{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:47:52Z","timestamp":1743040072135,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030797270"},{"type":"electronic","value":"9783030797287"}],"license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-79728-7_24","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"242-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Power Meter Software Quality Analysis Based on Dynamic Binary Instrumentation"],"prefix":"10.1007","author":[{"given":"Zhai","family":"Feng","sequence":"first","affiliation":[]},{"given":"Kong","family":"Lingda","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Yongjin","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Xin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"24_CR1","unstructured":"Van Doorn, P.M., Lightbody, S.H., Ki, C.S.S.: Power meter for determining parameters of muliphase power lines (1998)"},{"key":"24_CR2","unstructured":"James, W.: Electric power measurement system and hall effect based electric power meter for use therein (1987)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Software engineering\n. Computer 8(2), 72\u201372","DOI":"10.1109\/C-M.1975.218875"},{"key":"24_CR4","unstructured":"Jay, J.: Poorly-secured smart energy meters could place millions at risk from hackers, warns GCHQ[EB\/OL] (2018). https:\/\/www.teiss.co.uk\/smart-energy-meters-security-gchq"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Makonin, S., Popowich, F., Gill, B.: The cognitive power meter: looking beyond the smart meter (2013)","DOI":"10.1109\/CCECE.2013.6567686"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Waheib, B.M., et al.: Design of smart power meter for local electrical power generators in Baghdad city. IOP Conf. Ser. Mater. Sci. Eng. 881, 012105 (2020)","DOI":"10.1088\/1757-899X\/881\/1\/012105"},{"key":"24_CR7","unstructured":"Son, M.H.: Power-consumption control apparatus and method for smart meter (2011)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, S.L., Zhou, N., Wu, J.X.: The fuzzy integrated evaluation of embedded system security. In: International Conference on Embedded Software & Systems. IEEE Computer Society (2008)","DOI":"10.1109\/ICESS.2008.49"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Fujiwara, K., Matoba, O.: Detection and evaluation of security features embedded in paper using spectral-domain optical coherence tomography. Opt. Rev. 18(1), 171\u2013175 (2011)","DOI":"10.1007\/s10043-011-0018-y"},{"issue":"4","key":"24_CR10","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1080\/01446190050024905","volume":"18","author":"JHM Tah","year":"2000","unstructured":"Tah, J.H.M., Carr, V.: A proposal for construction project risk assessment using fuzzy logic. Constr. Manag. Econ. 18(4), 491\u2013500 (2000)","journal-title":"Constr. Manag. Econ."},{"issue":"3","key":"24_CR11","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/s11767-006-0247-6","volume":"24","author":"Z Dongmei","year":"2007","unstructured":"Dongmei, Z., Changguang, W., Jianfeng, M.: A risk assessment method of the wireless network security. J. Electron. 24(3), 428\u2013432 (2007). https:\/\/doi.org\/10.1007\/s11767-006-0247-6","journal-title":"J. Electron."},{"issue":"1","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-014-2188-y","volume":"82","author":"Y-L Liu","year":"2014","unstructured":"Liu, Y.-L., Jin, Z.-G.: SAEW: a security assessment and enhancement system of Wireless Local Area Networks (WLANs). Wireless Pers. Commun. 82(1), 1\u201319 (2014). https:\/\/doi.org\/10.1007\/s11277-014-2188-y","journal-title":"Wireless Pers. Commun."},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Kim, D.R., Moon, J.S.: A study for protecting the virtual memory of applications. IEMEK J. Embed. Syst. Appl. 11(6), 335\u2013341 (2016)","DOI":"10.14372\/IEMEK.2016.11.6.335"},{"key":"24_CR14","unstructured":"De Barros, M., et al.: Adaptive fuzzing system for web services. US 2013"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Householder, A.D., Foote, J.M.: Probability-based parameter selection for black-box fuzz testing (2012)","DOI":"10.21236\/ADA610472"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Chen, Q.S., Chen, X.W.: Intelligent electric power monitor and meter reading system based on power line communication and OFDM. In: 2008 Congress on Image and Signal Processing, vol. 4, pp. 59\u201363. IEEE (2008)","DOI":"10.1109\/CISP.2008.612"}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79728-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:53:59Z","timestamp":1624474439000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79728-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"ISBN":["9783030797270","9783030797287"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79728-7_24","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}