Peer Review #1 of "Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning (v0.1)" Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1
Industrial revolution 4.0 with the breakthrough technological advances in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from digitalization and automation to the new era of smart factories.A smart factory can do not only more than just produce products in a digital and automatic system, but also is able to optimize the production on its own by integrating production with process management, service distribution, and customized product requirement.A big challenge to the smart factory is to ensure that its network security can counteract with any cyber attacks such as botnet and DDos (Distributed Denial of Service), They are recognized to cause serious interruption in production, and consequently economic losses for company producers.Among many security solutions, botnet detection using honeypot has shown to be effective in some investigation studies.It is a method of detecting botnet attackers by intentionally creating a resource within the network with the purpose of closely monitoring and acquiring botnet attacking behaviors.For the first time, a proposed model of botnet detection was experimented by combing honeypot with machine learning to classify botnet attacks.A mimicking smart factory environment was created on IoT device hardware configuration.Experimental results showed that the model performance gave a high accuracy of above 96%, with very fast time taken of just 0.1 milliseconds and false positive rate at 0.24127 using random forest algorithm with Weka machine learning program.Hence, the honeypot combined machine learning model in this study was proved to be highly feasible to apply in the security network of smart factory to detect botnet attacks.
Related Topics
- Type
- peer-review
- Language
- en
- Landing Page
- https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1
- OA Status
- gold
- References
- 29
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4235720728
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4235720728Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1Digital Object Identifier
- Title
-
Peer Review #1 of "Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning (v0.1)"Work title
- Type
-
peer-reviewOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-01-25Full publication date if available
- Authors
-
Seungjin Lee, Azween Bin, Noor Zaman, Hoong Kok, Azween Abdullah, Sim KokList of authors in order
- Landing page
-
https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1Direct OA link when available
- Concepts
-
Honeypot, Botnet, Computer science, Factory (object-oriented programming), Internet of Things, Computer security, Operating system, Embedded system, The Internet, Programming languageTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
29Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4235720728 |
|---|---|
| doi | https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1 |
| ids.doi | https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1 |
| ids.openalex | https://openalex.org/W4235720728 |
| fwci | |
| type | peer-review |
| title | Peer Review #1 of "Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning (v0.1)" |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9606999754905701 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C191267431 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9486895799636841 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q911932 |
| concepts[0].display_name | Honeypot |
| concepts[1].id | https://openalex.org/C22735295 |
| concepts[1].level | 3 |
| concepts[1].score | 0.7250068187713623 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q317671 |
| concepts[1].display_name | Botnet |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.5744612216949463 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C40149104 |
| concepts[3].level | 2 |
| concepts[3].score | 0.45456770062446594 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q5620977 |
| concepts[3].display_name | Factory (object-oriented programming) |
| concepts[4].id | https://openalex.org/C81860439 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4517133831977844 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[4].display_name | Internet of Things |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.4425640404224396 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C111919701 |
| concepts[6].level | 1 |
| concepts[6].score | 0.39724427461624146 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[6].display_name | Operating system |
| concepts[7].id | https://openalex.org/C149635348 |
| concepts[7].level | 1 |
| concepts[7].score | 0.3551344871520996 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[7].display_name | Embedded system |
| concepts[8].id | https://openalex.org/C110875604 |
| concepts[8].level | 2 |
| concepts[8].score | 0.14950492978096008 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[8].display_name | The Internet |
| concepts[9].id | https://openalex.org/C199360897 |
| concepts[9].level | 1 |
| concepts[9].score | 0.057933956384658813 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[9].display_name | Programming language |
| keywords[0].id | https://openalex.org/keywords/honeypot |
| keywords[0].score | 0.9486895799636841 |
