{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T23:17:26Z","timestamp":1761175046324,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032017987","type":"print"},{"value":"9783032017994","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01799-4_13","type":"book-chapter","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T08:04:21Z","timestamp":1761120261000},"page":"222-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IoTCat: A Multidimensional Approach to\u00a0Categorize IoT Devices in\u00a0Order to\u00a0Identify a\u00a0Delegate for\u00a0Cybersecurity Functions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9847-7656","authenticated-orcid":false,"given":"Emiliia","family":"Geloczi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0181-7648","authenticated-orcid":false,"given":"Nico","family":"Mexis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7256-0387","authenticated-orcid":false,"given":"Benedikt","family":"Holler","sequence":"additional","affiliation":[]},{"given":"Henrich C.","family":"P\u00f6hls","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3608-874X","authenticated-orcid":false,"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","unstructured":"Aksoy, A., Gunes, M.H.: Automated IoT device identification using network traffic. In: ICC 2019 - 2019 IEEE International Conference on Communications (ICC), pp. 1\u20137. IEEE, Shanghai, China (2019). https:\/\/doi.org\/10.1109\/ICC.2019.8761559","DOI":"10.1109\/ICC.2019.8761559"},{"key":"13_CR2","doi-asserted-by":"publisher","unstructured":"Ali, Z., Hussain, F., Ghazanfar, S., Husnain, M., Zahid, S., Shah, G.A.: A Generic Machine Learning Approach for IoT Device Identification. In: 2021 International Conference on Cyber Warfare and Security (ICCWS), pp. 118\u2013123. IEEE, Islamabad, Pakistan (Nov 2021). https:\/\/doi.org\/10.1109\/ICCWS53234.2021.9702983","DOI":"10.1109\/ICCWS53234.2021.9702983"},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"Bao, J., Hamdaoui, B., Wong, W.K.: iot device type identification using hybrid deep learning approach for increased IoT security. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 565\u2013570. IEEE, Limassol, Cyprus (2020). https:\/\/doi.org\/10.1109\/IWCMC48107.2020.9148110","DOI":"10.1109\/IWCMC48107.2020.9148110"},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., Ray, I., Ray, I.: Behavioral Fingerprinting of IoT Devices. In: Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, pp. 41\u201350. ACM, Toronto Canada (Jan 2018). https:\/\/doi.org\/10.1145\/3266444.3266452","DOI":"10.1145\/3266444.3266452"},{"key":"13_CR5","unstructured":"Brenner, R., Leith\u00e4user, M., J\u00e4nich, S., P\u00f6hls, H.C.: Updatef\u00e4higkeit als konstruktionsanforderung. Recht Digital (RDi), pp. 252 \u2013264 (2024). https:\/\/beck-online.beck.de\/Bcid\/Y-300-Z-RDI-B-2024-S-252-N-1"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Chen, Q., Song, Y., Jennings, B., Zhang, F., Xiao, B., Gao, S.: IoT-ID: robust IoT device identification based on feature drift adaptation. In: 2021 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE, Madrid, Spain (2021). https:\/\/doi.org\/10.1109\/GLOBECOM46510.2021.9685693","DOI":"10.1109\/GLOBECOM46510.2021.9685693"},{"issue":"1","key":"13_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s10922-022-09716-x","volume":"31","author":"RR Chowdhury","year":"2023","unstructured":"Chowdhury, R.R., Idris, A.C., Abas, P.E.: A deep learning approach for classifying network connected iot devices using communication traffic characteristics. J. Netw. Syst. Manag. 31(1), 26 (2023). https:\/\/doi.org\/10.1007\/s10922-022-09716-x","journal-title":"J. Netw. Syst. Manag."},{"key":"13_CR8","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-030-78459-1_11","volume-title":"Future Access Enablers for Ubiquitous and Intelligent Infrastructures","author":"O Dominik","year":"2021","unstructured":"Dominik, O., Miljenko, M., Marin, V.: Categorizing IoT services according to security risks. In: Perakovic, D., Knapcikova, L. (eds.) FABULOUS 2021. LNICSSITE, vol. 382, pp. 154\u2013166. