TY - JOUR AU - King, J. AU - Awad, A. I. PY - 2016 DA - 2016// TI - A distributed security mechanism for resource-constrained IoT devices JO - Informatica (Slovenia) VL - 40 ID - King2016 ER - TY - CHAP AU - Weber, M. AU - Boban, M. PY - 2016 DA - 2016// TI - Security challenges of the internet of things BT - 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) PB - IEEE CY - Opatija UR - https://doi.org/10.1109/MIPRO.2016.7522219 DO - 10.1109/MIPRO.2016.7522219 ID - Weber2016 ER - TY - CHAP AU - Gendreau, A. A. AU - Moorman, M. PY - 2016 DA - 2016// TI - Survey of intrusion detection systems towards an end to end secure internet of things BT - 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) PB - IEEE CY - Vienna UR - https://doi.org/10.1109/FiCloud.2016.20 DO - 10.1109/FiCloud.2016.20 ID - Gendreau2016 ER - TY - JOUR AU - Kafle, V. P. AU - Fukushima, Y. AU - Harai, H. PY - 2016 DA - 2016// TI - Internet of things standardization in ITU and prospective networking technologies JO - IEEE Commun Mag VL - 54 UR - https://doi.org/10.1109/MCOM.2016.7565271 DO - 10.1109/MCOM.2016.7565271 ID - Kafle2016 ER - TY - JOUR AU - Zanella, A. AU - Bui, N. AU - Castellani, A. AU - Vangelista, L. AU - Zorzi, M. PY - 2014 DA - 2014// TI - Internet of things for smart cities JO - IEEE Internet Things J VL - 1 UR - https://doi.org/10.1109/JIOT.2014.2306328 DO - 10.1109/JIOT.2014.2306328 ID - Zanella2014 ER - TY - STD TI - IoT Bots Cause Massive Internet Outage. https://www.beyondtrust.com/blog/iot-bots-cause-october-21st-2016-massive-internet-outage/. Accessed 22 Oct 2016. UR - https://www.beyondtrust.com/blog/iot-bots-cause-october-21st-2016-massive-internet-outage/ ID - ref6 ER - TY - JOUR AU - Zarpelão, B. B. AU - Miani, R. S. AU - Kawakani, C. T. AU - de Alvarenga, S. C. PY - 2017 DA - 2017// TI - A survey of intrusion detection in internet of things JO - J Netw Comput Appl VL - 84 UR - https://doi.org/10.1016/j.jnca.2017.02.009 DO - 10.1016/j.jnca.2017.02.009 ID - Zarpelão2017 ER - TY - CHAP AU - Ayoub, W. AU - Mroue, M. AU - Nouvel, F. AU - Samhat, A. E. AU - Prévotet, J. PY - 2018 DA - 2018// TI - Towards IP over LPWANs technologies: LoRaWAN, DASH7, NB-IoT BT - 2018 Sixth International Conference on Digital Information, Networking, and Wireless Communications (DINWC) PB - IEEE CY - Beirut UR - https://doi.org/10.1109/DINWC.2018.8356993 DO - 10.1109/DINWC.2018.8356993 ID - Ayoub2018 ER - TY - CHAP AU - Aras, E. AU - Ramachandran, G. S. AU - Lawrence, P. AU - Hughes, D. PY - 2017 DA - 2017// TI - Exploring the security vulnerabilities of LoRa BT - 2017 3rd IEEE International Conference on Cybernetics (CYBCONF) PB - IEEE CY - Exeter ID - Aras2017 ER - TY - CHAP AU - Butun, I. AU - Pereira, N. AU - Gidlund, M. PY - 2018 DA - 2018// TI - Analysis of LoRaWAN v1.1 security BT - Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, SMARTOBJECTS ’18 PB - ACM CY - New York ID - Butun2018 ER - TY - JOUR AU - Čolaković, A. AU - Hadžialić, M. PY - 2018 DA - 2018// TI - Internet of things (IoT): A review of enabling technologies, challenges, and open research issues JO - Comput Netw VL - 144 UR - https://doi.org/10.1016/j.comnet.2018.07.017 DO - 10.1016/j.comnet.2018.07.017 ID - Čolaković2018 ER - TY - STD TI - IEEEThe institute, Special Report:The Internet of Things. http://theinstitute.ieee.org/static/special-report-the-internet-of-things. Accessed 8 Jan 2017. UR - http://theinstitute.ieee.org/static/special-report-the-internet-of-things ID - ref12 ER - TY - JOUR AU - Thiesse, F. AU - Michahelles, F. PY - 2006 DA - 2006// TI - An overview of EPC technology JO - Sens Rev VL - 26 UR - https://doi.org/10.1108/02602280610652677 DO - 10.1108/02602280610652677 ID - Thiesse2006 ER - TY - STD TI - Minerva R, Biru A, Rotondi D (2015) Towards a definition of the internet of things (IoT). Technical report, IEEE, Internet