Changes
On December 2, 2024 at 10:37:01 PM UTC, admin:
-
Changed value of field
doi_status
toTrue
in Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach -
Changed value of field
doi_date_published
to2024-12-02
in Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach -
Added resource Original Metadata to Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach
f | 1 | { | f | 1 | { |
2 | "access_rights": "", | 2 | "access_rights": "", | ||
3 | "author": "Sk. Tanzir Mehedi", | 3 | "author": "Sk. Tanzir Mehedi", | ||
4 | "author_email": "", | 4 | "author_email": "", | ||
5 | "citation": [], | 5 | "citation": [], | ||
6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
7 | "defined_in": "", | 7 | "defined_in": "", | ||
8 | "doi": "10.57702/xipiv9q5", | 8 | "doi": "10.57702/xipiv9q5", | ||
n | 9 | "doi_date_published": null, | n | 9 | "doi_date_published": "2024-12-02", |
10 | "doi_publisher": "TIB", | 10 | "doi_publisher": "TIB", | ||
n | 11 | "doi_status": false, | n | 11 | "doi_status": true, |
12 | "domain": "https://service.tib.eu/ldmservice", | 12 | "domain": "https://service.tib.eu/ldmservice", | ||
13 | "extra_authors": [ | 13 | "extra_authors": [ | ||
14 | { | 14 | { | ||
15 | "extra_author": "Adnan Anwar", | 15 | "extra_author": "Adnan Anwar", | ||
16 | "orcid": "" | 16 | "orcid": "" | ||
17 | }, | 17 | }, | ||
18 | { | 18 | { | ||
19 | "extra_author": "Ziaur Rahman", | 19 | "extra_author": "Ziaur Rahman", | ||
20 | "orcid": "" | 20 | "orcid": "" | ||
21 | }, | 21 | }, | ||
22 | { | 22 | { | ||
23 | "extra_author": "Kawsar Ahmed", | 23 | "extra_author": "Kawsar Ahmed", | ||
24 | "orcid": "" | 24 | "orcid": "" | ||
25 | }, | 25 | }, | ||
26 | { | 26 | { | ||
27 | "extra_author": "Ra\ufb01qul Islam", | 27 | "extra_author": "Ra\ufb01qul Islam", | ||
28 | "orcid": "" | 28 | "orcid": "" | ||
29 | } | 29 | } | ||
30 | ], | 30 | ], | ||
31 | "groups": [ | 31 | "groups": [ | ||
32 | { | 32 | { | ||
33 | "description": "", | 33 | "description": "", | ||
34 | "display_name": "Cybersecurity", | 34 | "display_name": "Cybersecurity", | ||
35 | "id": "a0b2c373-a789-40c6-918e-57297ef3f6bf", | 35 | "id": "a0b2c373-a789-40c6-918e-57297ef3f6bf", | ||
36 | "image_display_url": "", | 36 | "image_display_url": "", | ||
37 | "name": "cybersecurity", | 37 | "name": "cybersecurity", | ||
38 | "title": "Cybersecurity" | 38 | "title": "Cybersecurity" | ||
39 | }, | 39 | }, | ||
40 | { | 40 | { | ||
41 | "description": "", | 41 | "description": "", | ||
42 | "display_name": "Dependability", | 42 | "display_name": "Dependability", | ||
43 | "id": "dbffb7ba-bfcd-4a48-9cd8-4b7da2ef8822", | 43 | "id": "dbffb7ba-bfcd-4a48-9cd8-4b7da2ef8822", | ||
44 | "image_display_url": "", | 44 | "image_display_url": "", | ||
45 | "name": "dependability", | 45 | "name": "dependability", | ||
46 | "title": "Dependability" | 46 | "title": "Dependability" | ||
47 | }, | 47 | }, | ||
48 | { | 48 | { | ||
49 | "description": "", | 49 | "description": "", | ||
50 | "display_name": "Internet of Things", | 50 | "display_name": "Internet of Things", | ||
51 | "id": "3ab868b4-b19b-4fb3-a3a3-755589760a56", | 51 | "id": "3ab868b4-b19b-4fb3-a3a3-755589760a56", | ||
52 | "image_display_url": "", | 52 | "image_display_url": "", | ||
53 | "name": "internet-of-things", | 53 | "name": "internet-of-things", | ||
54 | "title": "Internet of Things" | 54 | "title": "Internet of Things" | ||
55 | }, | 55 | }, | ||
56 | { | 56 | { | ||
57 | "description": "", | 57 | "description": "", | ||
