{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T06:36:35Z","timestamp":1723530995291},"reference-count":17,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:00:00Z","timestamp":1666051200000},"content-version":"vor","delay-in-days":290,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Networks"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1016\/j.ijin.2022.10.003","type":"journal-article","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T01:52:45Z","timestamp":1666749165000},"page":"181-187","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"special_numbering":"C","title":["Security behavior analysis in web of things smart environments using deep belief networks"],"prefix":"10.1016","volume":"3","author":[{"given":"M.","family":"Premkumar","sequence":"first","affiliation":[]},{"given":"S.R.","family":"Ashokkumar","sequence":"additional","affiliation":[]},{"given":"G.","family":"Mohanbabu","sequence":"additional","affiliation":[]},{"given":"V.","family":"Jeevanantham","sequence":"additional","affiliation":[]},{"given":"S.","family":"Jayakumar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.ijin.2022.10.003_bib1","doi-asserted-by":"crossref","first-page":"8890","DOI":"10.1007\/s11227-021-04188-3","article-title":"Intrusion detection based on machine learning in the internet of things, attacks and counter measures","volume":"78","author":"Rehman","year":"2022","journal-title":"J. Supercomput."},{"key":"10.1016\/j.ijin.2022.10.003_bib2","article-title":"The future of Internet of Things (IoT) and its empowering technology","author":"Perwej","year":"2019","journal-title":"Int. J. Eng. Sci."},{"key":"10.1016\/j.ijin.2022.10.003_bib3","first-page":"1","article-title":"Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network","author":"Durairaj","year":"2022","journal-title":"Energy Sources, Part A Recovery, Util. Environ. Eff."},{"key":"10.1016\/j.ijin.2022.10.003_bib4","series-title":"2019 IEEE Global Communications Conference (GLOBECOM)","first-page":"1","article-title":"Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks","author":"Ibitoye","year":"2019"},{"key":"10.1016\/j.ijin.2022.10.003_bib5","series-title":"2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)","first-page":"913","article-title":"A novel SNN-ANN based IDS in cloud environment","author":"Majumder","year":"2020"},{"key":"10.1016\/j.ijin.2022.10.003_bib6","series-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","first-page":"149","article-title":"Host based intrusion detection system with combined CNN\/RNN model","author":"Chawla","year":"2018"},{"key":"10.1016\/j.ijin.2022.10.003_bib7","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2021.100464","article-title":"A jamming attack detection technique for opportunistic networks","volume":"17","author":"Singh","year":"2022","journal-title":"Internet Things"},{"key":"10.1016\/j.ijin.2022.10.003_bib8","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2021.100393","article-title":"Cyberlearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks","volume":"14","author":"Sarker","year":"2021","journal-title":"Internet Things"},{"key":"10.1016\/j.ijin.2022.10.003_bib9","series-title":"AWeb of things application architecture:Integrating the real world into the Web","author":"Guinard","year":"2011"},{"issue":"4","key":"10.1016\/j.ijin.2022.10.003_bib10","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1109\/JIOT.2015.2452964","article-title":"Request dependency graph: a model for Web usage mining in large-scale Web of things","volume":"3","author":"Liu","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.ijin.2022.10.003_bib11","series-title":"Workshop on Decentralized IoT Security and Standards (DISS)","article-title":"Distributed security risks and opportunities in the W3C Web of Things","author":"McCool","year":"2018"},{"issue":"5","key":"10.1016\/j.ijin.2022.10.003_bib12","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1109\/TCSS.2019.2906925","article-title":"Finding all you need: web APIs recommendation in web of things through keywords search","volume":"6","author":"Qi","year":"2019","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1","key":"10.1016\/j.ijin.2022.10.003_bib13","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1002\/ima.22670","article-title":"Emotion identification by dynamic entropy and ensemble learning from electroencephalogram signals","volume":"32","author":"Ashokkumar","year":"2022","journal-title":"Int. J. Imag. Syst. Technol."},{"key":"10.1016\/j.ijin.2022.10.003_bib14","series-title":"Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications","first-page":"129","article-title":"Browsing the web of things in mobile augmented reality","author":"Zachariah","year":"2019"},{"issue":"2","key":"10.1016\/j.ijin.2022.10.003_bib15","first-page":"393","article-title":"Big data service architecture: a survey","volume":"21","author":"Wang","year":"2020","journal-title":"J. Internet Technol."},{"key":"10.1016\/j.ijin.2022.10.003_bib16","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.sysarc.2018.12.005","article-title":"Authentication in cloud-driven IoT-based big data environment: survey and outlook","volume":"97","author":"Wazid","year":"2019","journal-title":"J. Syst. Architect."},{"key":"10.1016\/j.ijin.2022.10.003_bib17","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2021.107298","article-title":"Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment","volume":"94","author":"Karati","year":"2021","journal-title":"Comput. Electr. Eng."}],"container-title":["International Journal of Intelligent Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666603022000203?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666603022000203?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T13:05:17Z","timestamp":1669467917000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2666603022000203"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":17,"alternative-id":["S2666603022000203"],"URL":"https:\/\/doi.org\/10.1016\/j.ijin.2022.10.003","relation":{},"ISSN":["2666-6030"],"issn-type":[{"value":"2666-6030","type":"print"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security behavior analysis in web of things smart environments using deep belief networks","name":"articletitle","label":"Article Title"},{"value":"International Journal of Intelligent Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijin.2022.10.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Authors. Published by Elsevier B.V. on behalf of KeAi Communications Co., Ltd.","name":"copyright","label":"Copyright"}]}}