of Things. ID - ref14 ER - TY - STD TI - SPU (2005) The internet of things executive summary. Technical report, The ITU Strategy & Policy Unit, (SPU). ID - ref15 ER - TY - CHAP AU - Krčo, S. AU - Pokrić, B. AU - Carrez, F. PY - 2014 DA - 2014// TI - Designing IoT architecture(s): A european perspective BT - 2014 IEEE World Forum on Internet of Things (WF-IoT) PB - IEEE CY - Seoul UR - https://doi.org/10.1109/WF-IoT.2014.6803124 DO - 10.1109/WF-IoT.2014.6803124 ID - Krčo2014 ER - TY - JOUR AU - Ray, P. P. PY - 2018 DA - 2018// TI - A survey on Internet of Things architectures JO - J King Saud Univ Comput Inform Sci VL - 30 ID - Ray2018 ER - TY - STD TI - Bradley J, Loucks J, Macaulay J, Noronha A (2013) Internet of everything (IoE) value index. Technical report, Cisco. ID - ref18 ER - TY - STD TI - IEEE (2015) Standards, Internet of Things, IEEE P2413. http://standards.ieee.org/develop/project/2413.html. Accessed 8 Jan 2017. UR - http://standards.ieee.org/develop/project/2413.html ID - ref19 ER - TY - JOUR AU - Bandyopadhyay, D. AU - Sen, J. PY - 2011 DA - 2011// TI - Internet of things: Applications and challenges in technology and standardization JO - Wirel Pers Commun VL - 58 UR - https://doi.org/10.1007/s11277-011-0288-5 DO - 10.1007/s11277-011-0288-5 ID - Bandyopadhyay2011 ER - TY - JOUR AU - Han, C. AU - Jornet, J. M. AU - Fadel, E. AU - Akyildiz, I. F. PY - 2013 DA - 2013// TI - A cross-layer communication module for the internet of things JO - Comput Netw VL - 57 UR - https://doi.org/10.1016/j.comnet.2012.10.003 DO - 10.1016/j.comnet.2012.10.003 ID - Han2013 ER - TY - CHAP AU - Khan, R. AU - Khan, S. AU - Zaheer, R. AU - Khan, S. PY - 2012 DA - 2012// TI - Future internet: The internet of things architecture, possible applications and key challenges BT - 2012 10th International Conference on Frontiers of Information Technology PB - IEEE CY - Islamabad UR - https://doi.org/10.1109/FIT.2012.53 DO - 10.1109/FIT.2012.53 ID - Khan2012 ER - TY - CHAP AU - Rao, B. B. P. AU - Saluia, P. AU - Sharma, N. AU - Mittal, A. AU - Sharma, S. V. PY - 2012 DA - 2012// TI - Cloud computing for internet of things & sensing based applications BT - 2012 Sixth International Conference on Sensing Technology (ICST) PB - IEEE CY - Kolkata UR - https://doi.org/10.1109/ICSensT.2012.6461705 DO - 10.1109/ICSensT.2012.6461705 ID - Rao2012 ER - TY - JOUR AU - Khan, Z. AU - Kiani, S. L. AU - Soomro, K. PY - 2014 DA - 2014// TI - A framework for cloud-based context-aware information services for citizens in smart cities JO - J Cloud Comput VL - 3 UR - https://doi.org/10.1186/s13677-014-0014-4 DO - 10.1186/s13677-014-0014-4 ID - Khan2014 ER - TY - JOUR AU - Al-Fuqaha, A. AU - Guizani, M. AU - Mohammadi, M. AU - Aledhari, M. AU - Ayyash, M. PY - 2015 DA - 2015// TI - Internet of things: A survey on enabling technologies, protocols, and applications JO - IEEE Commun Surv Tutor VL - 17 UR - https://doi.org/10.1109/COMST.2015.2444095 DO - 10.1109/COMST.2015.2444095 ID - Al-Fuqaha2015 ER - TY - CHAP AU - Charif, B. AU - Awad, A. I. ED - Corchado, E. ED - Lozano, J. A. ED - Quintián, H. ED - Yin, H. PY - 2014 DA - 2014// TI - Business and government organizations’ adoption of cloud computing BT - Intelligent Data Engineering and Automated Learning – IDEAL 2014 PB - Springer CY - Cham ID - Charif2014 ER - TY - STD TI - Citron R, Maxwell K, Woods E (2017) Smart city services market. Technical report, Navigant Research. ID - ref27 ER - TY - JOUR AU - Ahmed, E. AU - Yaqoob, I. AU - Gani, A. AU - Imran, M. AU - Guizani, M. PY - 2016 DA - 2016// TI - Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges JO - IEEE Wirel Commun VL - 23 UR - https://doi.org/10.1109/MWC.2016.7721736 DO - 10.1109/MWC.2016.7721736 ID - Ahmed2016 ER - TY - BOOK AU - Schaffers, H. AU - Komninos, N. AU - Pallot, M. AU - Trousse, B. AU - Nilsson, M. AU - Oliveira, A. PY - 2011 DA - 2011// TI - Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation PB - Springer CY - Berlin ID - Schaffers2011 ER - TY - CHAP AU - Taherkordi, A. AU - Eliassen, F. PY - 2016 DA - 2016// TI - Scalable modeling of cloud-based IoT services for smart cities BT - 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) PB - IEEE CY - Sydney ID - Taherkordi2016 ER - TY - JOUR AU - Ali, B. AU - Awad, A. I. PY - 2018 DA - 2018// TI - Cyber and physical security vulnerability assessment for IoT-based smart homes JO - Sensors VL - 18 UR - https://doi.org/10.3390/s18030817 DO - 10.3390/s18030817 ID - Ali2018 ER - TY - JOUR AU - Granjal, J. AU - Monteiro, E. AU - SáSilva, J. PY - 2015 DA - 2015// TI - Security for the internet of things: A survey of existing protocols and open research issues JO - IEEE Commun Surv Tutor VL - 17 UR - https://doi.org/10.1109/COMST.2015.2388550 DO - 10.1109/COMST.2015.2388550 ID - Granjal2015 ER - TY - STD TI - Kumar S, Vealey T, Srivastava H (2016) Security in internet of things: Challenges, solutions and future directions In: 2016 49th Hawaii International Conference on System Sciences (HICSS), 5772–5781, Koloa. ID - ref33 ER - TY - JOUR AU - Liu, X. i. r. u. o. AU - Zhao, M. e. i. y. u. a. n. AU - Li, S. u. g. a. n. g. AU - Zhang, F. e. i. x. i. o. n. g. AU - Trappe, W. a. d. e. PY - 2017 DA - 2017// TI - A Security Framework for the Internet of Things in the Future Internet Architecture JO - Future Internet VL - 9 UR - https://doi.org/10.3390/fi9030027 DO - 10.3390/fi9030027 ID - Liu2017 ER - TY - JOUR AU - Trappe, W. AU - Howard, R. AU - Moore, R. S. PY - 2015 DA - 2015// TI - Low-energy security: Limits and opportunities in the internet of things JO - IEEE Secur Priv VL - 13 UR - https://doi.org/10.1109/MSP.2015.7 DO - 10.1109/MSP.2015.7 ID - Trappe2015 ER - TY - JOUR AU - Hassan, A. M. AU - Awad, A. I. PY - 2018 DA - 2018// TI - Urban transition in the era of the internet of things: Social implications and privacy challenges JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2838339 DO - 10.1109/ACCESS.2018.2838339 ID - Hassan2018 ER - TY - BOOK AU - Mohan, R. AU - Danda, J. AU - Hota, C. PY - 2016 DA - 2016// TI - Attack Identification Framework for IoT Devices PB - Springer CY - New Delhi ID - Mohan2016 ER - TY - JOUR AU - Jing, Q. AU - Vasilakos, A. V. AU - Wan, J. AU - Lu, J. AU - Qiu, D. PY - 2014 DA - 2014// TI - Security of the internet of things: perspectives and challenges JO - Wirel Netw VL - 20 UR - https://doi.org/10.1007/s11276-014-0761-7 DO - 10.1007/s11276-014-0761-7 ID - Jing2014 ER - TY - CHAP AU - Forsström, S. AU - Butun, I. AU - Eldefrawy, M. AU - Jennehag, U. AU - Gidlund, M. PY - 2018 DA - 2018// TI - Challenges of securing the industrial internet of things value chain BT - 2018 Workshop on Metrology for Industry 4.0 and IoT PB - IEEE CY - Brescia UR - https://doi.org/10.1109/METROI4.2018.8428344 DO - 10.1109/METROI4.2018.8428344 ID - Forsström2018 ER - TY - CHAP AU - Rubio-Loyola, J. AU - Sala, D. AU - Ali, A. I. PY - 2008 DA - 2008// TI - Accurate real-time monitoring of bottlenecks and performance of packet trace collection BT - 2008 33rd IEEE Conference on Local Computer Networks (LCN) PB - IEEE CY - Montreal UR - https://doi.org/10.1109/LCN.2008.4664298 DO - 10.1109/LCN.2008.4664298 ID - Rubio-Loyola2008 ER - TY - CHAP AU - Rubio-Loyola, J. AU - Sala, D. AU - Ali, A. I. PY - 2008 DA - 2008// TI - Maximizing packet loss monitoring accuracy for reliable trace collections BT - 2008 16th IEEE Workshop on Local and Metropolitan Area Networks PB - IEEE CY - Chij-Napoca UR - https://doi.org/10.1109/LANMAN.2008.4675845 DO - 10.1109/LANMAN.2008.4675845 ID - Rubio-Loyola2008 ER - TY - BOOK AU - Ghorbani, A. A. AU - Lu, W. AU - Tavallaee, M. PY - 2010 DA - 2010// TI - Network Intrusion Detection and Prevention, Advances in Information Security, vol. 47 PB - Springer CY - US UR - https://doi.org/10.1007/978-0-387-88771-5 DO - 10.1007/978-0-387-88771-5 ID - Ghorbani2010 ER - TY - JOUR AU - Anwar, S. AU - Mohamad Zain, J. AU - Zolkipli, M. F. AU - Inayat, Z. AU - Khan, S. AU - Anthony, B. AU - Chang, V. PY - 2017 DA - 2017// TI - From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions JO - Algorithms VL - 10 UR - https://doi.org/10.3390/a10020039 DO - 10.3390/a10020039 ID - Anwar2017 ER - TY - JOUR AU - Denning, D. E. PY - 1987 DA - 1987// TI - An intrusion-detection model JO - IEEE Trans Softw Eng VL - SE-13 UR - https://doi.org/10.1109/TSE.1987.232894 DO - 10.1109/TSE.1987.232894 ID - Denning1987 ER - TY - STD TI - Stefan A (2000) Intrusion detection systems: A survey and taxonomy. Technical report, Chalmers University of Technology Göteborg, Sweden. ID - ref45 ER - TY - JOUR AU - Ganapathy, S. AU - Kulothungan, K. AU - Muthurajkumar, S. AU - Vijayalakshmi, M. AU - Yogesh, P. AU - Kannan, A. PY - 2013 DA - 2013// TI - Intelligent feature selection and classification techniques for intrusion detection in networks: a survey JO - EURASIP J Wirel Commun Netw VL - 2013 UR - https://doi.org/10.1186/1687-1499-2013-271 DO - 10.1186/1687-1499-2013-271 ID - Ganapathy2013 ER - TY - JOUR AU - Mitchell, R. AU - Chen, I. -. R. PY - 2014 DA - 2014// TI - A survey of intrusion detection in wireless network applications JO - Comput Commun VL - 42 UR - https://doi.org/10.1016/j.comcom.2014.01.012 DO - 10.1016/j.comcom.2014.01.012 ID - Mitchell2014 ER - TY - JOUR AU - Butun, I. AU - Morgera, S. D. AU - Sankar, R. PY - 2014 DA - 2014// TI - A survey of intrusion detection systems in wireless sensor networks JO - IEEE Commun Surv Tutor VL - 16 UR - https://doi.org/10.1109/SURV.2013.050113.00191 DO - 10.1109/SURV.2013.050113.00191 ID - Butun2014 ER - TY - JOUR AU - Creech, G. AU - Hu, J. PY - 2014 DA - 2014// TI - A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns JO - IEEE Trans Comput VL - 63 UR - https://doi.org/10.1109/TC.2013.13 DO - 10.1109/TC.2013.13 ID - Creech2014 ER - TY - JOUR AU - Kumar, S. AU - Om, H. PY - 2016 DA - 2016// TI - Computational neural network regression model for host based intrusion detection system JO - Perspect Sci VL - 8 UR - https://doi.org/10.1016/j.pisc.2016.04.005 DO - 10.1016/j.pisc.2016.04.005 ID - Kumar2016 ER - TY - STD TI - SnortThe Open Source Network Intrusion Detection System. https://www.snort.org. Accessed 1 Nov 2016. UR - https://www.snort.org ID - ref51 ER - TY - JOUR AU - Macia-Perez, F. AU - Mora-Gimeno, F. J. AU - Marcos-Jorquera, D. AU - Gil-Martinez-Abarca, J. A. AU - Ramos-Morillo, H. AU - Lorenzo-Fonseca, I. PY - 2011 DA - 2011// TI - Network intrusion detection system embedded on a smart sensor JO - IEEE Trans Ind Electron VL - 58 UR - https://doi.org/10.1109/TIE.2010.2052533 DO - 10.1109/TIE.2010.2052533 ID - Macia-Perez2011 ER - TY - JOUR AU - Pontarelli, S. AU - Bianchi, G. AU - Teofili, S. PY - 2013 DA - 2013// TI - Traffic-aware design of a high-speed fpga network intrusion detection system JO - IEEE Trans Comput VL - 62 UR - https://doi.org/10.1109/TC.2012.105 DO - 10.1109/TC.2012.105 ID - Pontarelli2013 ER - TY - BOOK AU - Mori, Y. AU - Kuroda, M. AU - Makino, N. PY - 2016 DA - 2016// TI - Nonlinear Principal Component Analysis and Its Applications, JSS Research Series in Statistics PB - Springer CY - Singapore UR - https://doi.org/10.1007/978-981-10-0159-8 DO - 10.1007/978-981-10-0159-8 ID - Mori2016 ER - TY - BOOK AU - Jolliffe, I. T. PY - 2002 DA - 2002// TI - Principal Component Analysis, Springer Series in Statistics, vol. 2 PB - Springer CY - New York ID - Jolliffe2002 ER - TY - CHAP AU - Elrawy, M. F. AU - Awad, A. I. AU - Hamed, H. F. A. PY - 2016 DA - 2016// TI - Flow-based features for a robust intrusion detection system targeting mobile traffic BT - 2016 23rd International Conference on Telecommunications (ICT) PB - IEEE CY - Thessaloniki ID - Elrawy2016 ER - TY - CHAP AU - Nwanze, N. AU - i. Kim, S. AU - Summerville, D. H. PY - 2009 DA - 2009// TI - Payload modeling for network intrusion detection systems BT - MILCOM 2009 - 2009 IEEE Military Communications Conference PB - IEEE CY - Boston ID - Nwanze2009 ER - TY - CHAP AU - Chabathula, K. J. AU - Jaidhar, C. D. AU - Kumara, M. A. A. PY - 2015 DA - 2015// TI - Comparative study of principal component analysis based intrusion detection approach using machine learning algorithms BT - 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN) PB - IEEE CY - Chennai ID - Chabathula2015 ER - TY - JOUR AU - Bul’ajoul, W. AU - James, A. AU - Pannu, M. PY - 2015 DA - 2015// TI - Improving network intrusion detection system performance through quality of service configuration and parallel technology JO - J Comput Syst Sci VL - 81 UR - https://doi.org/10.1016/j.jcss.2014.12.012 DO - 10.1016/j.jcss.2014.12.012 ID - Bul’ajoul2015 ER - TY - JOUR AU - Meng, W. AU - Li, W. AU - Kwok, L. -. F. PY - 2014 DA - 2014// TI - Efm: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism JO - Comput Secur VL - 43 UR - https://doi.org/10.1016/j.cose.2014.02.006 DO - 10.1016/j.cose.2014.02.006 ID - Meng2014 ER - TY - JOUR AU - Abduvaliyev, A. AU - Pathan, A. S. K. AU - Zhou, J. AU - Roman, R. AU - Wong, W. C. PY - 2013 DA - 2013// TI - On the vital areas of intrusion detection systems in wireless sensor networks JO - IEEE Commun Surv Tutor VL - 15 UR - https://doi.org/10.1109/SURV.2012.121912.00006 DO - 10.1109/SURV.2012.121912.00006 ID - Abduvaliyev2013 ER - TY - JOUR AU - Bhuyan, M. H. AU - Bhattacharyya, D. K. AU - Kalita, J. K. PY - 2014 DA - 2014// TI - Network anomaly detection: Methods, systems and tools JO - IEEE Commun Surv Tutor VL - 16 UR - https://doi.org/10.1109/SURV.2013.052213.00046 DO - 10.1109/SURV.2013.052213.00046 ID - Bhuyan2014 ER - TY - JOUR AU - Hong, J. AU - Liu, C. AU - Govindarasu, M. PY - 2014 DA - 2014// TI - Integrated anomaly detection for cyber security of the substations JO - IEEE Trans Smart Grid VL - 5 UR - https://doi.org/10.1109/TSG.2013.2294473 DO - 10.1109/TSG.2013.2294473 ID - Hong2014 ER - TY - JOUR AU - Mishra, P. AU - Pilli, E. S. AU - Varadharajan, V. AU - Tupakula, U. PY - 2017 DA - 2017// TI - Intrusion detection techniques in cloud environment: A survey JO - J Netw Comput Appl VL - 77 UR - https://doi.org/10.1016/j.jnca.2016.10.015 DO - 10.1016/j.jnca.2016.10.015 ID - Mishra2017 ER - TY - BOOK PY - 2012 DA - 2012// TI - Data mining: concepts and techniques PB - Morgan Kaufmann CY - Boston ID - ref65 ER - TY - JOUR AU - Duque, S. AU - bin Omar, M. N. PY - 2015 DA - 2015// TI - Using data mining algorithms for developing a model for intrusion detection system (IDS) JO - Procedia Comput Sci VL - 61 UR - https://doi.org/10.1016/j.procs.2015.09.145 DO - 10.1016/j.procs.2015.09.145 ID - Duque2015 ER - TY - JOUR AU - Feng, W. AU - Zhang, Q. AU - Hu, G. AU - Huang, J. X. PY - 2014 DA - 2014// TI - Mining network data for intrusion detection through combining SVMs with ant colony networks JO - Futur Gener Comput Syst VL - 37 UR - https://doi.org/10.1016/j.future.2013.06.027 DO - 10.1016/j.future.2013.06.027 ID - Feng2014 ER - TY - CHAP AU - Alseiari, F. A. A. AU - Aung, Z. PY - 2015 DA - 2015// TI - Real-time anomaly-based distributed intrusion detection systems for advanced metering infrastructure utilizing stream data mining BT - 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE) PB - IEEE CY - Offenburg UR - https://doi.org/10.1109/ICSGCE.2015.7454287 DO - 10.1109/ICSGCE.2015.7454287 ID - Alseiari2015 ER - TY - BOOK PY - 2009 DA - 2009// TI - Machine Learning in Cyber Trust: Security, Privacy, and Reliability. PB - Springer US CY - Springer-Verlag US. pp 1–362 ID - ref69 ER - TY - JOUR AU - Nishani, L. AU - Biba, M. PY - 2016 DA - 2016// TI - Machine learning for intrusion detection in MANET: a state-of-the-art survey JO - J Intell Inf Syst VL - 46 UR - https://doi.org/10.1007/s10844-015-0387-y DO - 10.1007/s10844-015-0387-y ID - Nishani2016 ER - TY - JOUR AU - Namdev, N. AU - Agrawal, S. AU - Silkari, S. PY - 2015 DA - 2015// TI - Recent advancement in machine learning based internet traffic classification JO - Procedia Comput Sci VL - 60 UR - https://doi.org/10.1016/j.procs.2015.08.238 DO - 10.1016/j.procs.2015.08.238 ID - Namdev2015 ER - TY - JOUR AU - Tsai, C. -. F. AU - Hsu, Y. -. F. AU - Lin, C. -. Y. AU - Lin, W. -. Y. PY - 2009 DA - 2009// TI - Intrusion detection by machine learning: A review JO - Expert Syst Appl VL - 36 UR - https://doi.org/10.1016/j.eswa.2009.05.029 DO - 10.1016/j.eswa.2009.05.029 ID - Tsai2009 ER - TY - JOUR AU - Weller-Fahy, D. J. AU - Borghetti, B. J. AU - Sodemann, A. A. PY - 2015 DA - 2015// TI - A survey of distance and similarity measures used within network intrusion anomaly detection JO - IEEE Commun Surv Tutor VL - 17 UR - https://doi.org/10.1109/COMST.2014.2336610 DO - 10.1109/COMST.2014.2336610 ID - Weller-Fahy2015 ER - TY - JOUR AU - Amin, S. O. AU - Siddiqui, M. S. AU - Hong, C. S. AU - Lee, S. PY - 2009 DA - 2009// TI - RIDES: Robust intrusion detection system for ip-based ubiquitous sensor networks JO - Sensors VL - 9 UR - https://doi.org/10.3390/s90503447 DO - 10.3390/s90503447 ID - Amin2009 ER - TY - STD TI - Muzammil MJ, Qazi S, Ali T (2013) Comparative analysis of classification algorithms performance for statistical based intrusion detection system In: 2013 3rd IEEE International Conference on Computer, Control and Communication (IC4), 1–6, Karachi. ID - ref75 ER - TY - STD TI - Mabu S, Chen C, Lu N, Shimada K, Hirasawa K2011. An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming, Vol. 41. ID - ref76 ER - TY - JOUR AU - Xu, C. AU - Chen, S. AU - Su, J. AU - Yiu, S. M. AU - Hui, L. C. K. PY - 2016 DA - 2016// TI - A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms JO - IEEE Commun Surv Tutor VL - 18 UR - https://doi.org/10.1109/COMST.2016.2566669 DO - 10.1109/COMST.2016.2566669 ID - Xu2016 ER - TY - JOUR AU - Davis, J. J. AU - Clark, A. J. PY - 2011 DA - 2011// TI - Data preprocessing for anomaly based network intrusion detection: A review JO - Comput Secur VL - 30 UR - https://doi.org/10.1016/j.cose.2011.05.008 DO - 10.1016/j.cose.2011.05.008 ID - Davis2011 ER - TY - CHAP AU - Vancea, F. AU - Vancea, C. PY - 2015 DA - 2015// TI - Some results on intrusion and anomaly detection using signal processing and NEAR system BT - 2015 38th International Conference on Telecommunications and Signal Processing (TSP) PB - IEEE CY - Prague UR - https://doi.org/10.1109/TSP.2015.7296234 DO - 10.1109/TSP.2015.7296234 ID - Vancea2015 ER - TY - STD TI - Ko C, Ruschitzka M, Levitt K (1997) Execution monitoring of security-critical programs in distributed systems: a specification-based approach In: 1997 IEEE Symposium on Security and Privacy, 175–187, Oakland. ID - ref80 ER - TY - CHAP AU - Berthier, R. AU - Sanders, W. H. PY - 2011 DA - 2011// TI - Specification-based intrusion detection for advanced metering infrastructures BT - 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing PB - IEEE CY - Pasadena UR - https://doi.org/10.1109/PRDC.2011.30 DO - 10.1109/PRDC.2011.30 ID - Berthier2011 ER - TY - STD TI - Surendar M, Umamakeswari A (2016) InDReS: An intrusion detection and response system for internet of things with 6LoWPAN In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 1903–1908, Chennai. ID - ref82 ER - TY - JOUR AU - Le, A. AU - Loo, J. AU - Chai, K. K. AU - Aiash, M. PY - 2016 DA - 2016// TI - A specification-based IDS for detecting attacks on RPL-based