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78459-1_11"},{"key":"13_CR9","unstructured":"European Commission: What constitutes the \u2018latest version of the firmware\u2019 under the regulation (eu) 2019\/424? (2025). https:\/\/energy-efficient-products.ec.europa.eu\/faqs-0\/what-constitutes-latest-version-firmware-under-regulation-eu-2019424_en"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Fan, L., et al.: An IoT Device Identification Method based on Semi-supervised Learning. In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1\u20137. IEEE, Izmir, Turkey (Nov 2020). https:\/\/doi.org\/10.23919\/CNSM50824.2020.9269044","DOI":"10.23919\/CNSM50824.2020.9269044"},{"issue":"5","key":"13_CR11","doi-asserted-by":"publisher","first-page":"202","DOI":"10.3390\/fi17050202","volume":"17","author":"E Geloczi","year":"2025","unstructured":"Geloczi, E., Klement, F., Struck, P., Katzenbeisser, S.: SoK: delegated Security in the Internet of Things. Future Internet 17(5), 202 (2025). https:\/\/doi.org\/10.3390\/fi17050202","journal-title":"Future Internet"},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"27","DOI":"10.4236\/ait.2011.12004","volume":"1","author":"M Gigli","year":"2011","unstructured":"Gigli, M., Koo, S.: Internet of Things: services and applications categorization. Adv. Internet of Things 1(2), 27\u201331 (2011). https:\/\/doi.org\/10.4236\/ait.2011.12004","journal-title":"Adv. Internet of Things"},{"issue":"21","key":"13_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4946","volume":"32","author":"B Gupta","year":"2020","unstructured":"Gupta, B., Quamara, M.: An overview of internet of things (iot): architectural aspects, challenges, and protocols. Concurrency Comput. Pract. Exper. 32(21), e4946 (2020). https:\/\/doi.org\/10.1002\/cpe.4946","journal-title":"Concurrency Comput. Pract. Exper."},{"issue":"6","key":"13_CR14","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.3390\/s21062093","volume":"21","author":"S Hadzovic","year":"2021","unstructured":"Hadzovic, S., Mrdovic, S., Radonjic, M.: Identification of IoT Actors. Sensors 21(6), 2093 (2021). https:\/\/doi.org\/10.3390\/s21062093","journal-title":"Sensors"},{"key":"13_CR15","doi-asserted-by":"publisher","unstructured":"Hamad, S.A., Zhang, W.E., Sheng, Q.Z., Nepal, S.: IoT device identification via network-flow based fingerprinting and learning. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing and Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 103\u2013111. IEEE, Rotorua, New Zealand (2019). https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2019.00023","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00023"},{"key":"13_CR16","unstructured":"Institute of Electrical and Electronics Engineers: IEEE 802.11, The Working Group Setting the Standards for Wireless LANs (2023). https:\/\/www.ieee802.org\/11\/"},{"key":"13_CR17","doi-asserted-by":"publisher","unstructured":"Khalil, U., Ahmad, A., Abdel-Aty, A.H., Elhoseny, M., El-Soud, M.W.A., Zeshan, F.: Identification of trusted IoT devices for secure delegation. Comput. Electr. Eng. 90, 106988 (2021). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.106988","DOI":"10.1016\/j.compeleceng.2021.106988"},{"issue":"7","key":"13_CR18","doi-asserted-by":"publisher","first-page":"9113","DOI":"10.1007\/s12652-022-04415-6","volume":"14","author":"J Kotak","year":"2023","unstructured":"Kotak, J., Elovici, Y.: IoT device identification based on network communication analysis using deep learning. J. Ambient. Intell. Humaniz. Comput. 14(7), 9113\u20139129 (2023). https:\/\/doi.org\/10.1007\/s12652-022-04415-6","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"Le, F., Ortiz, J., Verma, D., Kandlur, D.: Policy-Based Identification of IoT Devices\u2019 Vendor and Type by DNS Traffic Analysis, pp. 180\u2013201. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17277-0_10","DOI":"10.1007\/978-3-030-17277-0_10"},{"key":"13_CR20","doi-asserted-by":"publisher","unstructured":"Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE, Kansas City, MO (2018). https:\/\/doi.org\/10.1109\/ICC.2018.8422484","DOI":"10.1109\/ICC.2018.8422484"},{"issue":"23","key":"13_CR21","doi-asserted-by":"publisher","first-page":"17227","DOI":"10.1109\/JIOT.2021.3078407","volume":"8","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Class-incremental learning for wireless device identification in IoT. IEEE Internet Things J. 8(23), 17227\u201317235 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3078407","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"13_CR22","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1109\/JIOT.2020.3018677","volume":"8","author":"Y Liu","year":"2021","unstructured":"Liu, Y., et al.: Zero-bias deep learning for accurate identification of internet of things (IoT) devices. IEEE Internet Things J. 8(4), 2627\u20132634 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3018677","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"13_CR23","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/JSAC.2019.2904364","volume":"37","author":"S Marchal","year":"2019","unstructured":"Marchal, S., Miettinen, M., Nguyen, T.D., Sadeghi, A.R., Asokan, N.: AuDI: toward autonomous IoT device-type identification using periodic communication. IEEE J. Sel. Areas Commun. 37(6), 1402\u20131412 (2019). https:\/\/doi.org\/10.1109\/JSAC.2019.2904364","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"13_CR24","doi-asserted-by":"publisher","unstructured":"Meidan, Y., et al.: ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing, SAC 2017, pp. 506\u2013509. Association for Computing Machinery, New York, USA (Apr 2017). https:\/\/doi.org\/10.1145\/3019612.3019878","DOI":"10.1145\/3019612.3019878"},{"issue":"3","key":"13_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3458824","volume":"17","author":"N Mexis","year":"2021","unstructured":"Mexis, N., Anagnostopoulos, N.A., Chen, S., Bambach, J., Arul, T., Katzenbeisser, S.: A lightweight architecture for hardware-based security in the emerging era of systems of systems. ACM JETC 17(3), 1\u201325 (2021). https:\/\/doi.org\/10.1145\/3458824","journal-title":"ACM JETC"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.R., Tarkoma, S.: IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177\u20132184. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.283"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"M\u00f6ssinger, M., Petschkuhn, B., Bauer, J., Staudemeyer, R.C., W\u00f3jcik, M., P\u00f6hls, H.C.: Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device. In: Proc. of The 5th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2016). IEEE (July 2016). https:\/\/doi.org\/10.1109\/WoWMoM.2016.7523559, http:\/\/henrich.poehls.com\/papers\/2016_Moessinger_et_al-Towards_quantifying_the_cost_of_a_secure_IoT.pdf","DOI":"10.1109\/WoWMoM.2016.7523559"},{"issue":"3","key":"13_CR28","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1214\/aoms\/1177704472","volume":"33","author":"E Parzen","year":"1962","unstructured":"Parzen, E.: On estimation of a probability density function and mode. Ann. Math. Stat. 33(3), 1065\u20131076 (1962)","journal-title":"Ann. Math. Stat."},{"key":"13_CR29","doi-asserted-by":"publisher","unstructured":"Pereira, F., Correia, R., Pinho, P., Lopes, S.I., Carvalho, N.B.: Challenges in resource-constrained iot devices: energy and communication as critical success factors for future iot deployment. Sensors 20(22) (2020). https:\/\/doi.org\/10.3390\/s20226420","DOI":"10.3390\/s20226420"},{"issue":"3","key":"13_CR30","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1214\/aoms\/1177728190","volume":"27","author":"M Rosenblatt","year":"1956","unstructured":"Rosenblatt, M.: Remarks on some nonparametric estimates of a density function. Ann. Math. Stat. 27(3), 832\u2013837 (1956). https:\/\/doi.org\/10.1214\/aoms\/1177728190","journal-title":"Ann. Math. Stat."},{"key":"13_CR31","doi-asserted-by":"publisher","unstructured":"Salman, O., Elhajj, I.H., Chehab, A., Kayssi, A.: A machine learning based framework for IoT device identification and abnormal traffic detection. Trans. Emerging Telecommun. Technol. 