{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:15:01Z","timestamp":1750997701216,"version":"3.41.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685410"},{"type":"electronic","value":"9783319685427"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68542-7_71","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T15:23:50Z","timestamp":1509549830000},"page":"805-815","source":"Crossref","is-referenced-by-count":2,"title":["Dynamically-Enabled Defense Effectiveness Evaluation in Home Internet Based on Vulnerability Analysis"],"prefix":"10.1007","author":[{"given":"Ting","family":"Wang","sequence":"first","affiliation":[]},{"given":"Min","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Jingjie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shiqi","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"issue":"2","key":"71_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2016.2631520","volume":"4","author":"Y Yang","year":"2016","unstructured":"Yang, Y., et al.: General theory of security and a study case in internet of things. IEEE Internet Things J. 4(2), 1 (2016)","journal-title":"IEEE Internet Things J."},{"key":"71_CR2","unstructured":"Verma, H., Jain, M., Goel, K., Virkram, A., Verma, G.: Smart home system based on Internet of Things. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2073\u20132075. IEEE, 31 October 2016"},{"issue":"4","key":"71_CR3","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1109\/TDSC.2011.18","volume":"8","author":"B Salamat","year":"2011","unstructured":"Salamat, B., Jackson, T., Wagner, G., et al.: Runtime defense against code injection attacks using replicated execution. IEEE Trans. Dependable Secure Comput. 8(4), 588\u2013601 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"71_CR4","volume-title":"Dynamially-Enabled Cyberspace Defense","author":"Y Lin","year":"2016","unstructured":"Lin, Y., Quan, Y.: Dynamially-Enabled Cyberspace Defense, 1st edn. The People\u2019s Posts and Telecommunications Press (Posts & Telecom Press), Beijing (2016). pp. 214\u2013215","edition":"1"},{"key":"71_CR5","doi-asserted-by":"crossref","unstructured":"Liu, Y., Hu, S., Ho, T.-Y.: Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. In: Computer-Aided Design (ICCAD), pp. 183-190. IEEE, 08 January 2015","DOI":"10.1109\/ICCAD.2014.7001350"},{"issue":"2","key":"71_CR6","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MC.2011.259","volume":"45","author":"N Antunes","year":"2011","unstructured":"Antunes, N., Vieira, M.: Defending against Web Application Vulnerabilities. Computer 45(2), 66\u201372 (2011)","journal-title":"Computer"},{"key":"71_CR7","unstructured":"Liu, Q., Zhang, Y., Zhang, Y., et al.: Research on key technologies of security vulnerability classification. J. Commun. (s1), 79\u201387 (2012)"},{"key":"71_CR8","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: a quantitative analysis. In: 2004 20th Annual Computer Security Applications Conference. IEEE, pp. 252\u2013261 (2005)","DOI":"10.1109\/CSAC.2004.50"},{"key":"71_CR9","doi-asserted-by":"crossref","unstructured":"Li, X., Chang, X., John, A.B., et al.: A novel approach for software vulnerability classification. In: 2017 Annual Reliability and Maintainability Symposium (RAMS), pp. 1\u20137. IEEE, 30 March 2017","DOI":"10.1109\/RAM.2017.7889792"},{"key":"71_CR10","doi-asserted-by":"crossref","unstructured":"Jin, S., Wang, Y., Cui, X., et al.: A review of classification method for network vulnerability. In: IEEE International Conference on System, Man and Cybernetics (SMC), pp. 1171\u20131175. IEEE, 04 December 2009","DOI":"10.1109\/ICSMC.2009.5345951"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68542-7_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T20:44:45Z","timestamp":1750970685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68542-7_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685410","9783319685427"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68542-7_71","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}