{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:51:54Z","timestamp":1742914314946,"version":"3.40.3"},"publisher-location":"Cham","reference-count":68,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031613814"},{"type":"electronic","value":"9783031613821"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61382-1_11","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:06:11Z","timestamp":1717203971000},"page":"164-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Viz$$^4$$NetSec: Visualizing Dynamic Network Security Configurations of\u00a0Everyday Interconnected Objects in\u00a0Home Networks"],"prefix":"10.1007","author":[{"given":"No\u00eblle","family":"Rakotondravony","sequence":"first","affiliation":[]},{"given":"Henrich C.","family":"P\u00f6hls","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Pfeifer","sequence":"additional","affiliation":[]},{"given":"Lane","family":"Harrison","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.procs.2022.03.057","volume":"201","author":"M Albany","year":"2022","unstructured":"Albany, M., Alsahafi, E., Alruwili, I., Elkhediri, S.: A review: secure internet of thing system for smart houses. Procedia Comput. Sci. 201, 437\u2013444 (2022)","journal-title":"Procedia Comput. Sci."},{"key":"11_CR2","unstructured":"Antonakakis, M., et al.: Understanding the Mirai Botnet. In: 26th USENIX Security Symposium, pp. 1093\u20131110. USENIX Association (2017)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Ball, R., Fink, G.A., North, C.: Home-centric visualization of network traffic for security administration. In: IEEE Symposium on Visualization for Cyber Security, pp. 55\u201364. ACM (2004)","DOI":"10.1145\/1029208.1029217"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-85933-8_12","volume-title":"Visualization for Computer Security","author":"R Blue","year":"2008","unstructured":"Blue, R., Dunne, C., Fuchs, A., King, K., Schulman, A.: Visualizing real-time network resource usage. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol. 5210, pp. 119\u2013135. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85933-8_12"},{"key":"11_CR5","unstructured":"Brady, F.: openwrt-luci-rpc documentation rel.1.1.16 (2023). https:\/\/readthedocs.org\/projects\/openwrt-luci-rpc\/downloads\/pdf\/stable\/. Accessed 25 Oct 2023"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"107770","DOI":"10.1016\/j.chb.2023.107770","volume":"145","author":"D Buil-Gil","year":"2023","unstructured":"Buil-Gil, D., et al.: The digital harms of smart home devices: a systematic literature review. Comput. Hum. Behav. 145, 107770 (2023)","journal-title":"Comput. Hum. Behav."},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-39653-6_17","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"A Crabtree","year":"2003","unstructured":"Crabtree, A., Rodden, T., Hemmings, T., Benford, S.: Finding a place for UbiComp in the home. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 208\u2013226. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39653-6_17"},{"key":"11_CR8","unstructured":"D3.js. D3.js - Data-Driven Documents v.7.8.5 (2023). https:\/\/d3js.org\/. Accessed 01 Jan 2024"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Danbatta, S., Varol, A.: Comparison of Zigbee, Z-wave, Wi-Fi, and bluetooth wireless technologies used in home automation (2019). Accessed 15 June 2023","DOI":"10.1109\/ISDFS.2019.8757472"},{"issue":"3","key":"11_CR10","first-page":"75","volume":"18","author":"D Dicheva","year":"2015","unstructured":"Dicheva, D., Dichev, C., Agre, G., Angelova, G.: Gamification in education: a systematic mapping study. J. Educ. Technol. Soc. 18(3), 75\u201388 (2015)","journal-title":"J. Educ. Technol. Soc."},{"key":"11_CR11","unstructured":"Dini, M.T., Sokolov, V.: Internet of Things security problems. arXiv preprint arXiv:1902.08597 (2019)"},{"key":"11_CR12","unstructured":"Eckhardt, D., Freiling, F., Herrmann, D., Katzenbeisser, S., P\u00f6hls, H.C.: Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes f\u00fcr die L\u00f6sung allt\u00e4glicher Sicherheitsprobleme. In: 13. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00fcr Informatik e.V. (GI Sicherheit 2024). LNI (2024)"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/COMST.2015.2450538","volume":"18","author":"VT Guimaraes","year":"2015","unstructured":"Guimaraes, V.T., Freitas, C.M.D.S., Sadre, R., Tarouco, L.M.R., Granville, L.Z.: A survey on information visualization for network and service management. IEEE Commun. Surv. Tutor. 