{"id":"https://openalex.org/W3011238869","doi":"https://doi.org/10.1109/gcwkshps45667.2019.9024539","title":"MAD-IoT: Memory Anomaly Detection for the Internet of Things","display_name":"MAD-IoT: Memory Anomaly Detection for the Internet of Things","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3011238869","doi":"https://doi.org/10.1109/gcwkshps45667.2019.9024539","mag":"3011238869"},"language":"en","primary_location":{"id":"doi:10.1109/gcwkshps45667.2019.9024539","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps45667.2019.9024539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059491123","display_name":"Jonathan Myers","orcid":null},"institutions":[{"id":"https://openalex.org/I2802946424","display_name":"Johns Hopkins University Applied Physics Laboratory","ror":"https://ror.org/029pp9z10","country_code":"US","type":"facility","lineage":["https://openalex.org/I145311948","https://openalex.org/I2802946424"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jonathan Myers","raw_affiliation_strings":["JHU/APL 11100 Johns Hopkins Rd, Laurel, MD"],"affiliations":[{"raw_affiliation_string":"JHU/APL 11100 Johns Hopkins Rd, Laurel, MD","institution_ids":["https://openalex.org/I2802946424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085312553","display_name":"Leonardo Babun","orcid":"https://orcid.org/0000-0002-7082-8423"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Leonardo Babun","raw_affiliation_strings":["Florida International University 10555 West Flagler St., Miami, FL"],"affiliations":[{"raw_affiliation_string":"Florida International University 10555 West Flagler St., Miami, FL","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091327949","display_name":"Edward Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I107672454","display_name":"Dartmouth College","ror":"https://ror.org/049s0rh22","country_code":"US","type":"education","lineage":["https://openalex.org/I107672454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Edward Yao","raw_affiliation_strings":["Dartmouth College 10 North Main Street, Hanover, NH"],"affiliations":[{"raw_affiliation_string":"Dartmouth College 10 North Main Street, Hanover, NH","institution_ids":["https://openalex.org/I107672454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073084732","display_name":"Sarah C. Helble","orcid":null},"institutions":[{"id":"https://openalex.org/I2802946424","display_name":"Johns Hopkins University Applied Physics Laboratory","ror":"https://ror.org/029pp9z10","country_code":"US","type":"facility","lineage":["https://openalex.org/I145311948","https://openalex.org/I2802946424"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sarah Helble","raw_affiliation_strings":["JHU/APL 11100 Johns Hopkins Rd, Laurel, MD"],"affiliations":[{"raw_affiliation_string":"JHU/APL 11100 Johns Hopkins Rd, Laurel, MD","institution_ids":["https://openalex.org/I2802946424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054198280","display_name":"Patrick D. Allen","orcid":null},"institutions":[{"id":"https://openalex.org/I2802946424","display_name":"Johns Hopkins University Applied Physics Laboratory","ror":"https://ror.org/029pp9z10","country_code":"US","type":"facility","lineage":["https://openalex.org/I145311948","https://openalex.org/I2802946424"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Allen","raw_affiliation_strings":["JHU/APL 11100 Johns Hopkins Rd, Laurel, MD"],"affiliations":[{"raw_affiliation_string":"JHU/APL 11100 Johns Hopkins Rd, Laurel, MD","institution_ids":["https://openalex.org/I2802946424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5059491123"],"corresponding_institution_ids":["https://openalex.org/I2802946424"],"apc_list":null,"apc_paid":null,"fwci":1.8244,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.86534921,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.806722104549408},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6641902923583984},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6191328763961792},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4921111464500427},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47251495718955994},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4718102216720581},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46667659282684326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33318087458610535},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2895872890949249},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20169034600257874},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1771334409713745}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.806722104549408},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6641902923583984},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6191328763961792},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4921111464500427},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47251495718955994},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4718102216720581},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46667659282684326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33318087458610535},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2895872890949249},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20169034600257874},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1771334409713745}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcwkshps45667.2019.9024539","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps45667.2019.9024539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W94181602","https://openalex.org/W161166442","https://openalex.org/W1748095088","https://openalex.org/W2076317514","https://openalex.org/W2101889913","https://openalex.org/W2104948281","https://openalex.org/W2151006143","https://openalex.org/W2168872572","https://openalex.org/W2508433864","https://openalex.org/W2733765803","https://openalex.org/W2741887078","https://openalex.org/W2803355841","https://openalex.org/W2906765636","https://openalex.org/W2907400963","https://openalex.org/W2963012457","https://openalex.org/W4300788801","https://openalex.org/W6603860816","https://openalex.org/W6606620872","https://openalex.org/W6637581689","https://openalex.org/W6748246993","https://openalex.org/W6751184934"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W1509300825","https://openalex.org/W3092582874","https://openalex.org/W2338718585","https://openalex.org/W2054620577"],"abstract_inverted_index":{"In":[0,141,162],"the":[1,13,16,87,114,119,152],"Internet":[2,153],"of":[3,33,68,86,121,131,154,235],"Things":[4],"(IoT),":[5],"applications":[6,40],"hosted":[7],"on":[8,109,208,237,258],"resource-limited":[9],"devices":[10,53],"interact":[11],"with":[12,216,260],"user":[14],"and":[15,23,28,51,82,101,170,206,212,218,241],"physical":[17],"world":[18],"to":[19,25,43,64,94,107,118,126,133,138,164,193,256],"provide":[20,30,165],"digital":[21],"connectivity":[22],"automation":[24],"daily":[26],"activities,":[27],"frequently":[29],"a":[31,95,128,179,209],"point":[32],"entry":[34],"into":[35],"networks.":[36],"However,":[37],"many":[38],"IoT":[39,175,201,238],"are":[41,124],"vulnerable":[42],"cyber":[44],"attacks":[45],"that":[46,226],"can":[47],"put":[48],"networks,":[49],"data,":[50],"connected":[52],"at":[54,70],"risk.":[55],"Integrity":[56,183],"measurement":[57,79,93,136,158,168,197],"is":[58,80,228],"an":[59,156],"active":[60],"defense":[61],"technique":[62],"used":[63],"detect":[65],"malicious":[66],"modification":[67],"software":[69,111,171],"runtime.":[71],"While":[72],"its":[73,214],"usefulness":[74],"has":[75,104],"been":[76,105],"well-demonstrated,":[77],"integrity":[78,92,135,157,167,196],"application-dependent":[81],"requires":[83,97],"domain":[84],"knowledge":[85],"targeted":[88],"software.":[89],"Currently,":[90],"adding":[91],"platform":[96],"substantial":[98,129],"human":[99],"effort,":[100],"thus":[102],"application":[103],"limited":[106,262],"usage":[108],"widely-deployed":[110],"such":[112],"as":[113],"Linux":[115],"kernel.":[116],"Due":[117],"diversity":[120],"IoT,":[122],"vendors":[123],"unlikely":[125],"devote":[127],"amount":[130],"effort":[132],"add":[134],"systems":[137,259],"their":[139],"devices.":[140,202],"this":[142],"paper":[143],"we":[144],"introduce":[145],"MAD-":[146],"IOT":[147],"(Memory":[148],"Anomaly":[149],"Detection":[150],"for":[151,160,174,199],"Things),":[155],"framework":[159],"IoT.":[161],"order":[163],"low-cost":[166],"agents":[169,198],"anomaly":[172],"detection":[173],"platforms,":[176],"MAD-IOT":[177,205,249],"uses":[178,190],"process":[180,189],"called":[181],"IMAGE:":[182],"Measurement":[184],"Agent":[185],"GEneration.":[186],"The":[187],"IMAGE":[188,207,227],"machine":[191,220],"learning":[192,221],"automatically":[194],"generate":[195],"arbitrary":[200],"We":[203],"demonstrated":[204],"proof-of-concept":[210],"testbed":[211],"evaluated":[213],"performance":[215],"supervised":[217],"unsupervised":[219],"models.":[222],"Our":[223],"results":[224],"indicate":[225],"highly":[229],"effective":[230],"in":[231,244],"recognizing":[232],"known":[233],"forms":[234],"misbehavior":[236],"app":[239],"operations,":[240],"very":[242,261],"promising":[243],"identifying":[245],"zero-day":[246],"attacks.":[247],"Finally,":[248],"introduces":[250],"minimal":[251],"overhead,":[252],"making":[253],"it":[254],"feasible":[255],"implement":[257],"resources.":[263]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
