{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:22:22Z","timestamp":1776082942635,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319951881","type":"print"},{"value":"9783319951898","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95189-8_7","type":"book-chapter","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T15:48:33Z","timestamp":1531496913000},"page":"68-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control"],"prefix":"10.1007","author":[{"given":"A.","family":"Collen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N. A.","family":"Nijdam","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Augusto-Gonzalez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. K.","family":"Katsikas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K. M.","family":"Giannoutakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G.","family":"Spathoulas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"E.","family":"Gelenbe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K.","family":"Votis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D.","family":"Tzovaras","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Ghavami","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Volkamer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Haller","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"S\u00e1nchez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Dimas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,7,14]]},"reference":[{"key":"7_CR1","unstructured":"Chandrasekar, K., Cleary, G., Cox, O., Lau, H., