{"id":"https://openalex.org/W4307986628","doi":"https://doi.org/10.1007/s10489-022-04039-5","title":"On-device context-aware misuse detection framework for heterogeneous IoT edge","display_name":"On-device context-aware misuse detection framework for heterogeneous IoT edge","publication_year":2022,"publication_date":"2022-11-03","ids":{"openalex":"https://openalex.org/W4307986628","doi":"https://doi.org/10.1007/s10489-022-04039-5"},"language":"en","primary_location":{"id":"doi:10.1007/s10489-022-04039-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10489-022-04039-5","pdf_url":null,"source":{"id":"https://openalex.org/S74726891","display_name":"Applied Intelligence","issn_l":"0924-669X","issn":["0924-669X","1573-7497"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074127232","display_name":"A Nitish","orcid":null},"institutions":[{"id":"https://openalex.org/I204743663","display_name":"University of Mysore","ror":"https://ror.org/012bxv356","country_code":"IN","type":"education","lineage":["https://openalex.org/I204743663"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nitish A","raw_affiliation_strings":["Department of Studies in Computer Science, University of Mysore, Manasagangothri, Mysuru, 570006, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Studies in Computer Science, University of Mysore, Manasagangothri, Mysuru, 570006, Karnataka, India","institution_ids":["https://openalex.org/I204743663"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053263315","display_name":"J. Hanumanthappa","orcid":null},"institutions":[{"id":"https://openalex.org/I204743663","display_name":"University of Mysore","ror":"https://ror.org/012bxv356","country_code":"IN","type":"education","lineage":["https://openalex.org/I204743663"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hanumanthappa J","raw_affiliation_strings":["Department of Studies in Computer Science, University of Mysore, Manasagangothri, Mysuru, 570006, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Studies in Computer Science, University of Mysore, Manasagangothri, Mysuru, 570006, Karnataka, India","institution_ids":["https://openalex.org/I204743663"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058495787","display_name":"S. P. Shiva Prakash","orcid":"https://orcid.org/0000-0003-3490-6292"},"institutions":[{"id":"https://openalex.org/I4210137436","display_name":"JSS Science and Technology University","ror":"https://ror.org/04mnmkz07","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210137436"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shiva Prakash S. P","raw_affiliation_strings":["Department of Information Science and Engineering, JSS Science and Technology University, JSS Technical Institutions Campus, Mysuru, 570006, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Engineering, JSS Science and Technology University, JSS Technical Institutions Campus, Mysuru, 570006, Karnataka, India","institution_ids":["https://openalex.org/I4210137436"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039153880","display_name":"Kirill Krinkin","orcid":"https://orcid.org/0000-0001-5949-7830"},"institutions":[{"id":"https://openalex.org/I41518628","display_name":"Saint Petersburg State Electrotechnical University","ror":"https://ror.org/023bq8521","country_code":"RU","type":"education","lineage":["https://openalex.org/I41518628"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Kirill Krinkin","raw_affiliation_strings":["Department of Software Engineering and Computer Applications, St. Petersburg Electrotechnical University \u201cLETI\u201d, Ulitsa Professora Popova, 5, St. Petersburg, 197022, Russia","Department of Software Engineering and Computer Applications, St. Petersburg Electrotechnical University \"LETI\", Ulitsa Professora Popova, 5, St. Petersburg, 197022, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering and Computer Applications, St. Petersburg Electrotechnical University \u201cLETI\u201d, Ulitsa Professora Popova, 5, St. Petersburg, 197022, Russia","institution_ids":["https://openalex.org/I41518628"]},{"raw_affiliation_string":"Department of Software Engineering and Computer Applications, St. Petersburg Electrotechnical University \"LETI\", Ulitsa Professora Popova, 5, St. Petersburg, 197022, Russia","institution_ids":["https://openalex.org/I41518628"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058495787"],"corresponding_institution_ids":["https://openalex.org/I4210137436"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":2.413,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.89226199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"53","issue":"12","first_page":"14792","last_page":"14818"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9091020226478577},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5903851389884949},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5559927821159363},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5286762118339539},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47625303268432617},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42645081877708435},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.425245076417923},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.41461044549942017},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4112311601638794},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3522142171859741},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3291434049606323},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3244883120059967},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.11414912343025208}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9091020226478577},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5903851389884949},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5559927821159363},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5286762118339539},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47625303268432617},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42645081877708435},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.425245076417923},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.41461044549942017},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4112311601638794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3522142171859741},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3291434049606323},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3244883120059967},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.11414912343025208},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10489-022-04039-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10489-022-04039-5","pdf_url":null,"source":{"id":"https://openalex.org/S74726891","display_name":"Applied Intelligence","issn_l":"0924-669X","issn":["0924-669X","1573-7497"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Intelligence","raw_type":"journal-article"},{"id":"pmh:oai:eprints.uni-mysore.ac.in:17734","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400737","display_name":"MyPrints@UOM (Mysore University Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204743663","host_organization_name":"University of Mysore","host_organization_lineage":["https://openalex.org/I204743663"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1520795727","https://openalex.org/W2039858940","https://openalex.org/W2122590816","https://openalex.org/W2131463233","https://openalex.org/W2162969618","https://openalex.org/W2342408547","https://openalex.org/W2416799949","https://openalex.org/W2588071164","https://openalex.org/W2733765803","https://openalex.org/W2740052274","https://openalex.org/W2752533296","https://openalex.org/W2770587725","https://openalex.org/W2793241364","https://openalex.org/W2797742547","https://openalex.org/W2803881474","https://openalex.org/W2896180420","https://openalex.org/W2911747218","https://openalex.org/W2913497771","https://openalex.org/W2921364842","https://openalex.org/W2924689635","https://openalex.org/W2952613490","https://openalex.org/W2963748489","https://openalex.org/W2973862992","https://openalex.org/W2982426954","https://openalex.org/W2985453367","https://openalex.org/W2991507433","https://openalex.org/W2995229062","https://openalex.org/W2999309192","https://openalex.org/W3006526650","https://openalex.org/W3033728179","https://openalex.org/W3035366542","https://openalex.org/W3094146027","https://openalex.org/W3094493242","https://openalex.org/W3105750153","https://openalex.org/W3141567114","https://openalex.org/W3155912831","https://openalex.org/W3159080474","https://openalex.org/W3162639575","https://openalex.org/W3183213897","https://openalex.org/W3197226817","https://openalex.org/W3201440045","https://openalex.org/W3203932036","https://openalex.org/W3211805421"],"related_works":["https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W2478244259","https://openalex.org/W2315879531","https://openalex.org/W2187854411","https://openalex.org/W2902040535","https://openalex.org/W41015297","https://openalex.org/W2883540030"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
