{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:04:03Z","timestamp":1730214243939,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/dcoss49796.2020.00074","type":"proceedings-article","created":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T21:11:15Z","timestamp":1598994675000},"page":"429-435","source":"Crossref","is-referenced-by-count":20,"title":["Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things"],"prefix":"10.1109","author":[{"given":"Muhammad Asaad","family":"Cheema","sequence":"first","affiliation":[]},{"given":"Hassaan","family":"Khaliq Qureshi","sequence":"additional","affiliation":[]},{"given":"Chrysostomos","family":"Chrysostomou","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Lestas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0199-9_62"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18732-3_10"},{"year":"2016","key":"ref10","article-title":"Heightened ddos threat posed by mirai and other botnets"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2927570"},{"article-title":"IoT security:What we can learn from recent threats","year":"2020","author":"d\u2019mello","key":"ref12"},{"article-title":"New Research Unveils Corporate Losses Associated with IoT-Related Security Missteps","year":"2018","author":"chandler","key":"ref13"},{"key":"ref14","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2019","journal-title":"Manubot Tech Rep"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.12.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1750637"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.104"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT46008.2019.8993144"},{"key":"ref28","first-page":"1","article-title":"Ethereum: A secure decentralised generalised trans-action ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045343"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICED.2016.7804660"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0352-x"},{"article-title":"Fridge caught sending spam emails in botnet attack","year":"2014","author":"starr","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3603739"},{"key":"ref9","article-title":"Analysis of the cyber attack on the ukrainian power grid","volume":"388","author":"case","year":"2016","journal-title":"Electricity Information Sharing and Analysis Center (E-ISAC)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00120"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462513"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/34.868688"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2019.8858484"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.21136\/CMJ.1973.101168"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405624"},{"key":"ref26","first-page":"1","author":"moustafa","year":"2015","journal-title":"Military Communications and Information Systems Conference (MilCIS) 2015"},{"key":"ref25","first-page":"1848","article-title":"A detailed analysis on nsl-kdd dataset using various machine learning techniques for intrusion detection","volume":"2","author":"revathi","year":"2013","journal-title":"International Journal of Engineering Research & Technology (IJERT)"}],"event":{"name":"2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS)","start":{"date-parts":[[2020,5,25]]},"location":"Marina del Rey, CA, USA","end":{"date-parts":[[2020,5,27]]}},"container-title":["2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9178819\/9183399\/09183555.pdf?arnumber=9183555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:48:14Z","timestamp":1656344894000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9183555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/dcoss49796.2020.00074","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}