{"id":"https://openalex.org/W4388937810","doi":"https://doi.org/10.1109/icccnt56998.2023.10306651","title":"Improved Deep Maxout for IoT Botnet Attack Detection with LDA based Selected Feature Set","display_name":"Improved Deep Maxout for IoT Botnet Attack Detection with LDA based Selected Feature Set","publication_year":2023,"publication_date":"2023-07-06","ids":{"openalex":"https://openalex.org/W4388937810","doi":"https://doi.org/10.1109/icccnt56998.2023.10306651"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt56998.2023.10306651","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt56998.2023.10306651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087185792","display_name":"Balaganesh Bojarajulu","orcid":"https://orcid.org/0000-0002-2117-2333"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Balaganesh Bojarajulu","raw_affiliation_strings":["Amity University,Amity Institute of Information Technology,Noida,India"],"affiliations":[{"raw_affiliation_string":"Amity University,Amity Institute of Information Technology,Noida,India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014352670","display_name":"Sarvesh Tanwar","orcid":"https://orcid.org/0000-0003-0136-0182"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sarvesh Tanwar","raw_affiliation_strings":["Amity University,Amity Institute of Information Technology,Noida,India"],"affiliations":[{"raw_affiliation_string":"Amity University,Amity Institute of Information Technology,Noida,India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022805973","display_name":"Thipendra P. Singh","orcid":"https://orcid.org/0000-0002-9991-6494"},"institutions":[{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Thipendra Pal Singh","raw_affiliation_strings":["University of Petroleum &amp; Energy Studies,School of Computer Science,Dehradun,Uttarakhand,India"],"affiliations":[{"raw_affiliation_string":"University of Petroleum &amp; Energy Studies,School of Computer Science,Dehradun,Uttarakhand,India","institution_ids":["https://openalex.org/I5847235"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087185792"],"corresponding_institution_ids":["https://openalex.org/I191972202"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.52737472,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9862828254699707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.788604199886322},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6398606300354004},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.608616292476654},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5485461950302124},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5298775434494019},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5208711624145508},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4896877110004425},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4654107391834259},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4466719627380371},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.4404069781303406},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.42177554965019226},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34953057765960693},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3461770713329315},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09586730599403381}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9862828254699707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.788604199886322},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6398606300354004},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.608616292476654},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5485461950302124},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5298775434494019},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5208711624145508},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4896877110004425},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4654107391834259},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4466719627380371},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.4404069781303406},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.42177554965019226},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34953057765960693},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3461770713329315},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09586730599403381},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt56998.2023.10306651","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt56998.2023.10306651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1968419113","https://openalex.org/W2171469056","https://openalex.org/W2956839102","https://openalex.org/W2981856772","https://openalex.org/W2995789841","https://openalex.org/W3084338062","https://openalex.org/W3120099111","https://openalex.org/W3164796711","https://openalex.org/W3173515311","https://openalex.org/W3175217968","https://openalex.org/W3216826992","https://openalex.org/W4205321716","https://openalex.org/W4284974780","https://openalex.org/W4293206041","https://openalex.org/W4294691673","https://openalex.org/W4311263149","https://openalex.org/W4311779867","https://openalex.org/W4312701345","https://openalex.org/W4367461493"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W2938399969","https://openalex.org/W3187581118","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964"],"abstract_inverted_index":{"As":[0],"the":[1,25,68,90,97],"Internet":[2],"of":[3,27,48,84,92,99],"Things":[4],"(IoT)":[5],"grows":[6],"in":[7,46,79],"reputation":[8],"and":[9,77,102],"prevalence,":[10],"concerns":[11],"regarding":[12],"its":[13],"vulnerability":[14],"to":[15,38,88,108],"cyber-attacks":[16],"persist.":[17],"One":[18],"significant":[19],"security":[20,94],"issue":[21],"affecting":[22],"IoT":[23,93],"is":[24],"presence":[26],"botnets.":[28],"While":[29],"several":[30],"studies":[31],"have":[32,43],"utilized":[33],"machine":[34],"learning":[35],"(ML)":[36],"techniques":[37],"detect":[39],"botnets,":[40],"existing":[41],"approaches":[42],"limitations,":[44],"particularly":[45],"terms":[47],"detection":[49,61],"accuracy.":[50],"This":[51,72],"research":[52,101],"paper":[53],"proposes":[54],"an":[55],"improved":[56],"approach":[57,107],"for":[58],"botnet":[59,80,110],"attack":[60],"by":[62,66,95],"employing":[63],"optimal":[64],"features":[65],"utilizing":[67],"Improved":[69],"DeepMaxout":[70],"approach.":[71],"methodology":[73],"enhances":[74],"overall":[75],"efficiency":[76],"accuracy":[78],"detection.":[81],"The":[82],"findings":[83],"this":[85],"study":[86],"contribute":[87],"advancing":[89],"field":[91],"addressing":[96],"limitations":[98],"previous":[100],"providing":[103],"a":[104],"more":[105],"practical":[106],"detecting":[109],"attacks.":[111]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