| keywords[0].display_name | Honeypot |
| keywords[1].id | https://openalex.org/keywords/botnet |
| keywords[1].score | 0.7250068187713623 |
| keywords[1].display_name | Botnet |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.5744612216949463 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/factory |
| keywords[3].score | 0.45456770062446594 |
| keywords[3].display_name | Factory (object-oriented programming) |
| keywords[4].id | https://openalex.org/keywords/internet-of-things |
| keywords[4].score | 0.4517133831977844 |
| keywords[4].display_name | Internet of Things |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.4425640404224396 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/operating-system |
| keywords[6].score | 0.39724427461624146 |
| keywords[6].display_name | Operating system |
| keywords[7].id | https://openalex.org/keywords/embedded-system |
| keywords[7].score | 0.3551344871520996 |
| keywords[7].display_name | Embedded system |
| keywords[8].id | https://openalex.org/keywords/the-internet |
| keywords[8].score | 0.14950492978096008 |
| keywords[8].display_name | The Internet |
| keywords[9].id | https://openalex.org/keywords/programming-language |
| keywords[9].score | 0.057933956384658813 |
| keywords[9].display_name | Programming language |
| language | en |
| locations[0].id | doi:10.7287/peerj-cs.350v0.1/reviews/1 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | peer-review |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5100734808 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1465-4609 |
| authorships[0].author.display_name | Seungjin Lee |
| authorships[0].countries | MY |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210143550 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[0].affiliations[1].raw_affiliation_string | School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[0].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[0].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[0].institutions[0].country_code | MY |
| authorships[0].institutions[0].display_name | Taylor's University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Seungjin Lee |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia, School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[1].author.id | https://openalex.org/A5094459178 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Azween Bin |
| authorships[1].countries | MY |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210143550 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[1].affiliations[1].raw_affiliation_string | School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[1].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[1].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[1].institutions[0].country_code | MY |
| authorships[1].institutions[0].display_name | Taylor's University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Azween Bin |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia, School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[2].author.id | https://openalex.org/A5112409803 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Noor Zaman |
| authorships[2].countries | MY |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I4210143550 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[2].affiliations[1].raw_affiliation_string | School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[2].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[2].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[2].institutions[0].country_code | MY |
| authorships[2].institutions[0].display_name | Taylor's University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Noor Zaman |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia, School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[3].author.id | https://openalex.org/A5094459179 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Hoong Kok |
| authorships[3].countries | MY |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210143550 |
| authorships[3].affiliations[0].raw_affiliation_string | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[3].affiliations[1].raw_affiliation_string | School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[3].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[3].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[3].institutions[0].country_code | MY |
| authorships[3].institutions[0].display_name | Taylor's University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Hoong Kok |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia, School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[4].author.id | https://openalex.org/A5011908153 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-4425-8604 |
| authorships[4].author.display_name | Azween Abdullah |
| authorships[4].countries | MY |
| authorships[4].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[4].affiliations[1].institution_ids | https://openalex.org/I4210143550 |
| authorships[4].affiliations[1].raw_affiliation_string | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[4].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[4].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[4].institutions[0].country_code | MY |