18(1), 285\u2013323 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Gupta, K., Pandey, A., Chan, L., Yadav, A., Staats, B., Borkin, M.A.: Portola: a hybrid tree and network visualization technique for network segmentation. In: IEEE Symposium on Visualization for Cyber Security, pp. 1\u20135 (2022)","DOI":"10.31219\/osf.io\/dyhkc"},{"key":"11_CR15","unstructured":"Hnatyuk, K.: Internet of things (IoT) statistics: 2022\/2023 (2023). https:\/\/marketsplash.com\/internet-of-things-statistics. Accessed 30 Nov 2023"},{"key":"11_CR16","unstructured":"Home Assistant Developers. Home Assistant (ver. 2023.8) (2023). https:\/\/www.home-assistant.io\/. Accessed 25 Oct 2023"},{"key":"11_CR17","unstructured":"Home Assistant Developers. Nmap tracker (2023). https:\/\/www.home-assistant.io\/integrations\/nmap_tracker\/. Accessed 25 Oct 2023"},{"issue":"12","key":"11_CR18","doi-asserted-by":"publisher","first-page":"9622","DOI":"10.1109\/JIOT.2020.3024058","volume":"8","author":"W Iqbal","year":"2021","unstructured":"Iqbal, W., et al.: ALAM: anonymous lightweight authentication mechanism for SDN-enabled smart homes. IEEE Internet Things J. 8(12), 9622\u20139633 (2021)","journal-title":"IEEE Internet Things J."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Jeong, C.Y., Chang, B.H., Na, J.C.: A survey on visualization for wireless security. In: 4th International Conference on Networked Computing and Advanced Information Management, pp. 129\u2013132 (2008)","DOI":"10.1109\/NCM.2008.187"},{"issue":"11","key":"11_CR20","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/TVCG.2014.2315995","volume":"20","author":"R Jianu","year":"2014","unstructured":"Jianu, R., Rusu, A., Hu, Y., Taggart, D.: How to display group information on node-link diagrams: an evaluation. IEEE Trans. Visual Comput. Graphics 20(11), 1530\u20131541 (2014)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"11_CR21","unstructured":"Joshi, S.: 70 IoT statistics to unveil the past, present, and future of IoT (2023). https:\/\/learn.g2.com\/IoT-statistics. Accessed 15 June 2023"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Kan, Z., Hu, C., Wang, Z., Wang, G., Huang, X.: NetVis: a network security management visualization tool based on treemap. In: 2nd International Conference on Advanced Computer Control, pp. 18\u201321 (2010)","DOI":"10.1109\/ICACC.2010.5487236"},{"key":"11_CR23","unstructured":"Klassen, C.: Lightbeam (2023). lightbeam.chikl.de. Accessed 11 Jan 2024"},{"issue":"1","key":"11_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0268-2","volume":"6","author":"S Kumar","year":"2019","unstructured":"Kumar, S., Tiwari, P., Zymbler, M.: Internet of Things is a revolutionary approach for future technology enhancement: a review. J. Big data 6(1), 1\u201321 (2019)","journal-title":"J. Big data"},{"key":"11_CR25","unstructured":"Ladefoged, J.: Device tracker - first home\/last home (2017). https:\/\/community.home-assistant.io\/t\/device-tracker-first-home-last-home\/30036. Accessed 30 Nov 2023"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proc. ACM Hum.-Comput. Interact. 2(CSCW) (2018)","DOI":"10.1145\/3274371"},{"key":"11_CR27","unstructured":"Lechtenb\u00f6rger, J.: Das verworrene web (2019). www.informationelle-selbstbestimmung-im-internet.de\/Collusion.html. Accessed 01 Jan 2024"},{"key":"11_CR28","unstructured":"Linux Foundation. Open vSwitch (v. 2.14.3) (2023). https:\/\/www.openvswitch.org\/"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Livnat, Y., Agutter, J., Moon, S., Erbacher, R.F., Foresti, S.: A visualization paradigm for network intrusion detection. In: 6thIEEE SMC Information Assurance Workshop, pp. 92\u201399. IEEE (2005)","DOI":"10.1109\/IAW.2005.1495939"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Livnat, Y., Agutter, J., Moon, S., Foresti, S.: Visual correlation for situational awareness. In: 2005 IEEE Symposium on Information Visualization, INFOVIS 2005, pp. 95\u2013102. IEEE (2005)","DOI":"10.1109\/INFVIS.2005.1532134"},{"key":"11_CR31","unstructured":"Raspberry Pi Ltd. Raspberry pi 4 model b (2023). https:\/\/www.raspberrypi.com\/products\/raspberry-pi-4-model-b\/. Accessed 13 Oct 2023"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Lima, M.: Visual complexity website (2024). http:\/\/www.visualcomplexity.com\/vc\/project.cfm?id=268. Accessed 14 Jan 2024","DOI":"10.1155\/2024\/9806827"},{"key":"11_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.016","volume":"67","author":"R Masoudi","year":"2016","unstructured":"Masoudi, R., Ghaffari, A.: Software defined networks: a survey. J. Netw. Comput. Appl. 67, 1\u201325 (2016). Accessed 25 Oct 2023","journal-title":"J. Netw. Comput. Appl."