58 | "display_name": "Intrusion Detection Systems", | 58 | "display_name": "Intrusion Detection Systems", | ||
59 | "id": "c6f8082f-2f4e-48ca-bfdc-b58e4abb0dd3", | 59 | "id": "c6f8082f-2f4e-48ca-bfdc-b58e4abb0dd3", | ||
60 | "image_display_url": "", | 60 | "image_display_url": "", | ||
61 | "name": "intrusion-detection-systems", | 61 | "name": "intrusion-detection-systems", | ||
62 | "title": "Intrusion Detection Systems" | 62 | "title": "Intrusion Detection Systems" | ||
63 | } | 63 | } | ||
64 | ], | 64 | ], | ||
65 | "id": "6c347244-d43e-4f42-be57-71a9cc775665", | 65 | "id": "6c347244-d43e-4f42-be57-71a9cc775665", | ||
66 | "isopen": false, | 66 | "isopen": false, | ||
67 | "landing_page": "", | 67 | "landing_page": "", | ||
68 | "license_title": null, | 68 | "license_title": null, | ||
69 | "link_orkg": "", | 69 | "link_orkg": "", | ||
70 | "metadata_created": "2024-12-02T22:36:59.239763", | 70 | "metadata_created": "2024-12-02T22:36:59.239763", | ||
n | 71 | "metadata_modified": "2024-12-02T22:36:59.239769", | n | 71 | "metadata_modified": "2024-12-02T22:36:59.944422", |
72 | "name": | 72 | "name": | ||
73 | on-detection-system-for-iot--a-deep-transfer-learning-based-approach", | 73 | on-detection-system-for-iot--a-deep-transfer-learning-based-approach", | ||
74 | "notes": "The proposed deep transfer learning-based dependable IDS | 74 | "notes": "The proposed deep transfer learning-based dependable IDS | ||
75 | model uses a deep transfer learning-based residual neural network | 75 | model uses a deep transfer learning-based residual neural network | ||
76 | (P-ResNet) IDS that can train efficiently using only a small scale of | 76 | (P-ResNet) IDS that can train efficiently using only a small scale of | ||
77 | target domain data and understand its impact with low computational | 77 | target domain data and understand its impact with low computational | ||
78 | capabilities.", | 78 | capabilities.", | ||
n | 79 | "num_resources": 0, | n | 79 | "num_resources": 1, |
80 | "num_tags": 4, | 80 | "num_tags": 4, | ||
81 | "organization": { | 81 | "organization": { | ||
82 | "approval_status": "approved", | 82 | "approval_status": "approved", | ||
83 | "created": "2024-11-25T12:11:38.292601", | 83 | "created": "2024-11-25T12:11:38.292601", | ||
84 | "description": "", | 84 | "description": "", | ||
85 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 85 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
86 | "image_url": "", | 86 | "image_url": "", | ||
87 | "is_organization": true, | 87 | "is_organization": true, | ||
88 | "name": "no-organization", | 88 | "name": "no-organization", | ||
89 | "state": "active", | 89 | "state": "active", | ||
90 | "title": "No Organization", | 90 | "title": "No Organization", | ||
91 | "type": "organization" | 91 | "type": "organization" | ||
92 | }, | 92 | }, | ||
93 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 93 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
94 | "private": false, | 94 | "private": false, | ||
95 | "relationships_as_object": [], | 95 | "relationships_as_object": [], | ||
96 | "relationships_as_subject": [], | 96 | "relationships_as_subject": [], | ||
t | 97 | "resources": [], | t | 97 | "resources": [ |
98 | { | ||||
99 | "cache_last_updated": null, | ||||
100 | "cache_url": null, | ||||
101 | "created": "2024-12-02T22:29:38", | ||||
102 | "data": [ | ||||
103 | "dcterms:title", | ||||
104 | "dcterms:accessRights", | ||||
105 | "dcterms:creator", | ||||