33(3), e3743 (2022). https:\/\/doi.org\/10.1002\/ett.3743, e3743 ETT-19-0273.R1","DOI":"10.1002\/ett.3743"},{"key":"13_CR32","doi-asserted-by":"publisher","unstructured":"Sawadogo, F., Violos, J., Hameed, A., Leivadeas, A.: An unsupervised machine learning approach for IoT device categorization. In: 2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), pp. 25\u201330. IEEE, Athens, Greece (Sep 2022). https:\/\/doi.org\/10.1109\/MeditCom55741.2022.9928766","DOI":"10.1109\/MeditCom55741.2022.9928766"},{"key":"13_CR33","doi-asserted-by":"publisher","unstructured":"Scheidt, N., Adda, M.: Identification of IoT devices for forensic investigation. In: 2020 IEEE 10th International Conference on Intelligent Systems (IS), pp. 165\u2013170. IEEE, Varna, Bulgaria (2020). https:\/\/doi.org\/10.1109\/IS48319.2020.9200150","DOI":"10.1109\/IS48319.2020.9200150"},{"key":"13_CR34","unstructured":"Shostack, A.: Experiences Threat Modeling at Microsoft. In: MODSECMoDELS (2008). https:\/\/api.semanticscholar.org\/CorpusID:2508643"},{"key":"13_CR35","volume-title":"Density Estimation for Statistics and Data Analysis","author":"BW Silverman","year":"1986","unstructured":"Silverman, B.W.: Density Estimation for Statistics and Data Analysis. CRC Press, London (1986)"},{"key":"13_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-91859-0_8","volume-title":"Security and Trust Management","author":"K Spielvogel","year":"2021","unstructured":"Spielvogel, K., P\u00f6hls, H.C., Posegga, J.: TLS beyond the\u00a0broker: enforcing fine-grained security and\u00a0trust in\u00a0publish\/subscribe environments for\u00a0IoT. In: Roman, R., Zhou, J. (eds.) STM 2021. LNCS, vol. 13075, pp. 145\u2013162. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91859-0_8"},{"key":"13_CR37","unstructured":"Tasmota Community: Tasmota Documentation (2025). https:\/\/tasmota.github.io\/docs\/, Accessed 3 April 2025"},{"key":"13_CR38","doi-asserted-by":"publisher","unstructured":"Thom, N., Thom, J., Charyyev, B., Hand, E., Sengupta, S.: FlexHash - hybrid locality sensitive hashing for IoT device identification. In: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), pp. 368\u2013371. IEEE, Las Vegas, NV, USA (Jan 2024). https:\/\/doi.org\/10.1109\/CCNC51664.2024.10454657","DOI":"10.1109\/CCNC51664.2024.10454657"},{"key":"13_CR39","doi-asserted-by":"publisher","unstructured":"Tragos, E., et al.: Trusted IoT in the complex landscape of governance, security, privacy, availability and safety, p.\u00a030. River Publishers (2016). https:\/\/doi.org\/10.1201\/9781003337966-6","DOI":"10.1201\/9781003337966-6"},{"key":"13_CR40","unstructured":"Vailshery, L.S.: Number of IoT connected devices worldwide 2019-2023, with forecasts to 2030 (2023). https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/"},{"key":"13_CR41","doi-asserted-by":"publisher","unstructured":"Wang, B., Li, M., Jin, X., Guo, C.: A reliable IoT edge computing trust management mechanism for smart cities. IEEE Access 8, 46373\u201346399 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2979022","DOI":"10.1109\/ACCESS.2020.2979022"},{"key":"13_CR42","doi-asserted-by":"publisher","unstructured":"Wang, B., Kang, H., Sun, G., Li, J.: Efficient traffic-based IoT device identification using a feature selection approach with L\u00e9vy flight-based sine chaotic sub-swarm binary honey badger algorithm. Appli. Soft Comput. 155, 111455 (2024). https:\/\/doi.org\/10.1016\/j.asoc.2024.111455","DOI":"10.1016\/j.asoc.2024.111455"},{"key":"13_CR43","doi-asserted-by":"publisher","unstructured":"Yin, F., Yang, L., Wang, Y., Dai, J.: IoT ETEI: end-to-End IoT Device Identification Method. In: 2021 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138. IEEE, Aizuwakamatsu, Fukushima, Japan (Jan 2021). https:\/\/doi.org\/10.1109\/DSC49826.2021.9346251","DOI":"10.1109\/DSC49826.2021.9346251"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01799-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T08:04:29Z","timestamp":1761120269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01799-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"ISBN":["9783032017987","9783032017994"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01799-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"23 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}