iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1155/2018/3672698
{"id":"https://openalex.org/W2886389843","doi":"https://doi.org/10.1155/2018/3672698","title":"Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation","display_name":"Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation","publication_year":2018,"publication_date":"2018-08-15","ids":{"openalex":"https://openalex.org/W2886389843","doi":"https://doi.org/10.1155/2018/3672698","mag":"2886389843"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/3672698","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/3672698.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/scn/2018/3672698.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019359218","display_name":"Nanda Kumar Thanigaivelan","orcid":null},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Nanda Kumar Thanigaivelan","raw_affiliation_strings":["Department of Future Technologies, University of Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Future Technologies, University of Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061073517","display_name":"Ethiopia Nigussie","orcid":"https://orcid.org/0000-0002-2043-4274"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Ethiopia Nigussie","raw_affiliation_strings":["Department of Future Technologies, University of Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Future Technologies, University of Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007049214","display_name":"Seppo Virtanen","orcid":"https://orcid.org/0000-0002-9487-3018"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Seppo Virtanen","raw_affiliation_strings":["Department of Future Technologies, University of Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Future Technologies, University of Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055846108","display_name":"Jouni Isoaho","orcid":"https://orcid.org/0000-0002-5789-3992"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jouni Isoaho","raw_affiliation_strings":["Department of Future Technologies, University of Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Future Technologies, University of Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5061073517"],"corresponding_institution_ids":["https://openalex.org/I155660961"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"fwci":1.187,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":8,"citation_normalized_percentile":{"value":0.794265,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Security Challenges in Smart Grid Systems","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly Detection","score":0.593884},{"id":"https://openalex.org/keywords/outlier-detection","display_name":"Outlier Detection","score":0.576883},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.556211},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.550075},{"id":"https://openalex.org/keywords/iot-security","display_name":"IoT Security","score":0.522315}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81451285},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6805225},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6661312},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.6555475},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.64904416},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6425764},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.59927744},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.5379906},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.5143836},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.51187533},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.43948022},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15478605},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/3672698","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/3672698.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/57e438e170d24120a55ebdc4fa9fd6ec","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://www.utupub.fi/handle/10024/157031","pdf_url":"https://www.utupub.fi/bitstream/10024/157031/1/3672698.pdf","source":{"id":"https://openalex.org/S4306402470","display_name":"UTUPub (University of Turku)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I155660961","host_organization_name":"University of Turku","host_organization_lineage":["https://openalex.org/I155660961"],"host_organization_lineage_names":["University of Turku"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/3672698","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/3672698.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.91,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1569819710","https://openalex.org/W1943579973","https://openalex.org/W1966576938","https://openalex.org/W1976262362","https://openalex.org/W1977777780","https://openalex.org/W2026609766","https://openalex.org/W2054350231","https://openalex.org/W2058401212","https://openalex.org/W2117141700","https://openalex.org/W2121720842","https://openalex.org/W2141175342","https://openalex.org/W2218489740","https://openalex.org/W2292382605","https://openalex.org/W236568224","https://openalex.org/W2370696599","https://openalex.org/W2404867264","https://openalex.org/W2724395850","https://openalex.org/W4237430618"],"related_works":["https://openalex.org/W4308084484","https://openalex.org/W2392315374","https://openalex.org/W2364195017","https://openalex.org/W2355430452","https://openalex.org/W2351776620","https://openalex.org/W2154523322","https://openalex.org/W2083200807","https://openalex.org/W2049983405","https://openalex.org/W1951195060","https://openalex.org/W1603137082"],"abstract_inverted_index":{"We":[0],"present":[1],"a":[2,115,165],"hybrid":[3],"internal":[4],"anomaly":[5,24,52,81],"detection":[6,10,231,262],"system":[7,95,145,170,197,207,250],"that":[8,127,195,247],"shares":[9],"tasks":[11],"between":[12,107],"router":[13],"and":[14,39,57,76,82,89,100,105,111,124,134,141,157,179,203,213,229,237],"nodes.":[15],"It":[16,120],"allows":[17],"nodes":[18,109,133,178,224,228],"to":[19,61,85,91,103,149,253,260],"react":[20],"instinctively":[21],"against":[22,226],"the":[23,45,48,51,59,80,86,92,108,132,196,248],"node":[25,34,46,53,88],"by":[26],"enforcing":[27],"temporary":[28],"communication":[29],"ban":[30],"on":[31,138],"it.":[32],"Each":[33],"monitors":[35],"its":[36,62,219],"own":[37],"neighbors":[38],"if":[40],"abnormal":[41,227],"behavior":[42],"is":[43,74,101],"detected,":[44],"blocks":[47],"packets":[49],"of":[50,152,176,190,211,216,232],"at":[54],"link":[55,140],"layer":[56],"reports":[58],"incident":[60],"parent":[63,87],"node.":[64],"A":[65],"novel":[66],"RPL":[67],"control":[68],"message,":[69],"Distress":[70],"Propagation":[71],"Object":[72],"(DPO),":[73],"formulated":[75],"used":[77],"for":[78,117,218],"reporting":[79],"network":[83,142,147,155],"activities":[84,113],"subsequently":[90],"router.":[93],"The":[94,144,168,192,206,240],"has":[96,121,198],"configurable":[97],"profile":[98],"settings":[99],"able":[102],"learn":[104],"differentiate":[106],"normal":[110],"suspicious":[112],"without":[114,161],"need":[116],"prior":[118],"knowledge.":[119],"different":[122],"subsystems":[123],"operation":[125],"phases":[126],"are":[128],"distributed":[129],"in":[130,154],"both":[131],"router,":[135],"which":[136],"act":[137],"data":[139],"layers.":[143],"uses":[146],"fingerprinting":[148],"be":[150],"aware":[151],"changes":[153],"topology":[156],"approximate":[158],"threat":[159],"locations":[160],"any":[162],"assistance":[163],"from":[164],"positioning":[166],"subsystem.":[167],"developed":[169,181],"was":[171],"evaluated":[172],"using":[173],"test-bed":[174],"consisting":[175],"Zolertia":[177],"in-house":[180],"PandaBoard":[182],"based":[183],"gateway":[184],"as":[185,187],"well":[186],"emulation":[188],"environment":[189],"Cooja.":[191],"evaluation":[193,245],"revealed":[194],"low":[199],"energy":[200],"consumption":[201],"overhead":[202],"fast":[204],"response.":[205],"occupies":[208],"3.3":[209],"KB":[210,215],"ROM":[212],"0.86":[214],"RAM":[217],"operations.":[220],"Security":[221],"analysis":[222],"confirms":[223],"reaction":[225],"successful":[230],"packet":[233],"flooding,":[234],"selective":[235],"forwarding,":[236],"clone":[238],"attacks.":[239],"system\u2019s":[241],"false":[242,256],"positive":[243,257],"rate":[244,258],"demonstrates":[246],"proposed":[249],"exhibited":[251],"5%":[252],"10%":[254],"lower":[255],"compared":[259],"simple":[261],"system.":[263]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2886389843","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2024-11-11T10:48:43.136003","created_date":"2018-08-22"}