{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:40:09Z","timestamp":1744605609369,"version":"3.40.4"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877650","type":"print"},{"value":"9783031877667","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87766-7_35","type":"book-chapter","created":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:42Z","timestamp":1744603782000},"page":"405-416","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Human-In-the-Loop Approach for Self-protecting Smart Homes"],"prefix":"10.1007","author":[{"given":"Josival dos S.","family":"Silva","sequence":"first","affiliation":[]},{"given":"Fernando A. A.","family":"Lins","sequence":"additional","affiliation":[]},{"given":"Nelson S.","family":"Rosa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,15]]},"reference":[{"issue":"8","key":"35_CR1","first-page":"64","volume":"6","author":"B Alhafidh","year":"2016","unstructured":"Alhafidh, B., Allen, W.: Design and simulation of a smart home managed by an intelligent self-adaptive system. Int. J. Eng. Res. Appl. 6(8), 64\u201390 (2016)","journal-title":"Int. J. Eng. Res. Appl."},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Cviti\u0107, I., Perakovi\u0107, D., Peri\u0161a, M., Krsti\u0107, M., Gupta, B.: Analysis of iot concept applications: Smart home perspective. In: International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, pp. 167\u2013180. Springer (2021)","DOI":"10.1007\/978-3-030-78459-1_12"},{"issue":"1","key":"35_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MPRV.2016.5","volume":"15","author":"J Domaszewicz","year":"2016","unstructured":"Domaszewicz, J., et al.: Soft actuation: smart home and office with human-in-the-loop. IEEE Pervasive Comput. 15(1), 48\u201356 (2016)","journal-title":"IEEE Pervasive Comput."},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"El-Maliki, T., Seigne, J.M.: Efficient security adaptation framework for internet of things. In: 2016 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 206\u2013211 (2016)","DOI":"10.1109\/CSCI.2016.0046"},{"key":"35_CR5","unstructured":"ETSI: Cyber; cyber security for consumer internet of things (2019). https:\/\/www.etsi.org"},{"key":"35_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106349","volume":"126","author":"M Gil","year":"2020","unstructured":"Gil, M., Albert, M., Fons, J., Pelechano, V.: Engineering human-in-the-loop interactions in cyber-physical systems. Inf. Softw. Technol. 126, 106349 (2020). https:\/\/doi.org\/10.1016\/j.infsof.2020.106349","journal-title":"Inf. Softw. Technol."},{"key":"35_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-3-319-48746-5_45","volume-title":"Ubiquitous Computing and Ambient Intelligence","author":"M Gil","year":"2016","unstructured":"Gil, M., Pelechano, V., Fons, J., Albert, M.: Designing the human in the loop of self-adaptive systems. In: Garc\u00eda, C.R., Caballero-Gil, P., Burmester, M., Quesada-Arencibia, A. (eds.) UCAmI 2016. LNCS, vol. 10069, pp. 437\u2013449. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48746-5_45"},{"key":"35_CR8","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on iot security: application areas, security threats, and solution architectures. IEEE Access 7, 82721\u201382743 (2019)","journal-title":"IEEE Access"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Hellaoui, H., Bouabdallah, A., Koudil, M.: TAS-IoT: trust-based adaptive security in the IoT. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp. 599\u2013602. IEEE (2016)","DOI":"10.1109\/LCN.2016.101"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Iannucci, S., Abdelwahed, S.: A probabilistic approach to autonomic security management. In: 2016 IEEE International Conference on Autonomic Computing (ICAC), pp. 157\u2013166. IEEE (2016)","DOI":"10.1109\/ICAC.2016.12"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Kaushik, K., Bhardwaj, A., Dahiya, S.: Framework to analyze and exploit the smart home IoT firmware. Meas. Sens. 37, 101406 (2025)","DOI":"10.1016\/j.measen.2024.101406"},{"issue":"1","key":"35_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003)","journal-title":"Computer"},{"key":"35_CR13","first-page":"4070","volume":"46","author":"SA Kumer","year":"2021","unstructured":"Kumer, S.A., Kanakaraja, P., Teja, A.P., Sree, T.H., Tejaswni, T.: Smart home automation using ifttt and google assistant. Mater. Today: Proc. 46, 4070\u20134076 (2021)","journal-title":"Mater. Today: Proc."},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Naeem, H., Ullah, F., Krejcar, O., Alsirhani, A., Zhao, Y.: Adversarial malware detection on consumer devices using optimized image-based ensembles. IEEE Consum. Electron. Mag. 1\u201310 (2024)","DOI":"10.1109\/MCE.2024.3507282"},{"issue":"1","key":"35_CR15","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s10796-016-9670-x","volume":"20","author":"J Palanca","year":"2018","unstructured":"Palanca, J., Val, E.D., Garcia-Fornes, A., Billhardt, H., Corchado, J.M., Juli\u00e1n, V.: Designing a goal-oriented smart-home environment. Inf. Syst. Front. 20(1), 125\u2013142 (2018)","journal-title":"Inf. Syst. Front."},{"issue":"2","key":"35_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1516533.1516538","volume":"4","author":"M Salehie","year":"2009","unstructured":"Salehie, M., Tahvildari, L.: Self-adaptive software: landscape and research challenges. ACM Trans. Auton. Adapt. Syst. (TAAS) 4(2), 1\u201342 (2009)","journal-title":"ACM Trans. Auton. Adapt. Syst. (TAAS)"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Sedgewick, P.E., de\u00a0Lemos, R.: Self-adaptation made easy with blockchains. In: 2018 IEEE\/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 192\u2013193. IEEE (2018)","DOI":"10.1145\/3194133.3194150"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"da\u00a0Silva, G.R., dos Santos, A.L.: Adaptive access control for smart homes supported by zero trust for user actions. IEEE Trans. Netw. Serv. Manag. 1 (2024)","DOI":"10.1109\/TNSM.2024.3492379"},{"issue":"4","key":"35_CR19","doi-asserted-by":"publisher","first-page":"502","DOI":"10.3897\/jucs.107050","volume":"30","author":"J Silva","year":"2024","unstructured":"Silva, J., Rosa, N., Aires, F.: UP-home: a self-adaptive solution for smart home security. JUCS - J. Univ. Comput. Sci. 30(4), 502\u2013530 (2024)","journal-title":"JUCS - J. Univ. Comput. Sci."},{"issue":"12","key":"35_CR20","doi-asserted-by":"publisher","first-page":"1626","DOI":"10.3897\/jucs.114513","volume":"30","author":"GJ da Silva Tavares","year":"2024","unstructured":"da Silva Tavares, G.J., Rosa, N.S.: A survey on human in the loop for self-adaptive systems. JUCS - J. Univ. Comput. Sci. 30(12), 1626\u20131644 (2024)","journal-title":"JUCS - J. Univ. Comput. Sci."},{"issue":"8","key":"35_CR21","doi-asserted-by":"publisher","first-page":"14532","DOI":"10.1109\/JIOT.2023.3343462","volume":"11","author":"M Taherisadr","year":"2024","unstructured":"Taherisadr, M., Faruque, M., Elmalaki, S.: ERUDITE: human-in-the-loop IoT for an adaptive personalized learning system. IEEE Internet Things J. 11(8), 14532\u201314550 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"14","key":"35_CR22","doi-asserted-by":"publisher","first-page":"4932","DOI":"10.3390\/s21144932","volume":"21","author":"H Yar","year":"2021","unstructured":"Yar, H., Imran, A.S., Khan, Z.A., Sajjad, M., Kastrati, Z.: Towards smart home automation using IoT-enabled edge-computing paradigm. Sensors 21(14), 4932 (2021)","journal-title":"Sensors"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87766-7_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:51Z","timestamp":1744603791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87766-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877650","9783031877667"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87766-7_35","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}