{"id":"https://openalex.org/W4211174255","doi":"https://doi.org/10.1109/iotsms53705.2021.9704944","title":"An Exploratory Data Analysis of the Network Behavior of Hive Home Devices","display_name":"An Exploratory Data Analysis of the Network Behavior of Hive Home Devices","publication_year":2021,"publication_date":"2021-12-06","ids":{"openalex":"https://openalex.org/W4211174255","doi":"https://doi.org/10.1109/iotsms53705.2021.9704944"},"language":"en","primary_location":{"id":"doi:10.1109/iotsms53705.2021.9704944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms53705.2021.9704944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060311185","display_name":"Asmau Wali","orcid":null},"institutions":[{"id":"https://openalex.org/I52590639","display_name":"Nottingham Trent University","ror":"https://ror.org/04xyxjd90","country_code":"GB","type":"education","lineage":["https://openalex.org/I52590639"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Asmau Wali","raw_affiliation_strings":["Nottingham Trent University,Department of Computer Science,Nottingham,UK"],"affiliations":[{"raw_affiliation_string":"Nottingham Trent University,Department of Computer Science,Nottingham,UK","institution_ids":["https://openalex.org/I52590639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059861560","display_name":"Oluwasegun Apejoye","orcid":"https://orcid.org/0009-0008-3463-3320"},"institutions":[{"id":"https://openalex.org/I52590639","display_name":"Nottingham Trent University","ror":"https://ror.org/04xyxjd90","country_code":"GB","type":"education","lineage":["https://openalex.org/I52590639"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Oluwasegun Apejoye","raw_affiliation_strings":["Nottingham Trent University,Department of Computer Science,Nottingham,UK"],"affiliations":[{"raw_affiliation_string":"Nottingham Trent University,Department of Computer Science,Nottingham,UK","institution_ids":["https://openalex.org/I52590639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100639998","display_name":"Jun He","orcid":"https://orcid.org/0000-0002-5616-4691"},"institutions":[{"id":"https://openalex.org/I52590639","display_name":"Nottingham Trent University","ror":"https://ror.org/04xyxjd90","country_code":"GB","type":"education","lineage":["https://openalex.org/I52590639"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jun He","raw_affiliation_strings":["Nottingham Trent University,Department of Computer Science,Nottingham,UK"],"affiliations":[{"raw_affiliation_string":"Nottingham Trent University,Department of Computer Science,Nottingham,UK","institution_ids":["https://openalex.org/I52590639"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054497602","display_name":"Xiaoqi Ma","orcid":"https://orcid.org/0000-0003-0074-4192"},"institutions":[{"id":"https://openalex.org/I52590639","display_name":"Nottingham Trent University","ror":"https://ror.org/04xyxjd90","country_code":"GB","type":"education","lineage":["https://openalex.org/I52590639"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xiaoqi Ma","raw_affiliation_strings":["Nottingham Trent University,Department of Computer Science,Nottingham,UK"],"affiliations":[{"raw_affiliation_string":"Nottingham Trent University,Department of Computer Science,Nottingham,UK","institution_ids":["https://openalex.org/I52590639"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5060311185"],"corresponding_institution_ids":["https://openalex.org/I52590639"],"apc_list":null,"apc_paid":null,"fwci":0.3056,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.622551,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7484519481658936},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.7412917613983154},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5962501764297485},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5600987672805786},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5108889937400818},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.4849252998828888},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.45602887868881226},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20491370558738708},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1747678816318512},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1355489194393158}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7484519481658936},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.7412917613983154},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5962501764297485},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5600987672805786},