{"id":"https://openalex.org/W4200203895","doi":"https://doi.org/10.1109/iscc53001.2021.9631384","title":"Reinforcement Learning-Based Anomaly Detection for Internet of Things Distributed Ledger Technology","display_name":"Reinforcement Learning-Based Anomaly Detection for Internet of Things Distributed Ledger Technology","publication_year":2021,"publication_date":"2021-09-05","ids":{"openalex":"https://openalex.org/W4200203895","doi":"https://doi.org/10.1109/iscc53001.2021.9631384"},"language":"en","primary_location":{"id":"doi:10.1109/iscc53001.2021.9631384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631384","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032589849","display_name":"Anastasios N. Bikos","orcid":"https://orcid.org/0000-0001-6236-1707"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Anastasios N. Bikos","raw_affiliation_strings":["University of Patras, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"University of Patras, Patras, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101957775","display_name":"Sathish Kumar","orcid":"https://orcid.org/0000-0002-3162-2211"},"institutions":[{"id":"https://openalex.org/I102607778","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22","country_code":"US","type":"education","lineage":["https://openalex.org/I102607778"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sathish Kumar","raw_affiliation_strings":["Cleveland State University, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Cleveland State University, Cleveland, OH, USA","institution_ids":["https://openalex.org/I102607778"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032589849"],"corresponding_institution_ids":["https://openalex.org/I174878644"],"apc_list":null,"apc_paid":null,"fwci":2.269,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.8957194,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.910099983215332,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8216148018836975},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6082673072814941},{"id":"https://openalex.org/keywords/directed-acyclic-graph","display_name":"Directed acyclic graph","score":0.5799992084503174},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5404096841812134},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5056698322296143},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4635908007621765},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.45630329847335815},{"id":"https://openalex.org/keywords/distributed-ledger","display_name":"Distributed ledger","score":0.4386309087276459},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43784815073013306},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.42674964666366577},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42018550634384155},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.41138243675231934},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.3789772391319275},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3773723840713501},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33783090114593506},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1917474865913391},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09165367484092712}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216148018836975},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6082673072814941},{"id":"https://openalex.org/C74197172","wikidata":"https://www.wikidata.org/wiki/Q1195339","display_name":"Directed acyclic graph","level":2,"score":0.5799992084503174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5404096841812134},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5056698322296143},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4635908007621765},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.45630329847335815},{"id":"https://openalex.org/C2777541363","wikidata":"https://www.wikidata.org/wiki/Q25110971","display_name":"Distributed ledger","level":3,"score":0.4386309087276459},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43784815073013306},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.42674964666366577},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42018550634384155},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.41138243675231934},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.3789772391319275},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3773723840713501},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33783090114593506},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1917474865913391},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09165367484092712},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc53001.2021.9631384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631384","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1570086078","https://openalex.org/W2110415863","https://openalex.org/W2119075976","https://openalex.org/W2294018787","https://openalex.org/W2392113277","https://openalex.org/W2513765047","https://openalex.org/W2737001326","https://openalex.org/W2755016908","https://openalex.org/W2792471963","https://openalex.org/W2793940409","https://openalex.org/W2795204644","https://openalex.org/W2798990428","https://openalex.org/W2912283946","https://openalex.org/W2914117058","https://openalex.org/W2919976656","https://openalex.org/W2942724139","https://openalex.org/W2963432724","https://openalex.org/W3017367030","https://openalex.org/W3088957430","https://openalex.org/W3107196699","https://openalex.org/W3133444063","https://openalex.org/W4248175462","https://openalex.org/W6746166417"],"related_works":["https://openalex.org/W3038176961","https://openalex.org/W2759600173","https://openalex.org/W4205726392","https://openalex.org/W2954917935","https://openalex.org/W4226470295","https://openalex.org/W4319150754","https://openalex.org/W3155045921","https://openalex.org/W4283071734","https://openalex.org/W3202044564","https://openalex.org/W2988257770"],"abstract_inverted_index":{"Distributed":[0],"Ledger":[1],"Technologies":[2],"(DLT)":[3],"are":[4,124,203],"based":[5],"on":[6],"the":[7,45,51,78,89,97,112,150,156,184,215],"Blockchain":[8,62],"concept":[9],"and":[10,22,54,105,119,126,188,212,214],"have":[11],"been":[12],"specifically":[13],"designed":[14,37],"for":[15,38,64,84,132,161],"enterprise-level":[16],"devices":[17,42,160],"with":[18],"acceptable":[19],"computing":[20,52],"powers":[21,53],"network":[23,56],"bandwidth.":[24,57],"Direct":[25],"Acyclic":[26],"Graph":[27],"(DAG)":[28],"ledger(s)":[29],"is":[30,59,82,88,169],"a":[31,60,129,133,209],"new":[32,113],"form":[33],"of":[34,47,50,77,111,155,197],"DLT":[35],"technology":[36],"Internet-of-":[39],"Things":[40],"(IoT)":[41],"due":[43],"to":[44,107,147,170,181],"nature":[46],"its":[48,85],"disadvantages":[49],"limited":[55],"IOTA":[58,98,186],"DAG-based":[61,157],"implementation":[63,207],"IoT":[65],"applications":[66],"that":[67,81,177],"has":[68],"gained":[69],"an":[70,142],"increased":[71],"attention":[72],"in":[73],"recent":[74],"years.":[75],"One":[76],"major":[79],"concerns":[80],"hindering":[83],"wide":[86],"adaptation":[87],"security":[90,93,122,135,164,174],"concerns.":[91],"Many":[92],"attack":[94],"occurrences":[95],"against":[96,191,200],"such":[99],"as":[100],"parasite":[101],"attacks,":[102],"double":[103],"spending,":[104],"DDoS":[106],"disrupt":[108],"availability":[109],"resources":[110],"ledger":[114],"can":[115,178],"become":[116],"both":[117],"widespread":[118],"disruptive.":[120],"Existing":[121],"studies":[123],"ad-hoc":[125],"typically":[127],"address":[128],"solution":[130,199],"scheme":[131],"specific":[134],"threat.":[136],"In":[137],"this":[138,198],"paper,":[139],"we":[140],"present":[141],"adaptive":[143],"Reinforcement-Learning":[144],"(RL)":[145],"approach":[146],"best":[148],"classify":[149],"monitored":[151],"resource":[152],"consumption":[153],"parameters":[154],"nodes":[158,190],"or":[159],"any":[162],"potential":[163],"anomaly":[165],"detection.":[166],"The":[167,193,205],"aim":[168],"create":[171],"high":[172],"accuracy":[173],"threat":[175],"index":[176],"be":[179],"used":[180],"proactively":[182],"defend":[183],"decentralized":[185],"infrastructure":[187],"individual":[189],"compromises.":[192],"performance":[194],"evaluation":[195],"results":[196],"DoS":[201],"attacks":[202],"promising.":[204],"framework":[206],"derives":[208],"stochastic":[210],"interpretation":[211],"output":[213],"same":[216],"time":[217],"it":[218],"converges":[219],"deterministically.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