106 | "dcterms:description", | ||||
107 | "dcterms:issued", | ||||
108 | "dcterms:language", | ||||
109 | "dcterms:identifier", | ||||
110 | "dcat:theme", | ||||
111 | "dcterms:type", | ||||
112 | "dcat:keyword", | ||||
113 | "dcat:landingPage", | ||||
114 | "dcterms:hasVersion", | ||||
115 | "dcterms:format", | ||||
116 | "mls:task" | ||||
117 | ], | ||||
118 | "description": "The json representation of the dataset with its | ||||
119 | distributions based on DCAT.", | ||||
120 | "format": "JSON", | ||||
121 | "hash": "", | ||||
122 | "id": "01eb1623-2328-40b8-b76b-30b831876bdf", | ||||
123 | "last_modified": "2024-12-02T22:36:59.937210", | ||||
124 | "metadata_modified": "2024-12-02T22:36:59.947174", | ||||
125 | "mimetype": "application/json", | ||||
126 | "mimetype_inner": null, | ||||
127 | "name": "Original Metadata", | ||||
128 | "package_id": "6c347244-d43e-4f42-be57-71a9cc775665", | ||||
129 | "position": 0, | ||||
130 | "resource_type": null, | ||||
131 | "size": 955, | ||||
132 | "state": "active", | ||||
133 | "url": | ||||
134 | resource/01eb1623-2328-40b8-b76b-30b831876bdf/download/metadata.json", | ||||
135 | "url_type": "upload" | ||||
136 | } | ||||
137 | ], | ||||
98 | "services_used_list": "", | 138 | "services_used_list": "", | ||
99 | "state": "active", | 139 | "state": "active", | ||
100 | "tags": [ | 140 | "tags": [ | ||
101 | { | 141 | { | ||
102 | "display_name": "Deep Transfer Learning", | 142 | "display_name": "Deep Transfer Learning", | ||
103 | "id": "21cf0e27-4eb6-403e-9ce8-80b1dc2b8b34", | 143 | "id": "21cf0e27-4eb6-403e-9ce8-80b1dc2b8b34", | ||
104 | "name": "Deep Transfer Learning", | 144 | "name": "Deep Transfer Learning", | ||
105 | "state": "active", | 145 | "state": "active", | ||
106 | "vocabulary_id": null | 146 | "vocabulary_id": null | ||
107 | }, | 147 | }, | ||
108 | { | 148 | { | ||
109 | "display_name": "IDS", | 149 | "display_name": "IDS", | ||
110 | "id": "344590d8-2fca-4b41-a143-ce18c67ca6f9", | 150 | "id": "344590d8-2fca-4b41-a143-ce18c67ca6f9", | ||
111 | "name": "IDS", | 151 | "name": "IDS", | ||
112 | "state": "active", | 152 | "state": "active", | ||
113 | "vocabulary_id": null | 153 | "vocabulary_id": null | ||
114 | }, | 154 | }, | ||
115 | { | 155 | { | ||
116 | "display_name": "IoT", | 156 | "display_name": "IoT", | ||
117 | "id": "9f8a8143-5253-4cb2-83fd-eb89f5d546b8", | 157 | "id": "9f8a8143-5253-4cb2-83fd-eb89f5d546b8", | ||
118 | "name": "IoT", | 158 | "name": "IoT", | ||
119 | "state": "active", | 159 | "state": "active", | ||
120 | "vocabulary_id": null | 160 | "vocabulary_id": null | ||
121 | }, | 161 | }, | ||
122 | { | 162 | { | ||
123 | "display_name": "Residual Neural Network", | 163 | "display_name": "Residual Neural Network", | ||
124 | "id": "2ffd315e-440b-4502-8746-69227e0ef646", | 164 | "id": "2ffd315e-440b-4502-8746-69227e0ef646", | ||
125 | "name": "Residual Neural Network", | 165 | "name": "Residual Neural Network", | ||
126 | "state": "active", | 166 | "state": "active", | ||
127 | "vocabulary_id": null | 167 | "vocabulary_id": null | ||
128 | } | 168 | } | ||
129 | ], | 169 | ], | ||
130 | "title": "Dependable Intrusion Detection System for IoT: A Deep | 170 | "title": "Dependable Intrusion Detection System for IoT: A Deep | ||
131 | Transfer Learning-based Approach", | 171 | Transfer Learning-based Approach", | ||
132 | "type": "dataset", | 172 | "type": "dataset", | ||
133 | "version": "" | 173 | "version": "" | ||
134 | } | 174 | } |