{"id":"https://openalex.org/W3006824036","doi":"https://doi.org/10.1109/bigdata47090.2019.9006156","title":"Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach","display_name":"Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3006824036","doi":"https://doi.org/10.1109/bigdata47090.2019.9006156","mag":"3006824036"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata47090.2019.9006156","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9006156","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083663816","display_name":"Ramesh Paudel","orcid":"https://orcid.org/0000-0002-9284-0511"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ramesh Paudel","raw_affiliation_strings":["Department of Computer Science, Tennessee Technological University, Cookeville, TN"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tennessee Technological University, Cookeville, TN","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052921578","display_name":"Timothy Muncy","orcid":null},"institutions":[{"id":"https://openalex.org/I119443389","display_name":"East Tennessee State University","ror":"https://ror.org/05rfqv493","country_code":"US","type":"education","lineage":["https://openalex.org/I119443389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Timothy Muncy","raw_affiliation_strings":["Department of Computing, East Tennessee State University, Johnson City, TN"],"affiliations":[{"raw_affiliation_string":"Department of Computing, East Tennessee State University, Johnson City, TN","institution_ids":["https://openalex.org/I119443389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011439658","display_name":"William Eberle","orcid":"https://orcid.org/0009-0009-1303-6102"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Eberle","raw_affiliation_strings":["Department of Computer Science, Tennessee Technological University, Cookeville, TN"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tennessee Technological University, Cookeville, TN","institution_ids":["https://openalex.org/I63920570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083663816"],"corresponding_institution_ids":["https://openalex.org/I63920570"],"apc_list":null,"apc_paid":null,"fwci":3.3423,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.93170631,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"5249","last_page":"5258"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8480261564254761},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7899739742279053},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6455276608467102},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6392462253570557},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.5571832656860352},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5279929637908936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.509292483329773},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39803484082221985},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3786527216434479},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2681344151496887},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.23636871576309204},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1629255712032318}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8480261564254761},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7899739742279053},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6455276608467102},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6392462253570557},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.5571832656860352},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5279929637908936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.509292483329773},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39803484082221985},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3786527216434479},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2681344151496887},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.23636871576309204},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1629255712032318},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/bigdata47090.2019.9006156","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9006156","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:dc.etsu.edu:etsu-works-11367","is_oa":false,"landing_page_url":"https://dc.etsu.edu/etsu-works/10101","pdf_url":null,"source":{"id":"https://openalex.org/S4377196424","display_name":"Digital Commons - East Tennessee State University (East Tennessee State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I119443389","host_organization_name":"East Tennessee State University","host_organization_lineage":["https://openalex.org/I119443389"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ETSU Faculty Works","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W207664590","https://openalex.org/W1522649741","https://openalex.org/W1995875735","https://openalex.org/W1997010704","https://openalex.org/W2086254934","https://openalex.org/W2101234009","https://openalex.org/W2108898793","https://openalex.org/W2132069633","https://openalex.org/W2137102757","https://openalex.org/W2154851992","https://openalex.org/W2161984370","https://openalex.org/W2284900416","https://openalex.org/W2294937515","https://openalex.org/W2343571917","https://openalex.org/W2472119793","https://openalex.org/W2574448563","https://openalex.org/W2589622533","https://openalex.org/W2590373591","https://openalex.org/W2608418534","https://openalex.org/W2611626082","https://openalex.org/W2734858986","https://openalex.org/W2738698128","https://openalex.org/W2768696376","https://openalex.org/W2784367396","https://openalex.org/W2797742547","https://openalex.org/W2809409545","https://openalex.org/W2863168017","https://openalex.org/W2888505697","https://openalex.org/W2913697953","https://openalex.org/W2930144424","https://openalex.org/W2947679685","https://openalex.org/W2962756421","https://openalex.org/W3104097132","https://openalex.org/W3105750153","https://openalex.org/W4206152408","https://openalex.org/W4285719527","https://openalex.org/W6675354045","https://openalex.org/W6679663036","https://openalex.org/W6720330311","https://openalex.org/W6747454587","https://openalex.org/W6753654257","https://openalex.org/W6763745478"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W3161928361","https://openalex.org/W3111735654"],"abstract_inverted_index":{"The":[0,94],"use":[1],"of":[2,5,19,33,66],"the":[3,17,34,112],"Internet":[4,65],"Things":[6,67],"(IoT)":[7],"devices":[8,23],"has":[9],"surged":[10],"in":[11,64,92],"recent":[12],"years.":[13],"However,":[14],"due":[15],"to":[16,26,120],"lack":[18],"substantial":[20],"security,":[21],"IoT":[22,75],"are":[24,38],"vulnerable":[25],"cyber-attacks":[27],"like":[28],"Denial-of-Service":[29],"(DoS)":[30],"attacks.":[31],"Most":[32],"current":[35,122],"security":[36],"solutions":[37],"either":[39],"computationally":[40],"expensive":[41],"or":[42,50],"unscalable":[43],"as":[44,77],"they":[45],"require":[46],"known":[47],"attack":[48,91],"signatures":[49],"full":[51],"packet":[52],"inspection.":[53],"In":[54],"this":[55],"paper,":[56],"we":[57],"introduce":[58],"a":[59,78],"novel":[60],"Graph-based":[61],"Outlier":[62],"Detection":[63],"(GODIT)":[68],"approach":[69],"that":[70,106],"(i)":[71],"represents":[72],"smart":[73,103],"home":[74,104],"traffic":[76],"real-time":[79],"graph":[80,85],"stream,":[81],"(ii)":[82],"efficiently":[83],"processes":[84],"data,":[86],"and":[87,117],"(iii)":[88],"detects":[89],"DoS":[90],"real-time.":[93],"experimental":[95],"results":[96],"on":[97],"real-world":[98],"data":[99],"collected":[100],"from":[101],"IoT-equipped":[102],"show":[105],"GODIT":[107],"is":[108,118],"more":[109],"effective":[110],"than":[111],"traditional":[113],"machine":[114],"learning":[115],"approaches,":[116],"able":[119],"outperform":[121],"graph-stream":[123],"anomaly":[124],"detection":[125],"approaches.":[126]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
