{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:58:56Z","timestamp":1755838736325,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030011673"},{"type":"electronic","value":"9783030011680"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01168-0_6","type":"book-chapter","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T00:03:17Z","timestamp":1538092997000},"page":"52-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6917-4234","authenticated-orcid":false,"given":"Ievgeniia","family":"Kuzminykh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9328-9143","authenticated-orcid":false,"given":"Anders","family":"Carlsson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,29]]},"reference":[{"key":"6_CR1","unstructured":"Baseline Security Recommendations for IoT. European Union Agency For Network And Information Security, ENISA (2017)"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"E817","DOI":"10.3390\/s18030817","volume":"18","author":"B Ali","year":"2018","unstructured":"Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), E817 (2018)","journal-title":"Sensors"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Hossain Md.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things. In: 2015 IEEE World Congress on Services (SERVICES), pp. 21\u201328. IEEE (2015)","DOI":"10.1109\/SERVICES.2015.12"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Macaulay T.: RIoT Control. Chapter 12 - Threats and Impacts to the IoT. Elsevier (2017)","DOI":"10.1016\/B978-0-12-419971-2.00013-3"},{"issue":"5","key":"6_CR5","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2017.3680959","volume":"19","author":"JRC Nurse","year":"2017","unstructured":"Nurse, J.R.C., Creese, S., De Roure, D.: Security risk assessment in Internet of Things systems. IT Prof. 19(5), 20\u201326 (2017)","journal-title":"IT Prof."},{"key":"6_CR6","unstructured":"Machine-to-Machine Communications (M2M). ETSI TR 103 167 V1.1.1 (2011)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Akatyev, N., James, J.I.: Evidence identification in IoT networks based on threat assessment. Future Gener. Comput. Syst. (2017). In press","DOI":"10.1016\/j.future.2017.10.012"},{"key":"6_CR8","unstructured":"Asset Avatars: Get a 360-Degree View of Your Assets - Whitepaper. Hitachi Vantara (2017)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Voas J.: Networks of \u2018Things\u2019. NIST SP 800-183 (2016)","DOI":"10.6028\/NIST.SP.800-183"},{"key":"6_CR10","unstructured":"Reference architecture for IoT device capability exposure. Recommendation ITU-T Y.4115 (2017)"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2015.19","volume":"19","author":"M Mrissa","year":"2015","unstructured":"Mrissa, M., Mdini, L., Jamont, J.P., Le Sommer, N., Laplace, J.: An avatar architecture for the web of things. IEEE Int. Comput. 19(2), 30\u201338 (2015)","journal-title":"IEEE Int. Comput."},{"key":"6_CR12","unstructured":"Microsoft Azure IoT Reference Architecture. Version 2.0. Microsoft Inc. (2018)"},{"key":"6_CR13","unstructured":"Nivaggioli, P.: Cisco SP IoT Architecture. Cisco. https:\/\/www.cisco.com\/c\/dam\/m\/fr_fr\/events\/2015\/cisco_day\/pdf\/7-ciscoday-10june2016-sp-iot.pdf . Accessed 29 May 2018"},{"key":"6_CR14","series-title":"Internet of Things","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-981-10-5861-5_4","volume-title":"Internet of Everything","author":"J Guth","year":"2018","unstructured":"Guth, J., et al.: A detailed analysis of IoT platform architectures: concepts, similarities, and differences. In: Di Martino, B., Li, K.-C., Yang, L.T., Esposito, A. (eds.) Internet of Everything. IT, pp. 81\u2013101. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-5861-5_4"},{"key":"6_CR15","unstructured":"Web of Things (WoT) Thing Description. W3C Draft. https:\/\/w3c.github.io\/wot-thing-description\/#introduction . Accessed 29 May 2018"},{"key":"6_CR16","unstructured":"Web of Things (WoT) Security and Privacy Considerations. W3C Draft. https:\/\/rawgit.com\/w3c\/wot-security\/master\/index.html#introduction . Accessed 29 May 2018"},{"key":"6_CR17","unstructured":"Zambonelli, F.: Towards a General Software Engineering Methodology for the Internet of Things. Cornell University Library, arXiv:1601 (2016)"},{"key":"6_CR18","unstructured":"ASAWoO project - Adaptive Supervision of Avatar\/Object Links for the Web of Objects. https:\/\/projet.liris.cnrs.fr\/asawoo\/doku.php . Accessed 29 May 2018"},{"key":"6_CR19","unstructured":"Kuzminykh, I.: Avatar conception for \u201cThing\u201d representation in Internet of Things. In: 14th Swedish National Computer Networking Workshop, Karlskrona, Sweden (2018)"},{"key":"6_CR20","unstructured":"BONSEYES - Artificial Intelligence Marketplace. https:\/\/www.bonseyes.com\/ . Accessed 29 May 2018"},{"key":"6_CR21","unstructured":"OWASP Internet of Things Project. https:\/\/www.owasp.org\/index.php\/OWASP_Internet_of_Things_Project . Accessed 29 May 2018"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01168-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T20:58:23Z","timestamp":1571950703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01168-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030011673","9783030011680"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01168-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rusmart.e-werest.org\/2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"186","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}