{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:22:56Z","timestamp":1725988976695},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030002435"},{"type":"electronic","value":"9783030002442"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00244-2_17","type":"book-chapter","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T00:12:38Z","timestamp":1535587958000},"page":"258-268","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Modeling Language for Security Threats of IoT Systems"],"prefix":"10.1007","author":[{"given":"Delphine","family":"Beaulaton","sequence":"first","affiliation":[]},{"given":"Ioana","family":"Cristescu","sequence":"additional","affiliation":[]},{"given":"Axel","family":"Legay","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Quilbeuf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,30]]},"reference":[{"key":"17_CR1","unstructured":"Amazon key. https:\/\/www.amazon.com\/key . Accessed 22 June 2018"},{"key":"17_CR2","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium (2017)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: 4th SEFM Conference (2006)","DOI":"10.1109\/SEFM.2006.27"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Beaulaton, D., et al.: A language for analyzing security of IoT systems. In: 13th SOSE Conference (2018)","DOI":"10.1109\/SYSOSE.2018.8428704"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-34026-0_25","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change","author":"S Bensalem","year":"2012","unstructured":"Bensalem, S., Bozga, M., Delahaye, B., Jegourel, C., Legay, A., Nouri, A.: Statistical model checking QoS properties of systems with SBIP. In: Margaria, T., Steffen, B. (eds.) ISoLA 2012. LNCS, vol. 7609, pp. 327\u2013341. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34026-0_25"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-40196-1_12","volume-title":"Quantitative Evaluation of Systems","author":"B Boyer","year":"2013","unstructured":"Boyer, B., Corre, K., Legay, A., Sedwards, S.: PLASMA-lab: a flexible, distributable statistical model checking library. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 160\u2013164. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40196-1_12"},{"issue":"1","key":"17_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1006\/inco.1995.1123","volume":"121","author":"R Glabbeek Van","year":"1995","unstructured":"Van Glabbeek, R., Smolka, S., Steffen, B.: Reactive, generative, and stratified models of probabilistic processes. Inf. Comput. 121(1), 59\u201380 (1995)","journal-title":"Inf. Comput."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Graf, S.: Distributed implementation of constrained systems based on knowledge. In: 13th ISPDC Conference (2014)","DOI":"10.1109\/ISPDC.2014.32"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/s10270-014-0451-z","volume":"15","author":"S Graf","year":"2013","unstructured":"Graf, S., Quinton, S.: Knowledge for the distributed implementation of constrained systems. Softw. Syst. Model. 15, 1163\u20131180 (2013)","journal-title":"Softw. Syst. Model."},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jlap.2010.10.001","volume":"80","author":"I Ben Hafaiedh","year":"2011","unstructured":"Ben Hafaiedh, I., Graf, S., Quinton, S.: Building distributed controllers for systems with priorities. J. Log. Algebr. Program. 80(3), 194\u2013218 (2011)","journal-title":"J. Log. Algebr. Program."},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-10235-3","volume-title":"A Calculus of Communicating Systems","year":"1980","unstructured":"Milner, R. (ed.): A Calculus of Communicating Systems. LNCS, vol. 92. Springer, Heidelberg (1980). https:\/\/doi.org\/10.1007\/3-540-10235-3"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Sifakis, J.: A framework for component-based construction extended abstract. In: 3rd SEFM Conference (2005)","DOI":"10.1109\/SEFM.2005.3"},{"key":"17_CR13","unstructured":"TrapX Security Inc., TrapX LAbs: Anatomy of an attack, medjack (medical device attack). Technical report, May 2015"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00244-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T02:02:56Z","timestamp":1571796176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00244-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030002435","9783030002442"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00244-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}