{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:36:31Z","timestamp":1743111391143,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030555825"},{"type":"electronic","value":"9783030555832"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-55583-2_20","type":"book-chapter","created":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T06:02:53Z","timestamp":1597989773000},"page":"266-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment"],"prefix":"10.1007","author":[{"given":"Simon D.","family":"Duque Anton","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Fraunholz","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Krohmer","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Reti","sequence":"additional","affiliation":[]},{"given":"Hans D.","family":"Schotten","sequence":"additional","affiliation":[]},{"given":"Franklin","family":"Selgert","sequence":"additional","affiliation":[]},{"given":"Marcell","family":"Marosv\u00f6lgyi","sequence":"additional","affiliation":[]},{"given":"Morten","family":"Larsen","sequence":"additional","affiliation":[]},{"given":"Krishna","family":"Sudhakar","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Koch","sequence":"additional","affiliation":[]},{"given":"Till","family":"Witt","sequence":"additional","affiliation":[]},{"given":"C\u00e9dric","family":"Bassem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,8]]},"reference":[{"key":"20_CR1","unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th USENIX Security Symposium Security 17), pp. 1093\u20131110 (2017)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Asokan, N., Nyman, T., Rattanavipanon, N., Sadeghi, A.R., Tsudik, G.: Assured: architecture for secure software update of realistic embedded devices, October 2018. https:\/\/arxiv.org\/pdf\/1807.05002.pdf","DOI":"10.1109\/TCAD.2018.2858422"},{"key":"20_CR3","unstructured":"Bradford, V.: Why device id may not be enough to stop fraud"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Duque Anton, S., Ahrens, L., Fraunholz, D., Schotten, H.D.: Time is of the essence: machine learning-based intrusion detection in industrial time series data. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICDMW.2018.00008"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Duque Anton, S., Kanoor, S., Fraunholz, D., Schotten, H.D.: Evaluation of machine learning-based anomaly detection algorithms on an industrial Modbus\/TCP data set. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, pp. 1\u20139 (2018)","DOI":"10.1145\/3230833.3232818"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Duque Anton, S.D., Fraunholz, D., Schotten, H.D.: Using temporal and topological features for intrusion detection in operational networks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES), pp. 1\u20139 (2019)","DOI":"10.1145\/3339252.3341476"},{"key":"20_CR7","unstructured":"Enisa: Baseline security recommendations for IoT, November 2017. https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot"},{"key":"20_CR8","unstructured":"Goasduff, L.: Gartner says 5.8 billion enterprise and automotive IoT endpoints will be in use in 2020, August 2019. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io"},{"issue":"7","key":"20_CR9","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"issue":"4","key":"20_CR10","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TVCG.2020.2969007","volume":"26","author":"AP Lohfink","year":"2020","unstructured":"Lohfink, A.P., Duque Anton, S.D., Schotten, H.D., Leitte, H., Garth, C.: Security in process: visually supported triage analysis in industrial process data. IEEE Trans. Vis. Comput. Graph. 26(4), 1638\u20131649 (2020)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"20_CR11","unstructured":"Mann, A., Stahnke, M., Brown, A., Kersten, N.: 2019 state of the art DevOps report (2019). https:\/\/puppet.com\/resources\/report\/state-of-devops-report\/"},{"key":"20_CR12","unstructured":"van der Meulen, R.: Gartner says 8.4 billion connected \u201cthings\u201d will be in use in 2017, up 31 percent from 2016, February 2017. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016"},{"key":"20_CR13","unstructured":"NXP: Late stage parameter configuration"},{"key":"20_CR14","unstructured":"Redwax: Redwax project. https:\/\/redwax.eu"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Selgert, F.: Cynefin framework, devops and secure IoT. In: Proceedings of the 39th International Conference on Computer Safety, Reliability and Security (2020)","DOI":"10.1007\/978-3-030-55583-2_19"},{"key":"20_CR16","unstructured":"Sigfox: Sigfox technical overview, May 2017. https:\/\/api.build.sigfox.com\/files\/59c211c69d14790001fbe9a2"},{"key":"20_CR17","unstructured":"Skoufis, C.: D1.4 chariot design method and support tools (ver.1) (2019). https:\/\/www.chariotproject.eu\/uploadfiles\/D1.4.pdf"},{"key":"20_CR18","unstructured":"XebiaLabs: Periodic table of DevOps tools (v3) (2020). https:\/\/xebialabs.com\/periodic-table-of-devops-tools\/"},{"key":"20_CR19","doi-asserted-by":"publisher","unstructured":"Yeh, C.C.M., et al.: Matrix profile i: all pairs similarity joins for time series: a unifying view that includes motifs, discords and shapelets. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 1317\u20131322, December 2016. https:\/\/doi.org\/10.1109\/ICDM.2016.0179","DOI":"10.1109\/ICDM.2016.0179"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55583-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T07:14:34Z","timestamp":1667978074000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-55583-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030555825","9783030555832"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55583-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/safecomp2020.di.fc.ul.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"116","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}