{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:16Z","timestamp":1771661056644,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_70","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"1071-1082","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ARCSECURE: Centralized Hub for Securing a Network of IoT Devices"],"prefix":"10.1007","author":[{"given":"Kavinga Yapa","family":"Abeywardena","sequence":"first","affiliation":[]},{"given":"A. M. I. S.","family":"Abeykoon","sequence":"additional","affiliation":[]},{"given":"A. M. S. P. B.","family":"Atapattu","sequence":"additional","affiliation":[]},{"given":"H. N.","family":"Jayawardhane","sequence":"additional","affiliation":[]},{"given":"C. N.","family":"Samarasekara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"70_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: IoT Security: Ongoing Challenges and Research Opportunities (2014)","DOI":"10.1109\/SOCA.2014.58"},{"key":"70_CR2","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"M Ahmad","year":"2018","unstructured":"Ahmad, M., Salah, K.: IoT security\u202f: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"70_CR3","doi-asserted-by":"crossref","unstructured":"Lin, H., Bergmann, N.W.: IoT Privacy and Security Challenges for Smart Home Environments (2016)","DOI":"10.3390\/info7030044"},{"key":"70_CR4","doi-asserted-by":"crossref","unstructured":"Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: Proceedings of Asia South Pacific Design Automation Conference ASP-DAC, vol. 25\u201328 January, pp. 519\u2013524 (2016)","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"70_CR5","doi-asserted-by":"crossref","unstructured":"Jonsdottir, G., Wood, D., Doshi, R.: IoT network monitor. In: 2017 IEEE MIT Undergraduate Research Technology Conference (URTC), Cambridge, MA, pp. 1\u20135 (2017) Accessed 22 Feb 2020","DOI":"10.1109\/URTC.2017.8284179"},{"key":"70_CR6","doi-asserted-by":"crossref","unstructured":"Yu, E., Cho, S.: Ga-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In: Neural Networks, 2003. Proceedings of the International Joint Conference on, vol. 3, pp. 2253\u20132257. IEEE (2003)","DOI":"10.1109\/IJCNN.2003.1223761"},{"issue":"1","key":"70_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1504\/IJESDF.2007.013592","volume":"1","author":"K Revett","year":"2007","unstructured":"Revett, K., Gorunescu, F., Gorunescu, M., Ene, M., Magalhaes, S., Santos, H.: A machine learning approach to keystroke dynamics-based user authentication. Int. J. Electron. Secur. Digit. Forensics 1(1), 55\u201370 (2007)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"70_CR8","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-04342-0_12","volume-title":"Recent Advances in Intrusion Detection","author":"S Zahid","year":"2009","unstructured":"Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-based user identification on smart phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) Recent Advances in Intrusion Detection, pp. 224\u2013243. Springer, Berlin (2009). https:\/\/doi.org\/10.1007\/978-3-642-04342-0_12"},{"key":"70_CR9","unstructured":"Moose, F.S.: moosefs.com, MooseFS, 03 2019. https:\/\/moosefs.com\/. Accessed 20 Feb 2020"},{"issue":"9","key":"70_CR10","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/LCOMM.2009.090615","volume":"13","author":"A Chonka","year":"2009","unstructured":"Chonka, A., Singh, J., Zhou, W.: Chaos theory based detection against network mimicking DDoS attacks. IEEE Commun. Lett. 13(9), 717\u2013719 (2009)","journal-title":"IEEE Commun. Lett."},{"key":"70_CR11","unstructured":"Mukkamala, S., Sung, A.H.: Detecting denial of service attacks using support vector machines. In: Institute for Complex Additive Systems Analysis New Mexico Tech Socorro, The IEEE International Conference on Fuzzy Systems (2003)"},{"issue":"5","key":"70_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19051141","volume":"19","author":"M El-Hajj","year":"2019","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of internet of things (IoT) authentication schemes. Sensors (Switzerland) 19(5), 1\u201343 (2019). https:\/\/doi.org\/10.3390\/s19051141","journal-title":"Sensors (Switzerland)"},{"key":"70_CR13","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1016\/j.procs.2018.08.209","volume":"135","author":"Y Muliono","year":"2018","unstructured":"Muliono, Y., Ham, H., Darmawan, D.: Keystroke dynamic classification using machine learning for password authorization. Procedia Comput. Sci. 135, 564\u2013569 (2018). https:\/\/doi.org\/10.1016\/j.procs.2018.08.209","journal-title":"Procedia Comput. Sci."},{"key":"70_CR14","doi-asserted-by":"publisher","unstructured":"Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I., Steri, G., Baldini, G.: Security and privacy issues for an IoT based smart home (2017). https:\/\/doi.org\/10.23919\/MIPRO.2017.7973622","DOI":"10.23919\/MIPRO.2017.7973622"},{"key":"70_CR15","doi-asserted-by":"publisher","unstructured":"Andrew, D., Michael, O.A.: A Study of the Advances in IoT Security, pp.1\u20135 (2018). https:\/\/doi.org\/10.1145\/3284557.3284560","DOI":"10.1145\/3284557.3284560"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:23Z","timestamp":1771658003000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_70","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}