{"id":"https://openalex.org/W4289713051","doi":"https://doi.org/10.1109/netsoft54395.2022.9844059","title":"An application of Netspot to Detect Anomalies in IoT","display_name":"An application of Netspot to Detect Anomalies in IoT","publication_year":2022,"publication_date":"2022-06-27","ids":{"openalex":"https://openalex.org/W4289713051","doi":"https://doi.org/10.1109/netsoft54395.2022.9844059"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft54395.2022.9844059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft54395.2022.9844059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023774024","display_name":"Tom Tuunainen","orcid":null},"institutions":[{"id":"https://openalex.org/I103547593","display_name":"Centria University of Applied Sciences","ror":"https://ror.org/02t9b8973","country_code":"FI","type":"education","lineage":["https://openalex.org/I103547593"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Tom Tuunainen","raw_affiliation_strings":["Centria University of Applied Sciences"],"affiliations":[{"raw_affiliation_string":"Centria University of Applied Sciences","institution_ids":["https://openalex.org/I103547593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038433860","display_name":"Olli Isohanni","orcid":null},"institutions":[{"id":"https://openalex.org/I103547593","display_name":"Centria University of Applied Sciences","ror":"https://ror.org/02t9b8973","country_code":"FI","type":"education","lineage":["https://openalex.org/I103547593"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Olli Isohanni","raw_affiliation_strings":["Centria University of Applied Sciences"],"affiliations":[{"raw_affiliation_string":"Centria University of Applied Sciences","institution_ids":["https://openalex.org/I103547593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050557088","display_name":"Mitha Rachel Jose","orcid":"https://orcid.org/0009-0008-6832-4366"},"institutions":[{"id":"https://openalex.org/I103547593","display_name":"Centria University of Applied Sciences","ror":"https://ror.org/02t9b8973","country_code":"FI","type":"education","lineage":["https://openalex.org/I103547593"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Mitha Rachel Jose","raw_affiliation_strings":["Centria University of Applied Sciences"],"affiliations":[{"raw_affiliation_string":"Centria University of Applied Sciences","institution_ids":["https://openalex.org/I103547593"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023774024"],"corresponding_institution_ids":["https://openalex.org/I103547593"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09256876,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":null,"first_page":"444","last_page":"449"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864091992378235},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7760767936706543},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5243592262268066},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4867560863494873},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4703781008720398},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4490264356136322},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4228420853614807},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3941260278224945},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32052651047706604},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10363486409187317}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864091992378235},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7760767936706543},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5243592262268066},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4867560863494873},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4703781008720398},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4490264356136322},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4228420853614807},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3941260278224945},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32052651047706604},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10363486409187317},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/netsoft54395.2022.9844059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft54395.2022.9844059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1677315679","https://openalex.org/W2019199024","https://openalex.org/W2036983007","https://openalex.org/W2054724368","https://openalex.org/W2076587863","https://openalex.org/W2122456939","https://openalex.org/W2324099123","https://openalex.org/W2733765803","https://openalex.org/W2743617586","https://openalex.org/W2788455797","https://openalex.org/W2960358720","https://openalex.org/W2963197901","https://openalex.org/W3129401991","https://openalex.org/W4294284964","https://openalex.org/W4300930169","https://openalex.org/W6659495263","https://openalex.org/W6734710626"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"In":[0,20,51],"the":[1,8,24,33,43,57,63,74,86,99,109,131],"world":[2],"of":[3,5,12,35,59,73,101],"Internet":[4],"Things":[6],"(IoT)":[7],"increase":[9],"in":[10,27,65,119,153],"number":[11],"devices":[13],"and":[14,81,96,114,136],"their":[15],"applications":[16],"are":[17],"increasingly":[18],"diversified.":[19],"order":[21],"to":[22,31,41,47,61],"improve":[23],"overall":[25],"security":[26],"IoT":[28,66],"we":[29,54],"need":[30],"emphasize":[32],"aspects":[34],"network":[36,44,49,67,104,155],"traffic":[37,45,100],"security.":[38],"One":[39],"way":[40],"monitor":[42,97],"is":[46,70,112,133,138,151],"detect":[48],"anomalies.":[50],"this":[52,82],"study,":[53],"will":[55],"examine":[56],"application":[58],"netspot":[60,94,150],"find":[62],"anomalies":[64,87],"traffic.":[68],"Netspot":[69],"an":[71],"implementation":[72],"Streaming":[75],"Peaks":[76],"Over":[77],"Threshold":[78],"(SPOT)":[79],"algorithm":[80],"study":[83,141],"proved":[84],"that":[85,93,108,121,146],"can":[88,116],"be":[89,117],"identified":[90],"through":[91],"statistics":[92],"calculates":[95],"from":[98],"a":[102,154],"low":[103,157],"activity.":[105],"We":[106],"examined":[107],"tested":[110],"solution":[111],"efficient":[113],"it":[115,137],"used":[118],"environments":[120],"have":[122,147],"moderate":[123],"computing":[124],"resources.":[125],"After":[126],"analyzing":[127],"with":[128,156],"SPOT":[129],"algorithm,":[130],"result":[132],"purely":[134],"statistical":[135],"minimal.":[139],"This":[140],"also":[142],"demonstrates":[143],"some":[144],"issues":[145],"arisen":[148],"when":[149],"initialized":[152],"activities.":[158]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
