{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T08:31:05Z","timestamp":1745397065338,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031371196"},{"type":"electronic","value":"9783031371202"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37120-2_20","type":"book-chapter","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:04:56Z","timestamp":1687993496000},"page":"302-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["New Security Challenges of\u00a0Internet of\u00a0Things"],"prefix":"10.1007","author":[{"given":"Gennady","family":"Dik","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Bogdanov","sequence":"additional","affiliation":[]},{"given":"Nadezhda","family":"Shchegoleva","sequence":"additional","affiliation":[]},{"given":"Jasur","family":"Kiyamov","sequence":"additional","affiliation":[]},{"given":"Aleksandr","family":"Dik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,29]]},"reference":[{"key":"20_CR1","unstructured":"\u201c2020 Unit 42 IoT Threat Report,\u201d Palo Alto Networks, 10 March 2020. https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020. Accessed 04 Apr 2023"},{"key":"20_CR2","unstructured":"Electronic resource. https:\/\/www.kaspersky.ru\/resource-center\/preemptive-safety\/best-practices-for-iot-security?ysclid=lg2357k9zr450745102. Accessed 04 Apr 2023"},{"key":"20_CR3","unstructured":"Nefedova, M.: Zerobot botnet attacks vulnerable IoT devices Zyxel, D-Link, BIG-IP and more 08.12.2022. https:\/\/xakep.ru\/2022\/12\/08\/zerobot. Accessed 04 Apr 2023"},{"key":"20_CR4","unstructured":"Vereshchagina, E.A., Kapetsky, I.O., Yarmonov, A.S.: 317 Security Issues of the Internet of Things. World of Science, Moscow (2021). Online edition. ISBN: 978-5-6045771-9-6. https:\/\/izd-mn.com\/PDF\/20MNNPU21.pdf. Accessed 27 Mar 2023"},{"key":"#cr-split#-20_CR5.1","unstructured":"Global Information Infrastructure, Internet Protocol Aspects and Next Generation Networks: Overview of the Internet of Things, 22 p. ITU (2012). (ITU-T Recommendations"},{"key":"#cr-split#-20_CR5.2","unstructured":"Y. 2060). https:\/\/iotas.ru\/files\/documents\/wg\/T-REC-Y.2060-201206-PDF-R.pdf. Accessed 27 Mar 2023"},{"key":"20_CR6","unstructured":"Tsvetkov, V.: Information interaction. European Researcher. Series A. 62(11-1), 2573\u20132577 (2013). http:\/\/www.erjournal.ru\/journals_n\/1386019866.pdf. Accessed 29 June 2023"},{"key":"20_CR7","unstructured":"Grammatchikov, A.: In three years, each Russian will have six devices connected to the network. CNews.ru, 21 April 2020. https:\/\/www.cnews.ru\/articles\/2020-04-21_cherez_tri_goda_na_kazhdogo_rossiyanina?ysclid=lfsrgtbgdy268814557. Accessed 29 June 2023"},{"key":"20_CR8","unstructured":"Prieto, R., Hunt, E., Cromwell, C.: Cisco Visual Networking Index Predicts Global Annual IP Traffic to Exceed Three Zettabytes by 2021. The Newsroom: Cisco\u2019s Technology News Site, 08 June 2017. https:\/\/newsroom.cisco.com\/press-releasecontent?type=webcontent &articleId=1853168. Accessed 28 Mar 2023"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-031-10542-5_43","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2022 Workshops","author":"A Bogdanov","year":"2022","unstructured":"Bogdanov, A., Shchegoleva, N., Dik, G., Khvatov, A., Dik, A.: \u201cSmart habitat\u2019\u2019: features of building it infrastructure, main problems of building data networks using 5G (6G) technologies. In: Gervasi, O., Murgante, B., Misra, S., Rocha, A.M.A.C., Garau, C. (eds.) ICCSA 2022. LNCS, vol. 13380, pp. 628\u2013638. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-10542-5_43"},{"key":"20_CR10","unstructured":"Kupriyanovskiy, V.: On standardization of smart cities, Internet of Things and big data. The considerations on the practical use in Russia. Int. J. Open Inf. Technol. 4(2), 34\u201340 (2016)"},{"key":"20_CR11","unstructured":"Just like ABCDE: how the Internet of Things works. Electronic Resource. https:\/\/trends.rbc.ru\/trends\/industry\/5f7ca9f89a79471a3d36cb2c. Accessed 29 Mar 2023"},{"key":"20_CR12","doi-asserted-by":"publisher","unstructured":"Rayes, A., Salam, S.: The things in IoT: sensors and actuators. In: Rayes, A., Salam, S. (eds.) Internet of Things From Hype to Reality, pp. 57\u201377. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-44860-2_3. Accessed 31 Mar 2023","DOI":"10.1007\/978-3-319-44860-2_3"},{"key":"20_CR13","unstructured":"Minerva, R., Biru, A., Rotondi, D.: Towards a definition of the Internet of Things (IoT). IEEE (2015)"},{"key":"20_CR14","unstructured":"Veretennikov, A.V.: BigData: big data analysis today, No. 32 (166), pp. 9\u201312 (2017). https:\/\/moluch.ru\/archive\/166\/45354\/. Accessed 04 Apr 2023"},{"key":"20_CR15","unstructured":"Lee, P.: Architecture of the Internet of Things, 454 p. DMK Press, Moscow (2020). Lee P., trans. from Eng. M. A. Reitman. ISBN: 978-5-97060-784-8"},{"key":"20_CR16","doi-asserted-by":"publisher","unstructured":"Letichevsky, A., et al.: Basic protocols, message sequence charts, and the verification of requirements specifications. Comput. Netw. 49(5), 661\u2013675 (2005). https:\/\/doi.org\/10.1016\/j.comnet.2005.05.005. Accessed 31 Mar 2023","DOI":"10.1016\/j.comnet.2005.05.005"},{"key":"20_CR17","doi-asserted-by":"publisher","unstructured":"Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures, 103 p. European Union Agency For Network And Information Security, ENISA, Hague (2017). https:\/\/doi.org\/10.2824\/03228","DOI":"10.2824\/03228"},{"key":"20_CR18","unstructured":"Chantsis, F., Stais, I., Calderon, P., Deirmenzoglu, E., Woods, B.: Practical Hacking of the Internet of Things, 480 p. DMK Press, Moscow (2022). Transl. from English. L. N. Akulich"},{"issue":"1","key":"20_CR19","first-page":"92","volume":"11","author":"E Ubozhenko","year":"2021","unstructured":"Ubozhenko, E., Kruteeva, O., Vdovin, S.: Economic justification for the introduction of digital technology \u201cInternet of Things\u2019\u2019 in the company\u2019s activities. Bull. Altai Acad. Econ. Law 11(1), 92 (2021)","journal-title":"Bull. Altai Acad. Econ. Law"},{"key":"20_CR20","unstructured":"Vlasenko, A.V., Kiselev, P.S., Sklyarova, E.A.: Security of the Internet of Things, No. 21 (363), pp. 86\u201389 (2021). https:\/\/moluch.ru\/archive\/363\/81232\/. Accessed 05 Apr 2023"},{"key":"20_CR21","unstructured":"Vlasova, Y., Kireev, V.: Review of the Russian market of IoT-technologies. Mod. Sci. Intensive Technol. (8), 48\u201353 (2018). https:\/\/top-technologies.ru\/ru\/article\/view?id=37118. Accessed 05 Apr 2023"},{"key":"20_CR22","unstructured":"Glonass, V.: The future of machine learning in cybersecurity. Intersectoral J. Navig. Technol. (2022). http:\/\/vestnik-glonass.ru\/news\/tech\/budushchee-mashinnogo-obucheniya-v-kiberbezopasnosti\/?ysclid=lgamagzbr866573019. Accessed 10 Apr 2023"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Riad, R., et al.: Learning strides in convolutional neural networks. arXiv preprint arXiv:2202.01653 (2022)","DOI":"10.31219\/osf.io\/4yz8f"},{"key":"20_CR24","unstructured":"Threats included in the Microsoft Threat Modeling Tool, 27 September 2022. https:\/\/learn.microsoft.com\/ru-ru\/azure\/security\/develop\/threat-modeling-tool-threats. Accessed 10 Apr 2023"},{"key":"20_CR25","unstructured":"Tong, W., Zhu, P. (eds.): 6G Networks. The Path From 5G to 6G Through the Eyes of Developers. From Connected People and Things to Connected Intelligence, 624 p. DMK Press, Moscow (2022). per. from English. V. S. Yatsenkova"},{"key":"20_CR26","unstructured":"Smelyansky, T. https:\/\/cipr.ru\/news\/kakoe-oborudovanie-neobhodimo-dlya-rossijskih-setej-5g\/?ysclid=lgdpc73kar778720058. Accessed 13 Apr 2023"},{"key":"20_CR27","unstructured":"What is the 5G network architecture. https:\/\/www.shunlongwei.com\/ru\/what-is-5g-network-architecture\/. Accessed 12 Apr 2023"},{"key":"20_CR28","unstructured":"Antipko, A.: What tasks can be solved by machine learning, No. 5 (452), pp. 4\u20136 (2023). https:\/\/moluch.ru\/archive\/452\/99591\/. Accessed 13 Apr 2023"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2023 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37120-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:40:15Z","timestamp":1687995615000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37120-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031371196","9783031371202"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37120-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Custom based on Cyberchair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"283","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PHD Showcase Papers: 6(for main conf) \/ For ICCSA 2023 Workshops 876 subm sent, 350 full papers and 29 short papers accepted, additional PHD Showcase Papers: 2","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}