{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:11:22Z","timestamp":1728177082492},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Electrical Engineering"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1016\/j.compeleceng.2022.107716","type":"journal-article","created":{"date-parts":[[2022,1,18]],"date-time":"2022-01-18T17:49:51Z","timestamp":1642528191000},"page":"107716","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":94,"special_numbering":"C","title":["Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques"],"prefix":"10.1016","volume":"98","author":[{"given":"Alaeddine","family":"Mihoub","sequence":"first","affiliation":[]},{"given":"Ouissem Ben","family":"Fredj","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Cheikhrouhou","sequence":"additional","affiliation":[]},{"given":"Abdelouahid","family":"Derhab","sequence":"additional","affiliation":[]},{"given":"Moez","family":"Krichen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2022.107716_bib0001","article-title":"Proof of accumulated trust: a new consensus protocol for the security of the IoV","volume":"32","author":"Mershad","year":"2021","journal-title":"Veh Commun"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0002","doi-asserted-by":"crossref","DOI":"10.1155\/2021\/9978863","article-title":"Healthcare and fitness data management using the IoT-based blockchain platform","volume":"2021","author":"Frikha","year":"2021","journal-title":"J Healthcare Eng"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0003","article-title":"A deep learning-based framework for human activity recognition in smart homes","volume":"2021","author":"Mihoub","year":"2021","journal-title":"Mobile Inf Syst"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0004","article-title":"\u2018Global IoT and non-IoT connections 2010-2025\u2019","year":"2021","journal-title":"Statista"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0005","series-title":"13th International Conference on Security of Information and Networks","first-page":"1","article-title":"CyberSecurity attack prediction: a deep learning approach","author":"Ben Fredj","year":"2020"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0006","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.comcom.2021.04.029","article-title":"Performance evaluation of convolutional neural network for web security","volume":"175","author":"Jemal","year":"2021","journal-title":"Comput Commun"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0007","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Generat Comput Syst"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0008","first-page":"e4112","article-title":"A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT systems by leveraging Fog computing","author":"Kumar","year":"2022","journal-title":"Trans Emerg Telecommun Technol"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0009","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.future.2020.07.020","article-title":"Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment","volume":"113","year":"2020","journal-title":"Future Generat Comput Syst"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0010","first-page":"1","article-title":"A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks","author":"Alkadi","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0011","doi-asserted-by":"crossref","first-page":"114607","DOI":"10.1109\/ACCESS.2019.2935142","article-title":"Mixture localization-based outliers models for securing data migration in cloud centers","volume":"7","author":"AlKadi","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0012","doi-asserted-by":"crossref","first-page":"29696","DOI":"10.1109\/ACCESS.2021.3058528","article-title":"LocKedge: low-complexity cyberattack detection in IoT edge computing","volume":"9","author":"Huong","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.compeleceng.2022.107716_bib0013","doi-asserted-by":"crossref","DOI":"10.3390\/s20030816","article-title":"Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach","volume":"20","author":"Galeano-Brajones","year":"2020","journal-title":"Sensors"},{"issue":"11","key":"10.1016\/j.compeleceng.2022.107716_bib0014","doi-asserted-by":"crossref","first-page":"11","DOI":"10.3390\/electronics8111210","article-title":"A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks","volume":"8","author":"Khraisat","year":"2019","journal-title":"Electronics"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0015","series-title":"2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC)","first-page":"256","article-title":"Deep learning-based intrusion detection for IoT networks","author":"Ge","year":"2019"},{"issue":"4","key":"10.1016\/j.compeleceng.2022.107716_bib0016","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1109\/TEM.2019.2922936","article-title":"DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids","volume":"67","author":"Ferrag","year":"2020","journal-title":"IEEE Trans Eng Manage"},{"issue":"6","key":"10.1016\/j.compeleceng.2022.107716_bib0017","doi-asserted-by":"crossref","first-page":"6","DOI":"10.3390\/app10061909","article-title":"DeepDCA: novel network-based detection of IoT attacks using artificial immune system","volume":"10","author":"Aldhaheri","year":"2020","journal-title":"Appl Sci"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0018","series-title":"2019 Fourth International Conference on Informatics and Computing (ICIC)","first-page":"1","article-title":"DDoS Attack detection based on simple ANN with SMOTE for IoT environment","author":"Soe","year":"2019"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0019","doi-asserted-by":"crossref","DOI":"10.1155\/2020\/6689134","article-title":"Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering","volume":"2020","author":"Derhab","year":"2020","journal-title":"Wirel Commun Mobile Comput"},{"issue":"1","key":"10.1016\/j.compeleceng.2022.107716_bib0020","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach Learn"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0021","unstructured":"\u2018MQTT - the standard for IoT messaging\u2019. https:\/\/mqtt.org\/(accessed Sep. 22, 2021)."},{"key":"10.1016\/j.compeleceng.2022.107716_bib0022","unstructured":"\u2018sFlow.org - making the network visible\u2019. https:\/\/sflow.org\/(accessed May 29, 2021)."},{"key":"10.1016\/j.compeleceng.2022.107716_bib0023","unstructured":"\u2018Node-RED\u2019. https:\/\/nodered.org\/(accessed May 24, 2021)."},{"key":"10.1016\/j.compeleceng.2022.107716_bib0024","series-title":"Data mining in agriculture","first-page":"83","article-title":"k-nearest neighbor classification","author":"Mucherino","year":"2009"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0025","unstructured":"\u2018Multilayer perceptron - an overview | sciencedirect topics\u2019. https:\/\/www.sciencedirect.com\/topics\/computer-science\/multilayer-perceptron (accessed Jun. 01, 2021)."},{"key":"10.1016\/j.compeleceng.2022.107716_bib0026","doi-asserted-by":"crossref","unstructured":"\u2018Long short-term memory | neural computation | MIT Press\u2019. https:\/\/direct.mit.edu\/neco\/article\/9\/8\/1735\/6109\/Long-Short-Term-Memory (accessed Sep. 22, 2021).","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0027","series-title":"2020 IEEE\/ACS 17th International Conference on Computer Systems and Applications (AICCSA)","first-page":"1","article-title":"M-CNN: a new hybrid deep learning model for web security","author":"Jemal","year":"2020"},{"key":"10.1016\/j.compeleceng.2022.107716_bib0028","series-title":"Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4\u20136, 2020, Revised","first-page":"317","article-title":"Malicious Http request detection using code-level convolutional neural network","volume":"15","author":"Jemal","year":"2021"}],"container-title":["Computers & Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790622000337?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790622000337?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T22:57:34Z","timestamp":1672613854000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790622000337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":28,"alternative-id":["S0045790622000337"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107716","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2022,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques","name":"articletitle","label":"Article Title"},{"value":"Computers & Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107716","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107716"}}