol. 02, COMPSAC, Tokyo, Japan, 2018, pp. 664\u2013669.","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"10.1016\/j.icte.2022.04.007_b27","doi-asserted-by":"crossref","unstructured":"M. Jagielski, A. Oprea, B. Biggio, C. Liu, C. Nita-Rotaru, B. Li, Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning, in: IEEE Symposium on Security and Privacy, SP, San Francisco, CA, USA, 2018, pp. 19\u201335.","DOI":"10.1109\/SP.2018.00057"},{"key":"10.1016\/j.icte.2022.04.007_b28","doi-asserted-by":"crossref","unstructured":"N. Peri, N. Gupta, W.R. Huang, L. Fowl, C. Zhu, S. Feizi, T. Goldstein, J.P. Dickerson, Strong Baseline Defenses Against Clean-Label Poisoning Attacks, in: ECCV Workshop, 2020, pp. 55\u201370.","DOI":"10.1007\/978-3-030-66415-2_4"},{"key":"10.1016\/j.icte.2022.04.007_b29","series-title":"De-pois: An attack-agnostic defense against data poisoning attacks","author":"Chen","year":"2021"},{"key":"10.1016\/j.icte.2022.04.007_b30","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Phong","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.icte.2022.04.007_b31","doi-asserted-by":"crossref","unstructured":"P. Mohassel, Y. Zhang, SecureML: A System for Scalable Privacy-Preserving Machine Learning, in: IEEE Symposium on Security and Privacy, S&P, San Jose, USA, 2017, pp. 19\u201338, http:\/\/dx.doi.org\/10.1109\/SP.2017.12.","DOI":"10.1109\/SP.2017.12"},{"key":"10.1016\/j.icte.2022.04.007_b32","unstructured":"B. Chen, W. Carvalho, N. Baracaldo, H. Ludwig, B. Edwards, T. Lee, I. Molloy, B. Srivastava, Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering, in: SafeAI@AAAI, Honolulu, USA, 2019."},{"key":"10.1016\/j.icte.2022.04.007_b33","series-title":"Fine-pruning: Defending against backdooring attacks on deep neural networks","author":"Liu","year":"2018"},{"key":"10.1016\/j.icte.2022.04.007_b34","series-title":"RAB: Provable robustness against backdoor attacks","author":"Weber","year":"2020"}],"container-title":["ICT Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2405959522000637?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2405959522000637?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,9,11]],"date-time":"2022-09-11T03:58:43Z","timestamp":1662868723000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2405959522000637"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["S2405959522000637"],"URL":"https:\/\/doi.org\/10.1016\/j.icte.2022.04.007","relation":{},"ISSN":["2405-9595"],"issn-type":[{"value":"2405-9595","type":"print"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Uniting cyber security and machine learning: Advantages, challenges and future research","name":"articletitle","label":"Article Title"},{"value":"ICT Express","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.icte.2022.04.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V. on behalf of The Korean Institute of Communications and Information Sciences.","name":"copyright","label":"Copyright"}]}}