{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:08:04Z","timestamp":1743113284684,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031594618"},{"type":"electronic","value":"9783031594625"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-59462-5_6","type":"book-chapter","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:02:12Z","timestamp":1714633332000},"page":"85-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Possibilities of Using Fuzz Testing in Smart Cities Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8793-4604","authenticated-orcid":false,"given":"Lubomir","family":"Almer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3534-026X","authenticated-orcid":false,"given":"Josef","family":"Horalek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1259-7724","authenticated-orcid":false,"given":"Tomas","family":"Svoboda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"key":"6_CR1","unstructured":"Manville, C., Cochrane G., Kotterink, B.: Mapping Smart Cities in the EU. EPRS: European Parliamentary Research Service, Belgium (2014). CID: 20.500.12592\/0scs9f. https:\/\/policycommons.net\/artifacts\/1339578\/mapping-smart-cities-in-the-eu\/1949353\/. Accessed 10 Oct 2022"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Eckhoff, D., Wagner, I.: Privacy in the smart city\u2014applications, technologies, challenges, and solutions. IEEE Commun. Surv. Tut. 20(1), 489\u2013516 (2018). ISSN 1553-877X. https:\/\/doi.org\/10.1109\/COMST.2017.2748998. Accessed 16 Jun 2023","DOI":"10.1109\/COMST.2017.2748998"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Alamer, M., Almaiah, M.A.: Cybersecurity in smart city: a systematic mapping study. In: 2021 International Conference on Information Technology (ICIT), 14 July 2021. IEEE (2021). ISBN 978-1-6654-2870-5. https:\/\/doi.org\/10.1109\/ICIT52682.2021.9491123. Accessed 16 Jun 2023","DOI":"10.1109\/ICIT52682.2021.9491123"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Hero, A., et al.: Statistics and data science for cybersecurity. Harvard Data Sci. Rev. 5(1) (2023). https:\/\/doi.org\/10.1162\/99608f92.a42024d0. Accessed 16 Jun 2023","DOI":"10.1162\/99608f92.a42024d0"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Chen, D., Wawrzynski, P., Lv, Z.: Cyber security in smart cities: a review of deep learning-based applications and case studies. Sustain. Cities Soc. 66 (2021). ISSN 22106707. https:\/\/doi.org\/10.1016\/j.scs.2020.102655. Accessed 16 Jun 2023","DOI":"10.1016\/j.scs.2020.102655"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Lim, C., Cho, G.-H., Kim, J.: Understanding the linkages of smart-city technologies and applications: key lessons from a text mining approach and a call for future research. Technol. Forecast. Soc. Change 170 (2021). ISSN 00401625. https:\/\/doi.org\/10.1016\/j.techfore.2021.120893. Accessed 16 Jun 2023","DOI":"10.1016\/j.techfore.2021.120893"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-662-59351-6_9","volume-title":"Transactions on Edutainment XV","author":"D Mouheb","year":"2019","unstructured":"Mouheb, D., Abbas, S., Merabti, M.: Cybersecurity curriculum design: a survey. In: Pan, Z., Cheok, A.D., M\u00fcller, W., Zhang, M., El Rhalibi, A., Kifayat, K. (eds.) Transactions on Edutainment XV. LNCS, vol. 11345, pp. 93\u2013107. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-59351-6_9 Accessed 16 Jun 2023"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Aubert, C., Varacca, D.: Processes, systems & tests: defining contextual equivalences. Electron. Proc. Theoret. Comput. Sci. 347, 1\u201321 (2021). ISSN 2075-2180. https:\/\/doi.org\/10.4204\/EPTCS.347.1. Accessed 16 Jun 2023","DOI":"10.4204\/EPTCS.347.1"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Costa, A., Teixeira, L.: Testing strategies for smart cities applications. In: Proceedings of the III Brazilian Symposium on Systematic and Automated Software Testing, 17 September 2018, pp. 20\u201328. ACM, New York (2018). ISBN 9781450365550. https:\/\/doi.org\/10.1145\/3266003.3266005. Accessed 16 Jun 2023","DOI":"10.1145\/3266003.3266005"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Fortes, S., et al.: The campus as a smart city: University of M\u00e1laga environmental, learning, and research approaches. Sensors 19(6) (2019). ISSN 1424-8220. https:\/\/doi.org\/10.3390\/s19061349. Accessed 16 Jun 2023","DOI":"10.3390\/s19061349"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Lee, W.