},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"May, C.J., Hammerstein, J., Mattson, J., Rush, K.: Defense in depth: foundations for secure and resilient it enterprises. The Software Engineering Institute (2006)","DOI":"10.21236\/ADA460375"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"McPherson, J., Ma, K.-L., Krystosk, P., Bartoletti, T., Christensen, M.: PortVis: a tool for port-based detection of security events. In: ACM Workshop on Visualization and Data Mining for Computer Security, pp. 73\u201381 (2004)","DOI":"10.1145\/1029208.1029220"},{"key":"11_CR36","unstructured":"Neumann, P., Schlechtweg, S., Carpendale, S.: ArcTrees: visualizing relations in hierarchical data. In: EuroVis, pp. 53\u201360 (2005)"},{"key":"11_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-74947-1_8","volume-title":"Measurement, Modelling and Evaluation of Computing Systems","author":"A Nguyen-Ngoc","year":"2018","unstructured":"Nguyen-Ngoc, A., Lange, S., Geissler, S., Zinner, T., Tran-Gia, P.: Estimating the flow rule installation time of SDN switches when facing control plane delay. In: German, R., Hielscher, K.-S., Krieger, U.R. (eds.) MMB 2018. LNCS, vol. 10740, pp. 113\u2013126. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74947-1_8"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Nobre, C., Meyer, M., Streit, M., Lex, A.: The state of the art in visualizing multivariate networks (2019). https:\/\/osf.io\/upbm2","DOI":"10.31219\/osf.io\/upbm2"},{"key":"11_CR39","unstructured":"NSA. Manageable network plan (2015). https:\/\/nsarchive.gwu.edu\/sites\/default\/files\/documents\/2725523\/Document-2-11.pdf"},{"issue":"3","key":"11_CR40","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.-N., et al.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617\u20131634 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"11_CR41","unstructured":"Open Networking Foundation. OpenFlow Switch Specification (ver. 1.5.1). https:\/\/www.opennetworking.org\/wp-content\/uploads\/2014\/10\/openflow-switch-v1.5.1.pdf"},{"key":"11_CR42","unstructured":"OpenDaylight Project. Viewing network topology (2023). https:\/\/nexus.opendaylight.org\/content\/sites\/site\/org.opendaylight.docs\/master\/userguide\/manuals\/userguide\/bk-user-guide\/content\/_viewing_network_topology.html. Accessed 30 Nov 2023"},{"key":"11_CR43","unstructured":"OpenWRT. OpenWRT Project (v. 21.02.3). https:\/\/openwrt.org\/"},{"key":"11_CR44","unstructured":"Osman, A., Wasicek, A., K\u00f6psell, S., Strufe, T.: Transparent microsegmentation in smart home IoT networks. In: 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge). USENIX Association (2020)"},{"issue":"5","key":"11_CR45","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/65.620520","volume":"11","author":"G Parulkar","year":"1997","unstructured":"Parulkar, G., Schmidt, D., Kraemer, E., Turner, J., Kantawala, A.: An architecture for monitoring, visualization, and control of gigabit networks. IEEE Netw. 11(5), 34\u201343 (1997)","journal-title":"IEEE Netw."},{"key":"11_CR46","unstructured":"Pires, A.: Zigbee network map - red dashed lines (2020). https:\/\/community.home-assistant.io\/t\/zigbee-network-map-red-dashed-lines\/216670. Accessed 30 Nov 2023"},{"key":"11_CR47","unstructured":"Plohmann, D., Enders, S.: Malpedia by Fraunhofer FKIE (2019). https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/elf.mirai. Accessed 20 Jan 2024"},{"key":"11_CR48","unstructured":"Plume. Plume IQ 1H 2022 smart home market report (2022)"},{"key":"11_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-50344-4_23","volume-title":"Distributed, Ambient and Pervasive Interactions","author":"HC P\u00f6hls","year":"2020","unstructured":"P\u00f6hls, H.C., Rakotondravony, N.: Dynamic consent: physical switches and feedback to adjust consent to IoT data collection. In: Streitz, N., Konomi, S. (eds.) HCII 2020. LNCS, vol. 12203, pp. 322\u2013335. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50344-4_23"},{"key":"11_CR50","doi-asserted-by":"crossref","unstructured":"Poole, E.S., Chetty, M., Grinter, R.E., Edwards,W.K.: More than meets the eye: transforming the user experience of home network management. In: 7th ACM Conference on Designing Interactive Systems, pp. 455\u2013464 (2008)","DOI":"10.1145\/1394445.1394494"},{"key":"11_CR51","unstructured":"Read the Docs. OpenWRT LuCI RPC Documentation (2023). https:\/\/readthedocs.org\/projects\/openwrt-luci-rpc\/downloads\/pdf\/stable\/. Accessed 13 Oct 2023"},{"key":"11_CR52","unstructured":"Ryu SDN Framework Community. Ryu SDN Framework v.4.34 (2023). https:\/\/ryu.readthedocs.io\/en\/latest\/. Accessed 13 Oct 2023"},{"issue":"1","key":"11_CR53","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1109\/TVCG.2018.2864903","volume":"25","author":"A Sarikaya","year":"2018","unstructured":"Sarikaya, A., Correll, M., Bartram, L., Tory, M., Fisher, D.: What do we talk about when we talk about dashboards? IEEE Trans. Visual Comput. Graphics 25(1), 682\u2013692 (2018)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"issue":"6","key":"11_CR54","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MCG.2011.103","volume":"31","author":"H-J Schulz","year":"2011","unstructured":"Schulz, H.