{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:DDTLROR4NZBSC4BQHD5DT7PASH","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e6dfa8921db8d54352e0f1b16527e6b296fb584312a7475e42ea2266b2cb071f","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-20T07:21:08Z","title_canon_sha256":"86e8006b3ce43e189ba5f1125342e73fc8d35dbd4c0c32456701f2d52613e677"},"schema_version":"1.0","source":{"id":"1804.07474","kind":"arxiv","version":5}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1804.07474","created_at":"2026-05-17T23:46:36Z"},{"alias_kind":"arxiv_version","alias_value":"1804.07474v5","created_at":"2026-05-17T23:46:36Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1804.07474","created_at":"2026-05-17T23:46:36Z"},{"alias_kind":"pith_short_12","alias_value":"DDTLROR4NZBS","created_at":"2026-05-18T12:32:19Z"},{"alias_kind":"pith_short_16","alias_value":"DDTLROR4NZBSC4BQ","created_at":"2026-05-18T12:32:19Z"},{"alias_kind":"pith_short_8","alias_value":"DDTLROR4","created_at":"2026-05-18T12:32:19Z"}],"graph_snapshots":[{"event_id":"sha256:111b260f0ed1876594d63e0372a2fc8b67b62596fbe6ae0d697694e5235b3da7","target":"graph","created_at":"2026-05-17T23:46:36Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"IoT devices are increasingly deployed in daily life. Many of these devices are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have vulnerable IoT devices that are easy to compromise. This has led to a new category of malware specifically targeting IoT devices. However, existing intrusion detection techniques are not effective in detecting compromised IoT devices given the massive scale of the problem in terms of the number of different types of devices and manufacturers involved. In this paper, we present D\\\"IoT, an autonomous","authors_text":"Ahmad-Reza Sadeghi, Hossein Fereidooni, Markus Miettinen, N. Asokan, Samuel Marchal, Thien Duc Nguyen","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-20T07:21:08Z","title":"D\\\"IoT: A Federated Self-learning Anomaly Detection System for IoT"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1804.07474","kind":"arxiv","version":5},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:d2cbdeba6b5d2df6b446634a306db60d2920843dc1ab256e3e876b8340312151","target":"record","created_at":"2026-05-17T23:46:36Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e6dfa8921db8d54352e0f1b16527e6b296fb584312a7475e42ea2266b2cb071f","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-20T07:21:08Z","title_canon_sha256":"86e8006b3ce43e189ba5f1125342e73fc8d35dbd4c0c32456701f2d52613e677"},"schema_version":"1.0","source":{"id":"1804.07474","kind":"arxiv","version":5}},"canonical_sha256":"18e6b8ba3c6e4321703038fa39fde091d1b4f0c4463629d3cda78f27bcb49e4e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"18e6b8ba3c6e4321703038fa39fde091d1b4f0c4463629d3cda78f27bcb49e4e","first_computed_at":"2026-05-17T23:46:36.329664Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:46:36.329664Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"MxnKyPFL/5hiKE7IkF3E9vaPa6OEN+iV/7iw5nuTRlk0KadOEl5xD5em/bOsxHEBA0UWeZPFAT7VRIijWdOfBQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:46:36.330143Z","signed_message":"canonical_sha256_bytes"},"source_id":"1804.07474","source_kind":"arxiv","source_version":5}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:d2cbdeba6b5d2df6b446634a306db60d2920843dc1ab256e3e876b8340312151","sha256:111b260f0ed1876594d63e0372a2fc8b67b62596fbe6ae0d697694e5235b3da7"],"state_sha256":"4a25b611bba048ea6c328382d537886949edadf5ff6c212cb28c74dee8d2ddbe"}