| authorships[4].institutions[0].display_name | Taylor's University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Azween Abdullah |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia, School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[5].author.id | https://openalex.org/A5110877857 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Sim Kok |
| authorships[5].countries | MY |
| authorships[5].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[5].affiliations[1].institution_ids | https://openalex.org/I4210143550 |
| authorships[5].affiliations[1].raw_affiliation_string | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| authorships[5].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[5].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[5].institutions[0].country_code | MY |
| authorships[5].institutions[0].display_name | Taylor's University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Sim Kok |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | School of Computer Science & Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia, School of Computer Science and Engineering, Taylor's University, No. 1 Jalan Taylor's, 47500, Subang Jaya, Selangor, Malaysia |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2022-05-12T00:00:00 |
| display_name | Peer Review #1 of "Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning (v0.1)" |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9606999754905701 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2789663798, https://openalex.org/W2375896275, https://openalex.org/W2166943775, https://openalex.org/W1903420481, https://openalex.org/W2158007046, https://openalex.org/W2775236000, https://openalex.org/W2071426633, https://openalex.org/W2349754162, https://openalex.org/W119088923, https://openalex.org/W4253323281 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.7287/peerj-cs.350v0.1/reviews/1 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | peer-review |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1 |
| primary_location.id | doi:10.7287/peerj-cs.350v0.1/reviews/1 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | peer-review |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.7287/peerj-cs.350v0.1/reviews/1 |
| publication_date | 2021-01-25 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W3040422908, https://openalex.org/W2963748489, https://openalex.org/W2998582269, https://openalex.org/W2740710151, https://openalex.org/W3049465110, https://openalex.org/W2995485526, https://openalex.org/W3027957640, https://openalex.org/W2792342425, https://openalex.org/W2973442392, https://openalex.org/W2980038013, https://openalex.org/W2312203001, https://openalex.org/W2991419331, https://openalex.org/W2793916028, https://openalex.org/W2785208313, https://openalex.org/W2738501932, https://openalex.org/W2888836402, https://openalex.org/W2766196346, https://openalex.org/W3040428556, https://openalex.org/W1989695052, https://openalex.org/W3005960021, https://openalex.org/W2771783069, https://openalex.org/W2755021152, https://openalex.org/W2963489028, https://openalex.org/W3048668222, https://openalex.org/W2487815886, https://openalex.org/W2883908928, https://openalex.org/W2364839527, https://openalex.org/W3037001322, https://openalex.org/W2805462980 |
| referenced_works_count | 29 |
| abstract_inverted_index.a | 42, 131, 140, 159, 195 |
| abstract_inverted_index.as | 90 |
| abstract_inverted_index.at | 214 |
| abstract_inverted_index.be | 124, 237 |
| abstract_inverted_index.by | 58, 137, 167 |
| abstract_inverted_index.do | 33 |
| abstract_inverted_index.in | 8, 41, 105, 126, 231, 242 |
| abstract_inverted_index.is | 49, 76, 130 |
| abstract_inverted_index.of | 27, 96, 133, 148, 162, 198, 206, 246 |
| abstract_inverted_index.on | 55, 183 |
| abstract_inverted_index.to | 23, 51, 72, 77, 101, 123, 173, 236, 240, 249 |
| abstract_inverted_index.0.1 | 208 |
| abstract_inverted_index.4.0 | 2 |
| abstract_inverted_index.5G, | 9 |
| abstract_inverted_index.IoT | 184 |
| abstract_inverted_index.and | 10, 21, 44, 66, 92, 107, 151, 210 |
| abstract_inverted_index.any | 86 |
| abstract_inverted_index.are | 99 |
| abstract_inverted_index.big | 70 |
| abstract_inverted_index.but | 47 |
| abstract_inverted_index.can | 32, 83 |
| abstract_inverted_index.era | 26 |
| abstract_inverted_index.for | 111 |
| abstract_inverted_index.has | 13, 121 |
| abstract_inverted_index.its | 56, 80 |
| abstract_inverted_index.new | 25 |
| abstract_inverted_index.not | 34 |
| abstract_inverted_index.own | 57 |
| abstract_inverted_index.the | 4, 16, 24, 53, 73, 143, 146, 156, 191, 225, 243 |
| abstract_inverted_index.was | 165, 181, 234 |
| abstract_inverted_index.96%, | 200 |
| abstract_inverted_index.DDos | 93 |
| abstract_inverted_index.They | 98 |
| abstract_inverted_index.Weka | 221 |
| abstract_inverted_index.able | 50 |
| abstract_inverted_index.also | 48 |
| abstract_inverted_index.fast | 203 |
| abstract_inverted_index.from | 19 |
| abstract_inverted_index.gave | 194 |
| abstract_inverted_index.high | 196 |
| abstract_inverted_index.just | 38, 207 |
| abstract_inverted_index.many | 114 |
| abstract_inverted_index.more | 36 |
| abstract_inverted_index.only | 35 |
| abstract_inverted_index.rate | 213 |
| abstract_inverted_index.some | 127 |
| abstract_inverted_index.such | 89 |
| abstract_inverted_index.than | 37 |
| abstract_inverted_index.that | 79, 190 |
| abstract_inverted_index.this | 232 |
