{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:25:49Z","timestamp":1774373149529,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031284502","type":"print"},{"value":"9783031284519","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28451-9_35","type":"book-chapter","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T15:03:50Z","timestamp":1678806230000},"page":"404-416","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Applied Machine Learning for Securing the Internet of Medical Things in Healthcare"],"prefix":"10.1007","author":[{"given":"Wei","family":"Lu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"issue":"19","key":"35_CR1","doi-asserted-by":"publisher","first-page":"6346","DOI":"10.3390\/s21196346","volume":"21","author":"A Anand","year":"2021","unstructured":"Anand, A., Rani, S., Anand, D., Aljahdali, H.M., Kerr, D.: An efficient CNN-based deep learning model to detect malware attacks (CNN-DMA) in 5G-IoT healthcare applications. Sensors 21(19), 6346 (2021)","journal-title":"Sensors"},{"key":"35_CR2","unstructured":"How connected medical devices are transforming health care (2018). https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/global\/Documents\/Life-Sciences-Health-Care\/gx-lshc-medtech-iomt-brochure.pdf. Accessed 23 Nov 2022"},{"issue":"5","key":"35_CR3","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MIS.2011.91","volume":"26","author":"HC Chen","year":"2011","unstructured":"Chen, H.C.: Smart health and wellbeing [trends & controversies]. IEEE Intell. Syst. 26(5), 78\u201390 (2011)","journal-title":"IEEE Intell. Syst."},{"key":"35_CR4","unstructured":"Connectivity Standards Alliance. https:\/\/csa-iot.org\/. Accessed 23 Nov 2022"},{"issue":"3","key":"35_CR5","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/4236.935183","volume":"5","author":"P Bhagwat","year":"2001","unstructured":"Bhagwat, P.: Bluetooth: technology for short-range wireless apps. IEEE Internet Comput. 5(3), 96\u2013103 (2001). https:\/\/doi.org\/10.1109\/4236.935183","journal-title":"IEEE Internet Comput."},{"key":"35_CR6","unstructured":"Wi-Fi Alliance. https:\/\/www.wi-fi.org\/. Accessed 23 Nov 2022"},{"key":"35_CR7","unstructured":"Filkins, B.: Health Care Cyberthreat Report: Widespread Compromises Detected, Compliance Nightmare on Horizon. SANS Institute (2014)"},{"key":"35_CR8","doi-asserted-by":"publisher","unstructured":"Li, C.X., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system. In: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, pp. 150\u2013156 (2011). https:\/\/doi.org\/10.1109\/HEALTH.2011.6026732","DOI":"10.1109\/HEALTH.2011.6026732"},{"key":"35_CR9","doi-asserted-by":"publisher","unstructured":"Halperin, D., et al.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defences. In: 2008 IEEE Symposium on Security and Privacy, pp. 129\u2013142 (2008). https:\/\/doi.org\/10.1109\/SP.2008.31","DOI":"10.1109\/SP.2008.31"},{"key":"35_CR10","unstructured":"Medical devices hit by ransomware for the first time in us hospitals. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/05\/17\/wannacry-ransomware-hit-real-medical-devices\/?sh=67f42679425c. Accessed 23 Nov 2022"},{"key":"35_CR11","doi-asserted-by":"publisher","unstructured":"Sehatbakhsh, N., Alam, M., Nazari, A., Zajic, A., Prvulovic, M.: Syndrome: spectral analysis for anomaly detection on medical IoT and embedded devices. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 1\u20138 (2018). https:\/\/doi.org\/10.1109\/HST.2018.8383884","DOI":"10.1109\/HST.2018.8383884"},{"issue":"5","key":"35_CR12","doi-asserted-by":"publisher","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","volume":"16","author":"P Gope","year":"2016","unstructured":"Gope, P., Hwang, T.: BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5), 1368\u20131376 (2016). https:\/\/doi.org\/10.1109\/JSEN.2015.2502401","journal-title":"IEEE Sens. J."},{"key":"35_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-031-16237-4_9","volume-title":"Artificial Intelligence for Cyber-Physical Systems Hardening","author":"W Lu","year":"2023","unstructured":"Lu, W.: Detecting malicious attacks using principal component analysis in medical cyber-physical systems. In: Traore, I., Woungang, I., Saad, S. (eds.) Artificial Intelligence for Cyber-Physical Systems Hardening, vol. 2, pp. 203\u2013215. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-16237-4_9"},{"key":"35_CR14","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-88771-5_1","volume-title":"Network Intrusion Detection and Prevention","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Network attacks. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. ADIS, vol. 47, pp. 1\u201325. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-88771-5_1. ISBN-10: 0387887709"},{"key":"35_CR15","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-0-387-88771-5_4","volume-title":"Network Intrusion Detection and Prevention","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Theoretical foundation of detection. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. ADIS, vol. 47, pp. 73\u2013114. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-88771-5_4. ISBN-10: 0387887709"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Garant, D., Lu, W.: Mining botnet behaviors on the large-scale web application community. In: Proceedings of 27th IEEE International Conference on Advanced Information Networking and Applications, Barcelona, Spain, 25\u201328 March 2013 (2013)","DOI":"10.1109\/WAINA.2013.235"},{"key":"35_CR17","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-0-387-88771-5_2","volume-title":"Network Intrusion Detection and Prevention","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Detection approaches. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. ADIS, vol. 47, pp. 27\u201353. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-88771-5_2. ISBN-10: 0387887709"},{"key":"35_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-540-87403-4_33","volume-title":"Recent Advances in Intrusion Detection","author":"W Lu","year":"2008","unstructured":"Lu, W., Ghorbani, A.A.: Bots behaviors vs. human behaviors on large-scale communication networks (extended abstract). In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 415\u2013416. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87403-4_33"},{"key":"35_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-319-69155-8_4","volume-title":"Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments","author":"W Lu","year":"2017","unstructured":"Lu, W., Miller, M., Xue, L.: Detecting command and control channel of botnets in cloud. In: Traore, I., Woungang, I., Awad, A. (eds.) ISDDC 2017. LNCS, vol. 10618, pp. 55\u201362. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69155-8_4. ISBN 978-3-319-69154-1"},{"key":"35_CR20","doi-asserted-by":"publisher","unstructured":"Lu, W., Ghorbani, A.A.: Botnets detection based on IRC-community. In: 2008 IEEE Global Telecommunications Conference, IEEE GLOBECOM 2008, pp. 1\u20135 (2008). https:\/\/doi.org\/10.1109\/GLOCOM.2008.ECP.398","DOI":"10.1109\/GLOCOM.2008.ECP.398"},{"key":"35_CR21","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-030-44372-6_2","volume-title":"3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication","author":"W Lu","year":"2020","unstructured":"Lu, W., Mercaldo, N., Tellier, C.: Characterizing command and control channel of mongoose bots over TOR. In: Woungang, I., Dhurandher, S.K. (eds.) WIDECOM 2020. LNDECT, vol. 51, pp. 23\u201330. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44372-6_2"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Lu, W., Ghorbani, A.: Online classification of network flows. In: Proceedings of the 7th Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, New Brunswick, Canada, 11\u201313 May 2009, pp. 78\u201385 (2009)","DOI":"10.1109\/CNSR.2009.22"},{"key":"35_CR23","doi-asserted-by":"publisher","unstructured":"Lu, W., Xue, L.: A heuristic-based co-clustering algorithm for the internet traffic classification. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops, pp. 49\u201354 (2014). https:\/\/doi.org\/10.1109\/WAINA.2014.16","DOI":"10.1109\/WAINA.2014.16"},{"key":"35_CR24","unstructured":"Lu, W.: An Unsupervised Anomaly Detection Framework for Multiple-connection-Based Network Intrusions. Ottawa Library and Archives Canada (2007). ISBN 9780494147795"},{"key":"35_CR25","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11599371_9","volume-title":"Cryptology and Network Security","author":"W Lu","year":"2005","unstructured":"Lu, W., Traore, I.: A new unsupervised anomaly detection framework for detecting network attacks in real-time. In: Desmedt, Y.G., Wang, H., Yi, M., Li, Y. (eds.) Cryptology and Network Security, pp. 96\u2013109. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11599371_9. ISBN 978-3-540-32298-6"},{"key":"35_CR26","unstructured":"Lu, W., Traore, I.: An unsupervised approach for detecting DDoS attacks based on traffic based metrics. