{"id":"https://openalex.org/W4385299056","doi":"https://doi.org/10.1145/3603781.3604223","title":"Anomaly Detection in Internet of Things Based on Logs Using Machine Learning and Deep Learning Techniques","display_name":"Anomaly Detection in Internet of Things Based on Logs Using Machine Learning and Deep Learning Techniques","publication_year":2023,"publication_date":"2023-05-26","ids":{"openalex":"https://openalex.org/W4385299056","doi":"https://doi.org/10.1145/3603781.3604223"},"language":"en","primary_location":{"id":"doi:10.1145/3603781.3604223","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603781.3604223","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039570450","display_name":"Huy\u2010Trung Nguyen","orcid":"https://orcid.org/0000-0002-2710-5326"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nguyen Huy-Trung","raw_affiliation_strings":["People's Security Academy, Vietnam"],"affiliations":[{"raw_affiliation_string":"People's Security Academy, Vietnam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103059530","display_name":"Viet Quoc Nguyen","orcid":"https://orcid.org/0009-0006-1249-7706"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nguyen Viet Quoc","raw_affiliation_strings":["Cyber Security and Counter High-Tech Crime Department, Vietnam"],"affiliations":[{"raw_affiliation_string":"Cyber Security and Counter High-Tech Crime Department, Vietnam","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039570450"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8036,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.72993869,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"969","last_page":"974"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7513360977172852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7316126227378845},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7109241485595703},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6660246849060059},{"id":"https://openalex.org/keywords/expansive","display_name":"Expansive","score":0.5965648889541626},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5375340580940247},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5213276743888855},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.4712807536125183},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.46891698241233826},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.44394293427467346},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.44370022416114807},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3005669414997101}],"concepts":[{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7513360977172852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7316126227378845},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7109241485595703},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6660246849060059},{"id":"https://openalex.org/C2780502288","wikidata":"https://www.wikidata.org/wiki/Q28838156","display_name":"Expansive","level":3,"score":0.5965648889541626},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5375340580940247},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5213276743888855},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.4712807536125183},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.46891698241233826},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.44394293427467346},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.44370022416114807},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3005669414997101},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C30407753","wikidata":"https://www.wikidata.org/wiki/Q186191","display_name":"Compressive strength","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603781.3604223","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603781.3604223","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2803881474","https://openalex.org/W3018898752","https://openalex.org/W3036484052","https://openalex.org/W3081229243","https://openalex.org/W4307810440"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W4298284054","https://openalex.org/W2157609968","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W4302368440","https://openalex.org/W2271765275","https://openalex.org/W2740895074","https://openalex.org/W4390608645"],"abstract_inverted_index":{"Engineers":[0],"(developers":[1],"or":[2],"operators)":[3],"can":[4],"comprehend":[5],"the":[6,9,34,153,160,178],"condition":[7],"of":[8,49,65,71,123,180],"system":[10,19,30],"and":[11,18,29,45,89,105,109,121,126,166,172,191],"spot":[12],"odd":[13],"behaviors":[14],"like":[15,139],"malware":[16],"attacks":[17],"failures":[20],"by":[21],"using":[22],"log":[23,72,97,133,149,154],"data":[24,50],"that":[25,177],"records":[26],"critical":[27],"events":[28],"status.":[31],"However,":[32,93],"in":[33,43],"4.0":[35],"era,":[36],"IoT":[37,54,95],"devices":[38],"are":[39,101,144],"expected":[40],"to":[41,78],"explode":[42],"number,":[44],"a":[46,63],"large":[47],"amount":[48],"is":[51,76,118],"generated":[52],"from":[53],"devices.":[55],"If":[56],"something":[57],"goes":[58],"wrong,":[59],"engineers":[60],"will":[61,112,184],"spend":[62],"lot":[64],"time":[66],"manually":[67],"processing":[68],"expansive":[69],"sums":[70],"information.":[73],"Therefore,":[74],"it":[75],"vital":[77],"develop":[79],"automated":[80],"methods":[81],"for":[82,83,119,188],"log-based":[84],"anomaly":[85],"detection,":[86],"machine":[87,106,124,136],"learning,":[88],"deep":[90,103,127],"learning":[91,104,107,125,128,137],"applications.":[92],"with":[94,130,163],"device":[96],"data,":[98],"how":[99],"compelling":[100],"straightforward":[102],"models,":[108],"which":[110],"approach":[111],"be":[113,185],"more":[114],"reasonable?":[115],"This":[116],"work":[117],"research":[120],"evaluation":[122],"models":[129,143],"two":[131,147],"actual":[132,148],"datasets.":[134],"The":[135],"algorithms":[138],"RF,":[140],"kNN,":[141],"XGBoost":[142,158],"trained":[145],"on":[146,152],"datasets":[150],"based":[151],"parsers.":[155],"Ensemble":[156],"classifier,":[157],"got":[159],"best":[161,168],"results":[162],"Accuracy,":[164],"precision,":[165],"F1-score":[167],"at":[169],"99.9%,":[170,173],"99.8%,":[171],"respectively.":[174],"We":[175],"expect":[176],"discoveries":[179],"our":[181],"think":[182],"about":[183],"very":[186],"beneficial":[187],"both":[189],"professionals":[190],"analysts":[192],"seeking":[193],"after":[194],"this":[195],"interesting":[196],"field.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