network topology JO - Information VL - 7 UR - https://doi.org/10.3390/info7020025 DO - 10.3390/info7020025 ID - Le2016 ER - TY - JOUR AU - Bostani, H. AU - Sheikhan, M. PY - 2017 DA - 2017// TI - Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach JO - Comput Commun VL - 98 UR - https://doi.org/10.1016/j.comcom.2016.12.001 DO - 10.1016/j.comcom.2016.12.001 ID - Bostani2017 ER - TY - JOUR AU - Gupta, G. P. AU - Kulariya, M. PY - 2016 DA - 2016// TI - A framework for fast and efficient cyber security network intrusion detection using apache spark JO - Procedia Comput Sci VL - 93 UR - https://doi.org/10.1016/j.procs.2016.07.238 DO - 10.1016/j.procs.2016.07.238 ID - Gupta2016 ER - TY - CHAP AU - Farissi, I. E. AU - Saber, M. AU - Chadli, S. AU - Emharraf, M. AU - Belkasmi, M. G. PY - 2016 DA - 2016// TI - The analysis performance of an intrusion detection systems based on neural network BT - 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) PB - IEEE CY - Tangier UR - https://doi.org/10.1109/CIST.2016.7805032 DO - 10.1109/CIST.2016.7805032 ID - Farissi2016 ER - TY - CHAP AU - Liu, C. AU - Yang, J. AU - Chen, R. AU - Zhang, Y. AU - Zeng, J. PY - 2011 DA - 2011// TI - Research on immunity-based intrusion detection technology for the internet of things BT - 2011 Seventh International Conference on Natural Computation, vol. 1. PB - IEEE CY - Shanghai UR - https://doi.org/10.1109/ICNC.2011.6022060 DO - 10.1109/ICNC.2011.6022060 ID - Liu2011 ER - TY - CHAP AU - Kasinathan, P. AU - Pastrone, C. AU - Spirito, M. A. AU - Vinkovits, M. PY - 2013 DA - 2013// TI - Denial-of-service detection in 6LoWPAN based internet of things BT - 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) PB - IEEE CY - Lyon UR - https://doi.org/10.1109/WiMOB.2013.6673419 DO - 10.1109/WiMOB.2013.6673419 ID - Kasinathan2013 ER - TY - STD TI - SuricataThe Next Generation Intrusion Detection System. https://oisf.net/. Accessed 5 Dec 2017. UR - https://oisf.net/ ID - ref89 ER - TY - STD TI - Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) DEMO: An IDS framework for internet of things empowered by 6LoWPAN In: Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, CCS ’13, 1337–1340, Berlin. ID - ref90 ER - TY - CHAP AU - Jun, C. AU - Chi, C. PY - 2014 DA - 2014// TI - Design of complex event-processing IDS in internet of things BT - 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation PB - IEEE CY - Zhangjiajie UR - https://doi.org/10.1109/ICMTMA.2014.57 DO - 10.1109/ICMTMA.2014.57 ID - Jun2014 ER - TY - CHAP AU - Krimmling, J. AU - Peter, S. PY - 2014 DA - 2014// TI - Integration and evaluation of intrusion detection for CoAP in smart city applications BT - 2014 IEEE Conference on Communications and Network Security PB - IEEE CY - San Francisco ID - Krimmling2014 ER - TY - JOUR AU - Butun, I. AU - Ra, I. -. H. AU - Sankar, R. PY - 2015 DA - 2015// TI - An intrusion detection system based on multi-level clustering for hierarchical wireless sensor networks JO - Sensors VL - 15 UR - https://doi.org/10.3390/s151128960 DO - 10.3390/s151128960 ID - Butun2015 ER - TY - CHAP AU - Alzubaidi, M. AU - Anbar, M. AU - Al-Saleem, S. AU - Al-Sarawi, S. AU - Alieyan, K. PY - 2017 DA - 2017// TI - Review on mechanisms for detecting sinkhole attacks on RPLs BT - 2017 8th International Conference on Information Technology (ICIT) PB - IEEE CY - Amman UR - https://doi.org/10.1109/ICITECH.2017.8080028 DO - 10.1109/ICITECH.2017.8080028 ID - Alzubaidi2017 ER - TY - JOUR AU - Garcia-Font, V. AU - Garrigues, C. AU - Rifà-Pous, H. PY - 2017 DA - 2017// TI - Attack classification schema for smart city WSNs JO - Sensors VL - 17 UR - https://doi.org/10.3390/s17040771 DO - 10.3390/s17040771 ID - Garcia-Font2017 ER - TY - JOUR AU - Fu, Y. AU - Yan, Z. AU - Cao, J. AU - Ousmane, K. AU - Cao, X. PY - 2017 DA - 2017// TI - An automata based