-H., Chiu, C.-Y.: Design and implementation of a smart traffic signal control system for smart city applications. Sensors 20(2) (2020). ISSN 1424-8220. https:\/\/doi.org\/10.3390\/s20020508. Accessed 16 Jun 2023","DOI":"10.3390\/s20020508"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Vinzenz, N., Oka, D.K.: Integrating fuzz testing into the cybersecurity validation strategy. In: Proceedings of the SAE WCX Digital Summit, 06 April 2021. https:\/\/doi.org\/10.4271\/2021-01-0139. Accessed 16 Jun 2023","DOI":"10.4271\/2021-01-0139"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"L\u00e4mmel, P., Tcholtchev, N., Schieferdecker, I.: Enhancing cloud based data platforms for smart cities with authentication and authorization features. In: Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 05 Dec 2017, pp. 167\u2013172. ACM, New York (2017). ISBN 9781450351959. https:\/\/doi.org\/10.1145\/3147234.3148087. Accessed 16 Jun 2023","DOI":"10.1145\/3147234.3148087"},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"Rodriguez, L.G.A., Batista, D.M.: Resource-intensive fuzzing for MQTT brokers: state of the art, performance evaluation, and open issues. IEEE Netw. Lett. 5(2), 100\u2013104 (2023). ISSN 2576-3156. https:\/\/doi.org\/10.1109\/LNET.2023.3263556. Accessed 16 Jun 2023","DOI":"10.1109\/LNET.2023.3263556"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Hern\u00e1ndez Ramos, S., Villalba, M.T., Lacuesta, R.: MQTT security: a novel fuzzing approach. Wirel. Commun. Mob. Comput. 2018, 1\u201311 (2018). ISSN 1530-8669. https:\/\/doi.org\/10.1155\/2018\/8261746. Accessed 16 Jun 2023","DOI":"10.1155\/2018\/8261746"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"W\u00fcstholz, V., Christakis, M.: Harvey: a greybox fuzzer for smart contracts. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 08 November 2020, pp. 1398\u20131409. ACM, New York (2020). ISBN 9781450370431. https:\/\/doi.org\/10.1145\/3368089.3417064. Accessed 16 Jun 2023","DOI":"10.1145\/3368089.3417064"},{"key":"6_CR17","doi-asserted-by":"publisher","unstructured":"Godefroid, P.: Fuzzing. Commun. ACM 63(2), 70\u201376 (2020). ISSN 0001-0782. https:\/\/doi.org\/10.1145\/3363824. Accessed 16 Jun 2023","DOI":"10.1145\/3363824"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Pham, V.-T., Bohme, M., Roychoudhury, A.: AFLNET: a greybox fuzzer for network protocols. In: 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST), pp. 460\u2013465. IEEE (2020). ISBN 978-1-7281-5778-8. https:\/\/doi.org\/10.1109\/ICST46399.2020.00062. Accessed 16 Jun 2023","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"6_CR19","doi-asserted-by":"publisher","unstructured":"Eceiza, M., Flores, J.L., Iturbe, M.: Fuzzing the Internet of Things: a review on the techniques and challenges for efficient vulnerability discovery in embedded systems. IEEE IoT J. 8(13), 10390\u201310411 (2021). ISSN 2327-4662. https:\/\/doi.org\/10.1109\/JIOT.2021.3056179. Accessed 16 Jun 2023","DOI":"10.1109\/JIOT.2021.3056179"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Beaman, C., Redbourne, M., Mummery, J.D., Hakak, S.: Fuzzing vulnerability discovery techniques: survey, challenges and future directions. Comput. Secur. 120 (2022). ISSN 01674048. https:\/\/doi.org\/10.1016\/j.cose.2022.102813. Accessed 16 Jun 2023","DOI":"10.1016\/j.cose.2022.102813"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Nature of Computation and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-59462-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:04:56Z","timestamp":1714633496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-59462-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031594618","9783031594625"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-59462-5_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Nature of Computation and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictcc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}