{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:02:08Z","timestamp":1742925728977,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030026066"},{"type":"electronic","value":"9783030026073"}],"license":[{"start":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T00:00:00Z","timestamp":1539734400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02607-3_24","type":"book-chapter","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T08:53:30Z","timestamp":1539680010000},"page":"265-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Automated Risk Analysis for IoT Systems"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Rak","sequence":"first","affiliation":[]},{"given":"Valentina","family":"Casola","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"De Benedictis","sequence":"additional","affiliation":[]},{"given":"Umberto","family":"Villano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,17]]},"reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10\u201328 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","volume":"54","author":"E Borgia","year":"2014","unstructured":"Borgia, E.: The internet of things vision: key features, applications and open issues. Comput. Commun. 54, 1\u201331 (2014). https:\/\/doi.org\/10.1016\/j.comcom.2014.09.008","journal-title":"Comput. Commun."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Casola, V., De Benedictis, A., Rak, M., Villano, U.: Towards automated penetration testing for cloud applications. In: 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 24\u201329, June 2018","DOI":"10.1109\/WETICE.2018.00012"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Casola, V., Esposito, M., Mazzocca, N., Flammini, F.: Freight train monitoring: a case-study for the pshield project. In: Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, pp. 597\u2013602 (2012)","DOI":"10.1109\/IMIS.2012.51"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.10.012","volume":"97","author":"J Guo","year":"2017","unstructured":"Guo, J., Chen, I.R., Tsai, J.J.: A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97, 1\u201314 (2017). https:\/\/doi.org\/10.1016\/j.comcom.2016.10.012","journal-title":"Comput. Commun."},{"key":"24_CR6","unstructured":"ISO: Internet of Things Reference Architecture (IoT RA) ISO\/IEC CD 30141 (2016)"},{"key":"24_CR7","doi-asserted-by":"publisher","unstructured":"Lewis, M.: Using graph databases to assess the security of thingernets based on the thingabilities and thingertivity of things. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, pp. 8 (9 pp.)\u20138 (9 pp.). IET (2018). https:\/\/doi.org\/10.1049\/cp.2018.0008","DOI":"10.1049\/cp.2018.0008"},{"key":"24_CR8","unstructured":"MicroBees: The MicroBees web site (2018). https:\/\/www.microbees.com\/"},{"key":"24_CR9","unstructured":"Microsoft Corporation: The STRIDE Threat Model (2016). https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)"},{"key":"24_CR10","doi-asserted-by":"publisher","unstructured":"Minoli, D., Sohraby, K., Kouns, J.: IoT security (IoTSec) considerations, requirements, and architectures. In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1006\u20131007. IEEE, Jan 2017. https:\/\/doi.org\/10.1109\/CCNC.2017.7983271","DOI":"10.1109\/CCNC.2017.7983271"},{"key":"24_CR11","unstructured":"National Institute of Standards and Technology: SP 800-53 Rev 4: Recommended Security and Privacy Controls for Federal Information Systems and Organizations. Technical report (2013)"},{"key":"24_CR12","unstructured":"OWASP: The OWASP Risk Rating Methodology Wiki Page (2016). https:\/\/www.owasp.org\/index.php\/OWASP_Risk_Rating_Methodology"},{"key":"24_CR13","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1007\/978-3-319-57186-7_57","volume-title":"Green, Pervasive, and Cloud Computing","author":"Massimiliano Rak","year":"2017","unstructured":"Rak, M.: Security assurance of (multi-)cloud application with security SLA composition. Lecture Notes in Computer Science vol. 10232, pp. 786\u2013799 (2017)"},{"issue":"2","key":"24_CR14","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"A Riahi Sfar","year":"2018","unstructured":"Riahi Sfar, A., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the internet of things. Digit. Commun. Netw. 4(2), 118\u2013137 (2018). https:\/\/doi.org\/10.1016\/j.dcan.2017.04.003","journal-title":"Digit. Commun. Netw."},{"issue":"10","key":"24_CR15","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266\u20132279 (2013)","journal-title":"Comput. Netw."},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Schiefer, M.: Smart home definition and security threats. In: 2015 Ninth International Conference on IT Security Incident Management IT Forensics, pp. 114\u2013118 (2015)","DOI":"10.1109\/IMF.2015.17"},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S. Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Computer Networks"},{"issue":"1","key":"24_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MS.2016.20","volume":"33","author":"M Weyrich","year":"2016","unstructured":"Weyrich, M., Ebert, C.: Reference architectures for the internet of things. IEEE Softw. 33(1), 112\u2013116 (2016). https:\/\/doi.org\/10.1109\/MS.2016.20","journal-title":"IEEE Softw."},{"issue":"4","key":"24_CR19","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"Li Da Xu","year":"2014","unstructured":"Xu, L.D., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233\u20132243 (2014). https:\/\/doi.org\/10.1109\/TII.2014.2300753","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25\u201337 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.02.009","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02607-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T15:11:16Z","timestamp":1719069076000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02607-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,17]]},"ISBN":["9783030026066","9783030026073"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02607-3_24","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2018,10,17]]},"assertion":[{"value":"17 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"3PGCIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pgcic2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}