intrusion detection method for internet of things JO - Mob Inf Syst VL - 2017 ID - Fu2017 ER - TY - JOUR AU - Deng, L. AU - Li, D. AU - Yao, X. AU - Cox, D. AU - Wang, H. PY - 2018 DA - 2018// TI - Mobile network intrusion detection for IoT system based on transfer learning algorithm JO - Clust Comput VL - 21 UR - https://doi.org/10.1007/s10586-017-0882-8 DO - 10.1007/s10586-017-0882-8 ID - Deng2018 ER - TY - STD TI - KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 6 Oct 2018. UR - http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html ID - ref98 ER - TY - CHAP AU - Amouri, A. AU - Alaparthy, V. T. AU - Morgera, S. D. PY - 2018 DA - 2018// TI - Cross layer-based intrusion detection based on network behavior for IoT BT - 2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON) PB - IEEE CY - Sand Key ID - Amouri2018 ER - TY - JOUR AU - Liu, L. AU - Xu, B. AU - Zhang, X. AU - Wu, X. PY - 2018 DA - 2018// TI - An intrusion detection method for internet of things based on suppressed fuzzy clustering JO - EURASIP J Wirel Commun Netw VL - 2018 UR - https://doi.org/10.1186/s13638-018-1128-z DO - 10.1186/s13638-018-1128-z ID - Liu2018 ER - TY - CHAP AU - Abhishek, N. V. AU - Lim, T. J. AU - Sikdar, B. AU - Tandon, A. PY - 2018 DA - 2018// TI - An intrusion detection system for detecting compromised gateways in clustered IoT networks BT - 2018 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR) PB - IEEE CY - Austin ID - Abhishek2018 ER - TY - JOUR AU - Oh, D. AU - Kim, D. AU - Ro, W. W. PY - 2014 DA - 2014// TI - A malicious pattern detection engine for embedded security systems in the internet of things JO - Sensors VL - 14 UR - https://doi.org/10.3390/s141224188 DO - 10.3390/s141224188 ID - Oh2014 ER - TY - CHAP AU - Summerville, D. H. AU - Zach, K. M. AU - Chen, Y. PY - 2015 DA - 2015// TI - Ultra-lightweight deep packet anomaly detection for internet of things devices BT - 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC) PB - IEEE CY - Nanjing ID - Summerville2015 ER - TY - STD TI - Arrington B, Barnett L, Rufus R, Esterline A (2016) Behavioral modeling intrusion detection system (BMIDS) using internet of things (IoT) behavior-based anomaly detection via immunity-inspired algorithms In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), 1–6, Waikoloa. ID - ref104 ER - TY - CHAP AU - Gupta, A. AU - Pandey, O. J. AU - Shukla, M. AU - Dadhich, A. AU - Mathur, S. AU - Ingle, A. PY - 2013 DA - 2013// TI - Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks BT - 2013 IEEE International Conference on Computational Intelligence and Computing Research PB - IEEE CY - Enathi ID - Gupta2013 ER - TY - JOUR AU - Raza, S. AU - Wallgren, L. AU - Voigt, T. PY - 2013 DA - 2013// TI - SVELTE: Real-time intrusion detection in the internet of things JO - Ad Hoc Netw VL - 11 UR - https://doi.org/10.1016/j.adhoc.2013.04.014 DO - 10.1016/j.adhoc.2013.04.014 ID - Raza2013 ER - TY - CHAP AU - Khan, Z. A. AU - Herrmann, P. PY - 2017 DA - 2017// TI - A trust based distributed intrusion detection mechanism for internet of things BT - 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA) PB - IEEE CY - Taipei UR - https://doi.org/10.1109/AINA.2017.161 DO - 10.1109/AINA.2017.161 ID - Khan2017 ER - TY - CHAP AU - Okoh, E. AU - Awad, A. I. ED - Yin, X. ED - Ho, K. ED - Zeng, D. ED - Aickelin, U. ED - Zhou, R. ED - Wang, H. PY - 2015 DA - 2015// TI - Biometrics applications in e-health security: A preliminary survey BT - Health Information Science PB - Springer CY - Cham ID - Okoh2015 ER - TY - JOUR AU - Noura, M. AU - Atiquzzaman, M. AU - Gaedke, M. PY - 2018 DA - 2018// TI - Interoperability in internet of things: Taxonomies and open challenges JO - Mobile Networks and Applications VL - 23 UR - https://doi.org/10.1007/s11036-017-0902-1 DO - 10.1007/s11036-017-0902-1 ID - Noura2018 ER -