| abstract_inverted_index.time | 204 |
| abstract_inverted_index.very | 202 |
| abstract_inverted_index.with | 3, 61, 85, 145, 170, 201, 220 |
| abstract_inverted_index.above | 199 |
| abstract_inverted_index.apply | 241 |
| abstract_inverted_index.cause | 102 |
| abstract_inverted_index.cyber | 87 |
| abstract_inverted_index.false | 211 |
| abstract_inverted_index.first | 157 |
| abstract_inverted_index.model | 161, 192, 230 |
| abstract_inverted_index.shown | 122 |
| abstract_inverted_index.smart | 28, 30, 74, 178, 247 |
| abstract_inverted_index.study | 233 |
| abstract_inverted_index.taken | 205 |
| abstract_inverted_index.time, | 158 |
| abstract_inverted_index.using | 119, 216 |
| abstract_inverted_index.Denial | 95 |
| abstract_inverted_index.botnet | 91, 117, 135, 153, 163, 175, 251 |
| abstract_inverted_index.detect | 250 |
| abstract_inverted_index.device | 185 |
| abstract_inverted_index.ensure | 78 |
| abstract_inverted_index.forest | 218 |
| abstract_inverted_index.highly | 238 |
| abstract_inverted_index.losses | 110 |
| abstract_inverted_index.method | 132 |
| abstract_inverted_index.proved | 235 |
| abstract_inverted_index.random | 217 |
| abstract_inverted_index.showed | 189 |
| abstract_inverted_index.within | 142 |
| abstract_inverted_index.0.24127 | 215 |
| abstract_inverted_index.attacks | 88 |
| abstract_inverted_index.closely | 149 |
| abstract_inverted_index.combing | 168 |
| abstract_inverted_index.company | 112 |
| abstract_inverted_index.created | 182 |
| abstract_inverted_index.digital | 43 |
| abstract_inverted_index.factory | 31, 75, 179, 248 |
| abstract_inverted_index.machine | 171, 222, 228 |
| abstract_inverted_index.network | 81, 144, 245 |
| abstract_inverted_index.process | 62 |
| abstract_inverted_index.produce | 39 |
| abstract_inverted_index.product | 68 |
| abstract_inverted_index.purpose | 147 |
| abstract_inverted_index.results | 188 |
| abstract_inverted_index.serious | 103 |
| abstract_inverted_index.service | 64 |
| abstract_inverted_index.system, | 46 |
| abstract_inverted_index.accuracy | 197 |
| abstract_inverted_index.advances | 7 |
| abstract_inverted_index.attacks. | 252 |
| abstract_inverted_index.classify | 174 |
| abstract_inverted_index.combined | 227 |
| abstract_inverted_index.creating | 139 |
| abstract_inverted_index.economic | 109 |
| abstract_inverted_index.feasible | 239 |
| abstract_inverted_index.hardware | 186 |
| abstract_inverted_index.honeypot | 120, 169, 226 |
| abstract_inverted_index.industry | 18 |
| abstract_inverted_index.learning | 172, 223, 229 |
| abstract_inverted_index.optimize | 52 |
| abstract_inverted_index.positive | 212 |
| abstract_inverted_index.products | 40 |
| abstract_inverted_index.proposed | 160 |
| abstract_inverted_index.resource | 141 |
| abstract_inverted_index.security | 82, 115, 244 |
| abstract_inverted_index.Service), | 97 |
| abstract_inverted_index.acquiring | 152 |
| abstract_inverted_index.algorithm | 219 |
| abstract_inverted_index.attackers | 136 |
| abstract_inverted_index.attacking | 154 |
| abstract_inverted_index.attacks.A | 176 |
| abstract_inverted_index.automatic | 45 |
| abstract_inverted_index.challenge | 71 |
| abstract_inverted_index.detecting | 134 |
| abstract_inverted_index.detection | 118, 164 |
| abstract_inverted_index.effective | 125 |
| abstract_inverted_index.mimicking | 177 |
| abstract_inverted_index.Industrial | 0 |
| abstract_inverted_index.artificial | 11 |
| abstract_inverted_index.automation | 22 |
| abstract_inverted_index.counteract | 84 |
| abstract_inverted_index.customized | 67 |
| abstract_inverted_index.monitoring | 150 |
| abstract_inverted_index.production | 54, 60 |
| abstract_inverted_index.recognized | 100 |
| abstract_inverted_index.revolution | 1 |
| abstract_inverted_index.solutions, | 116 |
| abstract_inverted_index.studies.It | 129 |
| abstract_inverted_index.environment | 180 |
| abstract_inverted_index.factories.A | 29 |
| abstract_inverted_index.integrating | 59 |
| abstract_inverted_index.management, | 63 |
| abstract_inverted_index.performance | 193 |
| abstract_inverted_index.production, | 106 |
| abstract_inverted_index.transformed | 15 |
| abstract_inverted_index.(Distributed | 94 |
| abstract_inverted_index.breakthrough | 5 |
| abstract_inverted_index.consequently | 108 |
| abstract_inverted_index.experimented | 166 |
| abstract_inverted_index.innovatively | 14 |
| abstract_inverted_index.intelligence | 12 |
| abstract_inverted_index.interruption | 104 |
| abstract_inverted_index.milliseconds | 209 |
| abstract_inverted_index.behaviors.For | 155 |
| abstract_inverted_index.distribution, | 65 |
| abstract_inverted_index.intentionally | 138 |
| abstract_inverted_index.investigation | 128 |
| abstract_inverted_index.manufacturing | 17 |
| abstract_inverted_index.requirement.A | 69 |
| abstract_inverted_index.technological | 6 |
| abstract_inverted_index.digitalization | 20 |
| abstract_inverted_index.program.Hence, | 224 |
| abstract_inverted_index.producers.Among | 113 |
| abstract_inverted_index.configuration.Experimental | 187 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5100734808 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 6 |
| corresponding_institution_ids | https://openalex.org/I4210143550 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.4399999976158142 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile |