{"id":"https://openalex.org/W3011403117","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035338","title":"Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT Applications","display_name":"Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT Applications","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3011403117","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035338","mag":"3011403117"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa47632.2019.9035338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035338","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074633812","display_name":"Jes\u00fas Pacheco","orcid":"https://orcid.org/0000-0002-8636-5902"},"institutions":[{"id":"https://openalex.org/I4061448","display_name":"Universidad de Sonora","ror":"https://ror.org/00c32gy34","country_code":"MX","type":"education","lineage":["https://openalex.org/I4061448"]}],"countries":["MX"],"is_corresponding":true,"raw_author_name":"Jesus Pacheco","raw_affiliation_strings":["Industrial Engineering Department, Universidad de Sonora, Hermosillo, Mexico"],"affiliations":[{"raw_affiliation_string":"Industrial Engineering Department, Universidad de Sonora, Hermosillo, Mexico","institution_ids":["https://openalex.org/I4061448"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029249013","display_name":"Victor H. Ben\u00edtez","orcid":"https://orcid.org/0000-0002-3926-9352"},"institutions":[{"id":"https://openalex.org/I4061448","display_name":"Universidad de Sonora","ror":"https://ror.org/00c32gy34","country_code":"MX","type":"education","lineage":["https://openalex.org/I4061448"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"Victor H. Benitez","raw_affiliation_strings":["Industrial Engineering Department, Universidad de Sonora, Hermosillo, Mexico"],"affiliations":[{"raw_affiliation_string":"Industrial Engineering Department, Universidad de Sonora, Hermosillo, Mexico","institution_ids":["https://openalex.org/I4061448"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007796269","display_name":"Cihan Tunc","orcid":"https://orcid.org/0000-0001-5200-1097"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cihan Tunc","raw_affiliation_strings":["Electrical and Computer Engineering Department, The University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, The University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036484873","display_name":"Clarisa Grijalva","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Clarisa Grijalva","raw_affiliation_strings":["Electrical and Computer Engineering Department, The University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, The University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074633812"],"corresponding_institution_ids":["https://openalex.org/I4061448"],"apc_list":null,"apc_paid":null,"fwci":0.5305,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71129915,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6745814085006714},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.630966067314148},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.556696355342865},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4552130401134491},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.44884711503982544},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32485297322273254},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.11551657319068909},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.07820343971252441}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6745814085006714},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.630966067314148},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.556696355342865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4552130401134491},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.44884711503982544},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32485297322273254},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.11551657319068909},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.07820343971252441}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa47632.2019.9035338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035338","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.46000000834465027,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1488038755","https://openalex.org/W1559087359","https://openalex.org/W1637652381","https://openalex.org/W2058401212","https://openalex.org/W2114623221","https://openalex.org/W2143842190","https://openalex.org/W2167370023","https://openalex.org/W2561067148","https://openalex.org/W2564745288","https://openalex.org/W2565020525","https://openalex.org/W2565926190","https://openalex.org/W2566913480","https://openalex.org/W2594724343","https://openalex.org/W2611867521","https://openalex.org/W2737879662","https://openalex.org/W2754764339","https://openalex.org/W2768152971","https://openalex.org/W2786518188","https://openalex.org/W2790732269","https://openalex.org/W2803864529","https://openalex.org/W2810689581","https://openalex.org/W2886854560","https://openalex.org/W2889301065","https://openalex.org/W2889361994","https://openalex.org/W2893385029","https://openalex.org/W2910014997"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W2795328844","https://openalex.org/W2795100819","https://openalex.org/W2502697733"],"abstract_inverted_index":{"The":[0,15,78,181],"Internet":[1],"of":[2,47,51,80,90],"Things":[3],"(IoT)":[4],"is":[5],"the":[6,45,104,108,142,146],"new":[7],"trend":[8],"to":[9,38,44,57,102,107,116,140,148,159,172,197],"make":[10,87],"devices":[11],"interact":[12],"among":[13],"themselves.":[14],"IoT":[16,41,81,88,97,123,147],"will":[17,42,132],"connect":[18],"not":[19],"only":[20],"computers":[21],"and":[22,35,62,66,75,84,193,205],"mobile":[23],"devices,":[24,28],"but":[25],"also":[26],"wearable":[27],"smart":[29,31],"buildings,":[30],"cities,":[32],"electrical":[33],"grids,":[34],"automobiles":[36],"just":[37],"name":[39],"few.":[40],"lead":[43],"development":[46],"a":[48,157,175],"wide":[49],"range":[50],"advanced":[52],"information":[53,106],"services":[54],"that":[55,186],"need":[56],"be":[58,71],"processed":[59],"in":[60],"real-time":[61],"require":[63],"large":[64],"storage":[65],"computational":[67],"power":[68],"than":[69],"can":[70],"provided":[72],"by":[73],"Cloud":[74,83],"Fog":[76,85,130,176],"Computing.":[77],"integration":[79],"with":[82,201],"Computing":[86],"capable":[89],"processing":[91],"large-scale":[92],"geo-distributed":[93],"information.":[94,151],"In":[95,152],"any":[96],"application,":[98,113],"communications":[99],"are":[100],"critical":[101],"deliver":[103,149],"required":[105],"end":[109],"user,":[110],"device":[111],"or":[112,129,199],"for":[114],"instance":[115],"take":[117],"actions":[118],"during":[119],"crisis":[120],"events.":[121],"However,":[122],"communication":[124],"elements":[125],"such":[126],"as":[127,137],"gateways":[128],"nodes,":[131],"introduce":[133],"major":[134],"security":[135],"challenges":[136],"they":[138],"contribute":[139],"increase":[141],"attack":[143],"surface,":[144],"preventing":[145],"accurate":[150],"this":[153],"paper,":[154],"we":[155],"propose":[156],"methodology":[158],"develop":[160],"an":[161],"Intrusion":[162],"Detection":[163],"System":[164],"(IDS)":[165],"based":[166],"on":[167],"Anomaly":[168],"Behavior":[169],"Analysis":[170],"(ABA)":[171],"detect":[173],"when":[174],"node":[177],"has":[178],"been":[179],"compromised.":[180],"preliminary":[182],"experimental":[183],"results":[184],"show":[185],"our":[187],"proposed":[188],"approach":[189],"accurately":[190],"detects":[191],"known":[192],"unknown":[194],"anomalies":[195],"due":[196],"misuses":[198],"cyber-attacks,":[200],"high":[202],"detection":[203],"rate":[204],"low":[206],"false":[207],"alarms.":[208]},"counts_by_year":[{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