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 2005), Victoria, B.C., pp. 462\u2013465 (2005)"},{"key":"35_CR27","unstructured":"Lu, W., Traore, I.: Determining the optimal number of clusters using a new evolutionary algorithm. In: Proceedings of IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2005), Hongkong, pp. 712\u2013713 (2005)"},{"key":"35_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-04843-2_32","volume-title":"Advances in Computation and Intelligence","author":"W Lu","year":"2009","unstructured":"Lu, W., Tong, H.: Detecting network anomalies using CUSUM and EM clustering. In: Cai, Z., Li, Z., Kang, Z., Liu, Y. (eds.) ISICA 2009. LNCS, vol. 5821, pp. 297\u2013308. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04843-2_32. ISBN 978-3-642-04843-2"},{"issue":"2","key":"35_CR29","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1504\/IJICS.2008.018513","volume":"2","author":"W Lu","year":"2008","unstructured":"Lu, W., Traore, I.: Unsupervised anomaly detection using an evolutionary extension of K-means algorithm. Int. J. Inf. Comput. Secur. 2(2), 107 (2008). https:\/\/doi.org\/10.1504\/IJICS.2008.018513","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"35_CR30","doi-asserted-by":"crossref","unstructured":"Lu, W., Traore, I.: A new evolutionary algorithm for determining the optimal number of clusters. In: Proceedings of IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA 2005), vol. 1, pp. 648\u2013653 (2005)","DOI":"10.1109\/CIMCA.2005.1631337"},{"key":"35_CR31","unstructured":"WUSTL EHMS Dataset. https:\/\/www.cse.wustl.edu\/~jain\/ehms\/index.html. Accessed 23 Nov 2022"},{"key":"35_CR32","unstructured":"WUSTL EHMS Clean. https:\/\/unh.box.com\/s\/qja9cnmvtbyr0ctsw6p6fx8y8vr2z8oo. Accessed 23 Nov 2022"},{"key":"35_CR33","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-0-387-88771-5_3","volume-title":"Network Intrusion Detection and Prevention","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Data collection. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. ADIS, vol. 47, pp. 55\u201371. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-88771-5_3. ISBN-10: 0387887709"},{"key":"35_CR34","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-0-387-88771-5_7","volume-title":"Network Intrusion Detection and Prevention","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Evaluation criteria. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. ADIS, vol. 47, pp. 161\u2013183. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-88771-5_7. ISBN-10: 0387887709"},{"key":"35_CR35","doi-asserted-by":"publisher","unstructured":"Nunley, K., Lu, W.: Detecting network intrusions using a confidence-based reward system. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 175\u2013180 (2018). https:\/\/doi.org\/10.1109\/WAINA.2018.00083","DOI":"10.1109\/WAINA.2018.00083"},{"key":"35_CR36","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-0-387-88771-5_5","volume-title":"Network Intrusion Detection and Prevention","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Architecture and implementation. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. ADIS, vol. 47, pp. 115\u2013127. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-88771-5_5. ISBN-10: 0387887709"},{"key":"35_CR37","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-0-387-88771-5_8","volume-title":"Network Intrusion Detection and Prevention","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Intrusion response. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. ADIS, vol. 47, pp. 185\u2013198. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-88771-5_8. ISBN-10: 0387887709"},{"key":"35_CR38","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-0-387-88771-5_6","volume-title":"Network Intrusion Detection and Prevention","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Alert management and correlation. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. ADIS, vol. 47, pp. 129\u2013160. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-88771-5_6. ISBN-10: 0387887709"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28451-9_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:44:29Z","timestamp":1729075469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28451-9_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031284502","9783031284519"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28451-9_35","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Juiz de Fora","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}