{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:07:59Z","timestamp":1754161679830,"version":"3.41.2"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031995644"},{"type":"electronic","value":"9783031995651"}],"license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-99565-1_5","type":"book-chapter","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T06:42:03Z","timestamp":1753771323000},"page":"54-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing IoMT Security by\u00a0Using Benford\u2019s Law and\u00a0Distance Functions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6026-4687","authenticated-orcid":false,"given":"Pedro","family":"Fernandes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3207-8668","authenticated-orcid":false,"given":"S\u00e9amus \u00d3.","family":"Ciardhu\u00e1in","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3448-6726","authenticated-orcid":false,"given":"M\u00e1rio","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Ghubaish, A., et al.: Recent advances in the Internet-of-Medical-Things (IoMT) systems security. IEEE Internet Things J. 8(11), 8707\u20138718 (2021). issn: 2372-2541. https:\/\/doi.org\/10.1109\/jiot.2020.3045653","DOI":"10.1109\/jiot.2020.3045653"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Saxena, A., Mittal, S.: Internet of Medical Things (IoMT) security and privacy: a survey of recent advances and enabling technologies. In: Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing. IC3-2022, pp. 550\u2013559. ACM (2022). https:\/\/doi.org\/10.1145\/3549206.3549301","DOI":"10.1145\/3549206.3549301"},{"key":"5_CR3","unstructured":"Cynerio. The State of Healthcare IoT Device Security 2022 (2022). https:\/\/www.cynerio.com\/landing-pages\/the-stateof-healthcare-iot-device-security-2022. Accessed 02 Feb 2025"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Alanya-Beltran, J., et al.: Identification of cyber-attacks in IoT-based healthcare. In: 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 2692\u20132696. IEEE (2023). https:\/\/doi.org\/10.1109\/icacite57410.2023.10183349","DOI":"10.1109\/icacite57410.2023.10183349"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Tabassum, A., Lebda, W.: Security framework for IoT devices against cyber-attacks. In: 6th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2019). CSEIT-2019, pp. 249\u2013266. Aircc Publishing Corporation (2019). https:\/\/doi.org\/10.48550\/arXiv.2406.14996","DOI":"10.48550\/arXiv.2406.14996"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Nigrini, M.J.: Benford\u2019s Law: Applications for Forensic Accounting, Auditing, and Fraud Detection, vol. 586. Wiley Corporate F &A Series. John Wiley & Sons, Hoboken (2012). isbn: 978-1118152850","DOI":"10.1002\/9781119203094"},{"key":"5_CR7","unstructured":"UNB. CIC IoMT dataset 2024 (2024). https:\/\/www.unb.ca\/cic\/datasets\/iomt-dataset-2024.html"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Firdaus, M.I., Prabowo, A., Istikanaah, N.: Application of Benford\u2019s law to detect fraud in customers\u2019 ending balances using first digit test, second digit test, and first two digits test. Int. J. Math. Stat. Comput. 3(2), 61\u201366 (2025). issn: 3025-0803. https:\/\/doi.org\/10.46336\/ijmsc.v3i2.205","DOI":"10.46336\/ijmsc.v3i2.205"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Fernandes, P., Ciardhu\u00e1in, S.\u00d3., Antunes, M.: Unveiling malicious network flows using Benford\u2019s law. Mathematics 12(15), 2299 (2024). issn: 2227-7390. https:\/\/doi.org\/10.3390\/math12152299","DOI":"10.3390\/math12152299"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Sethi, K., et al.: A lightweight intrusion detection system using Benford\u2019s Law and network flow size difference. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 1\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/comsnets48256.2020.9027422","DOI":"10.1109\/comsnets48256.2020.9027422"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Dr\u0103gus, S.A., et al.: Analysis of vulnerabilities in communication channels using an integrated approach based on machine learning and statistical methods. In: 2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1\u201312. IEEE (2024). https:\/\/doi.org\/10.1109\/ecai61503.2024.10607483","DOI":"10.1109\/ecai61503.2024.10607483"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Deza, E., Deza, M.M.: Encyclopedia of Distances. Springer, Heidelberg (2009). isbn: 9783642002342. https:\/\/doi.org\/10.1007\/978-3-642-00234-2","DOI":"10.1007\/978-3-642-00234-2"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Tharwat, A.: Classification assessment methods. Appl. Comput. Inf. 17(1), 168\u2013192 (2020). https:\/\/doi.org\/10.1016\/j.aci.2018.08.003","DOI":"10.1016\/j.aci.2018.08.003"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Image Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-99565-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T06:42:06Z","timestamp":1753771326000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-99565-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"ISBN":["9783031995644","9783031995651"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-99565-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"30 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IbPRIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberian Conference on Pattern Recognition and Image Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Coimbra","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibpria2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ibpria.org\/2025\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}