{"id":"https://openalex.org/W4385236573","doi":"https://doi.org/10.1109/eit57321.2023.10187263","title":"Utilizing Computer Vision Algorithms to Detect and Classify Cyberattacks in IoT Environments in Real-Time","display_name":"Utilizing Computer Vision Algorithms to Detect and Classify Cyberattacks in IoT Environments in Real-Time","publication_year":2023,"publication_date":"2023-05-18","ids":{"openalex":"https://openalex.org/W4385236573","doi":"https://doi.org/10.1109/eit57321.2023.10187263"},"language":"en","primary_location":{"id":"doi:10.1109/eit57321.2023.10187263","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/eit57321.2023.10187263","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109481429","display_name":"M. Gromov","orcid":null},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mikhail Gromov","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072393684","display_name":"David Arnold","orcid":"https://orcid.org/0000-0002-9852-7016"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Arnold","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018536803","display_name":"Jafar Saniie","orcid":"https://orcid.org/0000-0002-2655-6950"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jafar Saniie","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109481429"],"corresponding_institution_ids":["https://openalex.org/I180949307"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48524732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"300","last_page":"303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8064252734184265},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7329165935516357},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7117637991905212},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.651949942111969},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5458692312240601},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5366937518119812},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5335389375686646},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5172653794288635},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4176989197731018},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3284974694252014},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24232712388038635},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1757795810699463},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12518450617790222}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8064252734184265},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7329165935516357},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7117637991905212},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.651949942111969},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5458692312240601},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5366937518119812},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5335389375686646},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5172653794288635},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4176989197731018},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3284974694252014},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24232712388038635},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1757795810699463},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12518450617790222}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit57321.2023.10187263","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/eit57321.2023.10187263","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2586432806","https://openalex.org/W2733765803","https://openalex.org/W2799758613","https://openalex.org/W2810674385","https://openalex.org/W2958447056","https://openalex.org/W2963197901","https://openalex.org/W3116550082","https://openalex.org/W3122864121","https://openalex.org/W4284887308","https://openalex.org/W4308992976","https://openalex.org/W4309224501"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964"],"abstract_inverted_index":{"Computer":[0],"vision":[1,36,52],"has":[2,42],"proven":[3],"itself":[4],"capable":[5],"of":[6,26,68,108],"accurately":[7],"detecting":[8],"and":[9,63,70,112,126],"classifying":[10],"objects":[11],"within":[12],"images.":[13],"This":[14,87],"also":[15],"works":[16],"in":[17,100,137],"cases":[18],"where":[19],"images":[20],"are":[21],"used":[22,44,136],"as":[23],"a":[24,65,80,84,92,127],"way":[25],"representing":[27],"data,":[28],"without":[29,113],"being":[30],"actual":[31],"photographs.":[32],"In":[33],"cybersecurity,":[34],"computer":[35,51],"is":[37],"rarely":[38],"used,":[39],"however":[40],"it":[41,57,73,133],"been":[43],"to":[45,53,61,77,130],"detect":[46,62],"botnets":[47],"successfully.":[48],"We":[49],"applied":[50],"determine":[54],"how":[55],"well":[56],"would":[58,74],"be":[59,75,135],"able":[60,76],"classify":[64],"large":[66],"number":[67],"attacks":[69],"determined":[71],"that":[72],"run":[78],"at":[79],"decent":[81],"rate":[82],"on":[83,122],"Jetson":[85,128],"Nano.":[86],"was":[88,120],"accomplished":[89],"by":[90],"training":[91],"convolutional":[93],"neural":[94,118],"network":[95,119],"using":[96],"data":[97],"publicly":[98],"available":[99],"the":[101],"IoT-23":[102],"database,":[103],"which":[104],"contains":[105],"packet":[106],"captures":[107],"IoT":[109],"devices":[110],"with":[111],"different":[114],"malware":[115],"infections.":[116],"The":[117],"evaluated":[121],"an":[123],"RTX":[124],"3050":[125],"Nano":[129],"see":[131],"if":[132],"could":[134],"IoT.":[138]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
