{"id":"https://openalex.org/W3117946534","doi":"https://doi.org/10.1109/ictc49870.2020.9289380","title":"Attack Detection in Fog Layer for IIoT Based on Machine Learning Approach","display_name":"Attack Detection in Fog Layer for IIoT Based on Machine Learning Approach","publication_year":2020,"publication_date":"2020-10-21","ids":{"openalex":"https://openalex.org/W3117946534","doi":"https://doi.org/10.1109/ictc49870.2020.9289380","mag":"3117946534"},"language":"en","primary_location":{"id":"doi:10.1109/ictc49870.2020.9289380","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc49870.2020.9289380","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068110814","display_name":"Mareska Pratiwi Maharani","orcid":null},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Mareska Pratiwi Maharani","raw_affiliation_strings":["Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002514866","display_name":"Philip Tobianto Daely","orcid":"https://orcid.org/0000-0001-5290-9564"},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Philip Tobianto Daely","raw_affiliation_strings":["Institut Teknologi Telkom Surabaya, Surabaya, Indonesia","Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Institut Teknologi Telkom Surabaya, Surabaya, Indonesia","institution_ids":[]},{"raw_affiliation_string":"Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100381272","display_name":"Jae Min Lee","orcid":"https://orcid.org/0000-0001-6822-1051"},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jae Min Lee","raw_affiliation_strings":["Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102829948","display_name":"Dong\u2010Seong Kim","orcid":"https://orcid.org/0000-0002-2977-5964"},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dong-Seong Kim","raw_affiliation_strings":["Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068110814"],"corresponding_institution_ids":["https://openalex.org/I113409471"],"apc_list":null,"apc_paid":null,"fwci":1.3876,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.83337809,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1880","last_page":"1882"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7950085997581482},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7640165090560913},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6915109753608704},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.6439155340194702},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5634663701057434},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5397952198982239},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.5294684171676636},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.505751371383667},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4928414821624756},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4768208861351013},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.4389711916446686},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4305277466773987},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.42999985814094543},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4125763773918152},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4115031957626343},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39712440967559814},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3530791401863098},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12806883454322815}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7950085997581482},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7640165090560913},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6915109753608704},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.6439155340194702},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5634663701057434},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5397952198982239},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.5294684171676636},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.505751371383667},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4928414821624756},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4768208861351013},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.4389711916446686},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4305277466773987},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.42999985814094543},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4125763773918152},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4115031957626343},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39712440967559814},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3530791401863098},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12806883454322815},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc49870.2020.9289380","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc49870.2020.9289380","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2742495185","https://openalex.org/W2767002174","https://openalex.org/W2885569475","https://openalex.org/W2899633196","https://openalex.org/W2921920205","https://openalex.org/W2944210580","https://openalex.org/W2968774960","https://openalex.org/W2981128517","https://openalex.org/W3003685271","https://openalex.org/W3006115916"],"related_works":["https://openalex.org/W3117176195","https://openalex.org/W2885657717","https://openalex.org/W2892869641","https://openalex.org/W4328007012","https://openalex.org/W3183865553","https://openalex.org/W4288707165","https://openalex.org/W3158188878","https://openalex.org/W4205392332","https://openalex.org/W2940121617","https://openalex.org/W3185624939"],"abstract_inverted_index":{"In":[0,78],"Industrial":[1],"internet":[2],"of":[3,36,76],"things(IIoT),":[4],"the":[5,8,20,37,45,51,58,64,67,74],"infrastructure":[6,42],"and":[7,22,32,62,107,114],"technology":[9],"has":[10],"been":[11],"improved":[12],"a":[13],"lot":[14],"throughout":[15],"times.":[16],"With":[17],"those":[18],"improvements,":[19],"threats":[21],"attacks":[23],"are":[24],"also":[25],"growing":[26],"rapidly":[27],"to":[28,73,92],"become":[29],"more":[30],"various":[31],"advanced":[33],"attacks.":[34],"One":[35],"weakest":[38],"parts":[39],"in":[40,44,66,83],"IIoT":[41],"is":[43,97],"cloud":[46],"layer":[47,69],"that":[48],"can":[49,56],"cause":[50],"system":[52],"failure,":[53],"but":[54],"it":[55],"reduce":[57],"possibility":[59],"by":[60,102,109],"controlling":[61],"maximizing":[63],"ability":[65],"fog":[68,84],"as":[70],"its":[71],"near":[72],"edge":[75],"devices.":[77],"this":[79],"paper,":[80],"attack":[81],"detection":[82],"computing":[85],"framework":[86],"with":[87],"several":[88],"machine":[89],"learning":[90],"algorithms":[91],"efficiently":[93],"detecting":[94],"malicious":[95],"activities":[96],"proposed.":[98],"The":[99],"evaluation":[100],"performed":[101],"using":[103,110],"KDD":[104],"Cup'99":[105],"dataset":[106],"compared":[108],"Decision":[111],"Tree,":[112],"K-Means,":[113],"Random":[115],"Forest":[116],"algorithms.":[117]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
