{"id":"https://openalex.org/W2900235511","doi":"https://doi.org/10.1109/comsnets.2019.8711210","title":"A feature-ranking framework for IoT device classification","display_name":"A feature-ranking framework for IoT device classification","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2900235511","doi":"https://doi.org/10.1109/comsnets.2019.8711210","mag":"2900235511"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2019.8711210","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2019.8711210","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 11th International Conference on Communication Systems &amp; Networks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056922013","display_name":"Bharat Atul Desai","orcid":null},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Bharat Atul Desai","raw_affiliation_strings":["Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012540529","display_name":"Dinil Mon Divakaran","orcid":"https://orcid.org/0000-0001-8706-432X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dinil Mon Divakaran","raw_affiliation_strings":["Cyber Security R&D, Trustwave, Singapore"],"affiliations":[{"raw_affiliation_string":"Cyber Security R&D, Trustwave, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051994726","display_name":"Ido Nevat","orcid":"https://orcid.org/0000-0003-1567-3446"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ido Nevat","raw_affiliation_strings":["TUMCREATE, Singapore"],"affiliations":[{"raw_affiliation_string":"TUMCREATE, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009944453","display_name":"Gareth W. Peter","orcid":null},"institutions":[{"id":"https://openalex.org/I32062511","display_name":"Heriot-Watt University","ror":"https://ror.org/04mghma93","country_code":"GB","type":"education","lineage":["https://openalex.org/I32062511"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gareth W. Peter","raw_affiliation_strings":["Department of Actuarial Mathematics and Statistics, Heriot-Watt University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"Department of Actuarial Mathematics and Statistics, Heriot-Watt University, Edinburgh, UK","institution_ids":["https://openalex.org/I32062511"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080394785","display_name":"Mohan Gurusamy","orcid":"https://orcid.org/0000-0001-6764-268X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Mohan Gurusamy","raw_affiliation_strings":["Electrical and Computer Engineering Department, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5056922013"],"corresponding_institution_ids":["https://openalex.org/I152815399"],"apc_list":null,"apc_paid":null,"fwci":4.6205,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.95747031,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.836020827293396},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.6920323371887207},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6240796446800232},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6164549589157104},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5542513728141785},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5291752219200134},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5183625817298889},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.49693062901496887},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.48704126477241516},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4839675724506378},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.47236400842666626},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.45840293169021606},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14645451307296753},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10775786638259888},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.10749906301498413}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.836020827293396},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.6920323371887207},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6240796446800232},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6164549589157104},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5542513728141785},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5291752219200134},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5183625817298889},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.49693062901496887},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.48704126477241516},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4839675724506378},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.47236400842666626},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.45840293169021606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14645451307296753},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10775786638259888},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.10749906301498413},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets.2019.8711210","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2019.8711210","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 11th International Conference on Communication Systems &amp; Networks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1233254008","https://openalex.org/W1491002046","https://openalex.org/W1495061682","https://openalex.org/W2017337590","https://openalex.org/W2048489440","https://openalex.org/W2065955975","https://openalex.org/W2073089243","https://openalex.org/W2114996745","https://openalex.org/W2122210511","https://openalex.org/W2127273221","https://openalex.org/W2157133710","https://openalex.org/W2169038408","https://openalex.org/W2574448563","https://openalex.org/W2593148035","https://openalex.org/W2621148797","https://openalex.org/W2733765803","https://openalex.org/W2749429923","https://openalex.org/W2775542991","https://openalex.org/W2888096149","https://openalex.org/W2901016790","https://openalex.org/W2911964244","https://openalex.org/W2998216295","https://openalex.org/W3010805239","https://openalex.org/W4212883601","https://openalex.org/W4231645469","https://openalex.org/W4252854061","https://openalex.org/W4253269957","https://openalex.org/W4301260464","https://openalex.org/W6678935822","https://openalex.org/W6732005117","https://openalex.org/W6743673742","https://openalex.org/W6754003677","https://openalex.org/W6756410040","https://openalex.org/W6813709114","https://openalex.org/W7066667914"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4238100021"],"abstract_inverted_index":{"IoT":[0,19,28,155,193,214],"market":[1],"is":[2,74],"rapidly":[3],"changing":[4],"the":[5,69,78,94,148,160,167,170,189,198],"cyber":[6],"threat":[7],"landscape.":[8],"The":[9],"challenges":[10],"to":[11,42,67,102,122,131,137],"security":[12],"and":[13,34,52,97,196],"privacy":[14],"arise":[15],"not":[16,75],"only":[17],"because":[18,27],"devices":[20,29],"are":[21,30,39,63,84],"large":[22],"in":[23,32,72,165],"number,":[24],"but":[25],"also":[26],"heterogeneous":[31],"type":[33],"functionality.":[35],"Machine":[36],"learning":[37,172],"algorithms":[38],"attractive":[40],"methods":[41],"solve":[43],"various":[44],"problems":[45],"such":[46,89],"as":[47,65,77,90,134,136],"device":[48,194],"identification,":[49],"anomaly":[50],"detection,":[51],"attack":[53],"detection.":[54],"Often,":[55],"all":[56,126],"available":[57],"features":[58,83,117,152],"extracted":[59,153],"from":[60,154,212],"network":[61,156],"traffic":[62,210],"fed":[64],"input":[66],"train":[68],"models,":[70],"which":[71],"practice":[73],"regarded":[76],"best":[79],"approach.":[80],"Associated":[81],"with":[82,106,125],"different":[85,207],"kinds":[86],"of":[87,116,141,150,162,169,179,192,200],"cost,":[88],"costs":[91],"for":[92,183],"obtaining":[93],"data,":[95],"extracting":[96],"storing":[98],"features,":[99,109,127],"compute":[100],"resources":[101],"run":[103],"a":[104,113,163,176],"model":[105],"high":[107],"dimensional":[108],"etc.":[110],"Instead,":[111],"if":[112],"smaller":[114],"set":[115],"could":[118],"achieve":[119],"performance":[120],"close":[121],"that":[123,128],"obtained":[124,211],"might":[129],"help":[130],"reduce":[132],"cost":[133],"well":[135],"make":[138],"better":[139],"interpretation":[140],"results.":[142],"In":[143],"this":[144],"work,":[145],"we":[146],"address":[147],"problem":[149],"selecting":[151],"traffic,":[157],"based":[158],"on":[159,209],"utility":[161],"feature":[164],"achieving":[166],"goal":[168],"machine":[171],"models.":[173],"We":[174,186],"develop":[175],"unifying":[177],"framework":[178,202],"fundamental":[180],"statistical":[181],"tests":[182],"ranking":[184],"features.":[185],"specifically":[187],"consider":[188],"use":[190],"case":[191],"classification,":[195],"demonstrate":[197],"effectiveness":[199],"our":[201],"by":[203],"evaluating":[204],"it":[205],"using":[206],"classifiers":[208],"real":[213],"devices.":[215]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