-J.: Treevis.net: a tree visualization reference. IEEE Comput. Graphics Appl. 31(6), 11\u201315 (2011)","journal-title":"IEEE Comput. Graphics Appl."},{"key":"11_CR55","unstructured":"Scott-Brown, J., Bach, B.: NetPanorama: a declarative grammar for network construction, transformation, and visualization (2023)"},{"issue":"8","key":"11_CR56","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1109\/TVCG.2011.144","volume":"18","author":"H Shiravi","year":"2011","unstructured":"Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. Visual Comput. Graphics 18(8), 1313\u20131329 (2011)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"11_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-91859-0_8","volume-title":"Security and Trust Management","author":"K Spielvogel","year":"2021","unstructured":"Spielvogel, K., P\u00f6hls, H.C., Posegga, J.: TLS beyond the\u00a0broker: enforcing fine-grained security and\u00a0trust in\u00a0publish\/subscribe environments for\u00a0IoT. In: Roman, R., Zhou, J. (eds.) STM 2021. LNCS, vol. 13075, pp. 145\u2013162. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91859-0_8"},{"key":"11_CR58","doi-asserted-by":"crossref","unstructured":"Staheli, D., et al.: Visualization evaluation for cyber security: trends and future directions. In: 11th Workshop on Visualization for Cyber Security, pp. 49\u201356 (2014)","DOI":"10.1145\/2671491.2671492"},{"key":"11_CR59","doi-asserted-by":"crossref","unstructured":"Starks, J., Song, L., Allen, J.K., Mistree, F.: Integrating user preference into improved home appliance scheduling. In: International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, vol. 85390, p. V03BT03A048. ASME (2021)","DOI":"10.1115\/DETC2021-70244"},{"key":"11_CR60","first-page":"34","volume":"7","author":"M Stawowski","year":"2009","unstructured":"Stawowski, M.: Network security architecture. ISSA J. 7, 34\u201338 (2009)","journal-title":"ISSA J."},{"key":"11_CR61","unstructured":"Toledo, J.: EtherApe: a live graphical network monitor tool (2000). http:\/\/etherape.sourceforge.net. Accessed 01 Jan 2024"},{"key":"11_CR62","doi-asserted-by":"crossref","unstructured":"Tolmie, P., Pycock, J., Diggins, T., MacLean, A., Karsenty, A.: Unremarkable computing. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 399\u2013406 (2002)","DOI":"10.1145\/503376.503448"},{"issue":"03","key":"11_CR63","doi-asserted-by":"publisher","first-page":"1640005","DOI":"10.1142\/S0218539316400052","volume":"23","author":"S UlRehman","year":"2016","unstructured":"UlRehman, S., Manickam, S.: A study of smart home environment and its security threats. Int. J. Reliab. Qual. Saf. Eng. 23(03), 1640005 (2016)","journal-title":"Int. J. Reliab. Qual. Saf. Eng."},{"key":"11_CR64","doi-asserted-by":"crossref","unstructured":"Wagner, N., et al.: Towards automated cyber decision support: a case study on network segmentation for security. In: IEEE Symposium Series on Computational Intelligence, pp. 1\u201310 (2016)","DOI":"10.1109\/SSCI.2016.7849908"},{"key":"11_CR65","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"11_CR66","doi-asserted-by":"crossref","unstructured":"Yermalovich, P.: Dashboard visualization techniques in information security. In: International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ISNCC49221.2020.9297291"},{"key":"11_CR67","doi-asserted-by":"crossref","unstructured":"Zavalyshyn, I., Duarte, N.O., Santos, N.: HomePad: a privacy-aware smart hub for home environments. In: IEEE\/ACM Symposium on Edge Computing (SEC), pp. 58\u201373 (2018)","DOI":"10.1109\/SEC.2018.00012"},{"key":"11_CR68","unstructured":"zha ng. zha-map: a visualization tool for Zigbee Home Automation (2023). https:\/\/github.com\/zha-ng\/zha-map. Accessed 25 Oct 2023"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61382-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T22:31:04Z","timestamp":1732141864000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61382-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031613814","9783031613821"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61382-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}