{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:51:37Z","timestamp":1775065897433,"version":"3.50.1"},"reference-count":89,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012371","name":"Cyraatek Ltd., U.K., the Faculty of Science & Engineering, Manchester Metropolitan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012371","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ENERGY-IQ Project, a U.K.\u2013Canada Power Forward Smart Grid Demonstrator Project"},{"DOI":"10.13039\/100011693","name":"Department for Business, Energy and Industrial Strategy","doi-asserted-by":"publisher","award":["7454460"],"award-info":[{"award-number":["7454460"]}],"id":[{"id":"10.13039\/100011693","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Nigerian Intelligent Clean Energy Marketplace Project"},{"DOI":"10.13039\/501100000278","name":"Department for International Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000278","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,3,15]]},"DOI":"10.1109\/jiot.2020.3034156","type":"journal-article","created":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T20:12:40Z","timestamp":1603829560000},"page":"4944-4956","source":"Crossref","is-referenced-by-count":200,"title":["Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-3941-5903","authenticated-orcid":false,"given":"Segun I.","family":"Popoola","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-9071-9120","authenticated-orcid":false,"given":"Bamidele","family":"Adebisi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-1058-0996","authenticated-orcid":false,"given":"Mohammad","family":"Hammoudeh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-3888-2881","authenticated-orcid":false,"given":"Guan","family":"Gui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-3168-8883","authenticated-orcid":false,"given":"Haris","family":"Gacanin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/5.58337"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1002\/mp.14014"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2019.101030"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s11517-019-02100-z"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-9803-8"},{"key":"ref38","first-page":"683","article-title":"Towards generating real-life datasets for network intrusion detection","volume":"17","author":"bhuyan","year":"2015","journal-title":"Int J Netw Security"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcs.2019.102861"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107358"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2018.2865102"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2810806"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2017.2650938"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8111210"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.01.055"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2015.7288799"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8030322"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852056"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922692"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3016822"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951839"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2019.0294"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010144"},{"key":"ref29","author":"bellman","year":"2015","journal-title":"Adaptive Control Processes A Guided Tour"},{"key":"ref67","first-page":"93","article-title":"Rule generation for signature based detection systems of cyber attacks in IoT environments","volume":"8","author":"soe","year":"2019","journal-title":"Bull Netw Comput Syst Softw"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2019.00059"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2771408"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2018.2864297"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231096"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2019.101728"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2940742"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2883728"},{"key":"ref24","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03028-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916717"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.055"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904620"},{"key":"ref59","first-page":"1","article-title":"Identification of malicious activities in industrial Internet of Things based on deep learning models","volume":"41","author":"muna","year":"2018","journal-title":"J Inf Security Appl"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2019.03.02"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2869577"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2017.8268746"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2017.170"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2848210"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-019-00743-5"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15035-8_94"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2870068"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2759178"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2017.2706859"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2565621"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913288"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2955102"},{"key":"ref82","first-page":"1","article-title":"Neural networks for machine learning lecture 6A overview of mini-batch gradient descent","volume":"14","author":"hinton","year":"2012","journal-title":"CITE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2933276"},{"key":"ref81","first-page":"1139","article-title":"On the importance of initialization and momentum in deep learning","author":"sutskever","year":"2013","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2879579"},{"key":"ref84","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2844296"},{"key":"ref83","author":"zeiler","year":"2012","journal-title":"ADADELTA An Adaptive Learning Rate Method"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2981558"},{"key":"ref80","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2894326"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2968631"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525418"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948888"},{"key":"ref85","first-page":"2013","article-title":"Incorporating Nesterov momentum into Adam","volume":"1","author":"dozat","year":"2016","journal-title":"Proc Int Conf Learn Represent (ICLR) Workshop"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2803201"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488200"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874531"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.02.023"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.future.2020.07.020","article-title":"Anomaly detection framework for Internet of Things traffic using vector convolutional deep learning approach in fog environment","volume":"113","author":"ng","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2019.2919916"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1214\/009053607000000677"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322210"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6779162"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.02.003"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.11.005"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6488907\/9371274\/09241019.pdf?arnumber=9241019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:44Z","timestamp":1652194424000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9241019\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,15]]},"references-count":89,"journal-issue":{"issue":"6"},"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/jiot.2020.3034156","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,15]]}}}