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5108889937400818},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.4849252998828888},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.45602887868881226},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20491370558738708},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1747678816318512},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1355489194393158},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iotsms53705.2021.9704944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms53705.2021.9704944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"},{"id":"pmh:oai:irep.ntu.ac.uk:45316","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400559","display_name":"Nottingham Trent University's Institutional Repository (Nottingham Trent Repository)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I52590639","host_organization_name":"Nottingham Trent University","host_organization_lineage":["https://openalex.org/I52590639"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Book Section"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1870161617","https://openalex.org/W2003797911","https://openalex.org/W2292021756","https://openalex.org/W2485569983","https://openalex.org/W2508433864","https://openalex.org/W2604210729","https://openalex.org/W2620213176","https://openalex.org/W2621148797","https://openalex.org/W2749429923","https://openalex.org/W2750674396","https://openalex.org/W2766295581","https://openalex.org/W2766400810","https://openalex.org/W2768718335","https://openalex.org/W2790909851","https://openalex.org/W2886320151","https://openalex.org/W2888505697","https://openalex.org/W2890559797","https://openalex.org/W2895909303","https://openalex.org/W2911505293","https://openalex.org/W2921669466","https://openalex.org/W2945159175","https://openalex.org/W2949078875","https://openalex.org/W3015471529","https://openalex.org/W3027485588","https://openalex.org/W3033384383","https://openalex.org/W3091906126","https://openalex.org/W3098497145","https://openalex.org/W3129678898","https://openalex.org/W4288278783","https://openalex.org/W6739320202","https://openalex.org/W6743673742","https://openalex.org/W6749243267","https://openalex.org/W6766925038","https://openalex.org/W6790098587"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2170801710","https://openalex.org/W2384861574","https://openalex.org/W2952704802","https://openalex.org/W4294565801","https://openalex.org/W1994311829"],"abstract_inverted_index":{"Smart":[0],"homes":[1],"are":[2,121,155,177],"gaining":[3],"more":[4],"popularity":[5],"by":[6,138],"the":[7,11,22,29,54,76,95,102,109,116,149,168,185,194],"day":[8],"due":[9,93],"to":[10,41,48,61,68,94,174,189],"ease":[12],"they":[13,99,176],"provide":[14],"in":[15,59,88,115,142,160,182,193],"terms":[16,89],"of":[17,28,56,90,97,108,128,148,171,196],"running":[18],"our":[19],"homes.":[20],"However,":[21],"energy":[23],"and":[24,63,80,135,144,157,181],"resource":[25],"constrained":[26],"nature":[27],"smart":[30,111],"home":[31,78,112],"devices":[32,58,140],"make":[33],"security":[34,66],"integration":[35],"challenging,":[36],"thus":[37,164],"making":[38],"them":[39],"prone":[40],"cyber-attacks.":[42],"This":[43,71],"calls":[44],"for":[45,192],"a":[46],"need":[47],"carry":[49],"out":[50,82,191],"extensive":[51],"research":[52,103],"on":[53],"behavior":[55,92,170],"these":[57,139,172],"order":[60],"design":[62],"incorporate":[64],"better":[65],"tailored":[67],"their":[69,91],"behavior.":[70],"paper":[72,166],"collects":[73],"traffic":[74,124],"from":[75,101],"Hive":[77],"network":[79],"carries":[81],"an":[83,197],"Exploratory":[84],"Data":[85],"Analysis":[86],"(EDA)":[87],"lack":[96],"attention":[98],"face":[100],"community":[104],"despite":[105],"being":[106],"one":[107],"largest":[110],"service":[113],"providers":[114],"UK.":[117],"The":[118],"areas":[119,151],"covered":[120,150],"device":[122,126],"identification,":[123,130],"classification,":[125],"mode":[127],"control":[129],"flow":[131,133],"volume,":[132],"duration":[134],"protocols":[136],"utilized":[137],"both":[141],"active":[143],"idle":[145],"states.":[146],"Some":[147],"involve":[152],"components,":[153,173],"which":[154],"exploited":[156,178],"used":[158],"maliciously":[159],"DDoS":[161],"flooding":[162],"attacks,":[163],"this":[165],"compares":[167],"normal":[169],"when":[175],"during":[179],"attacks":[180],"turn":[183],"giving":[184],"end":[186],"user":[187],"what":[188],"watch":[190],"case":[195],"attack.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
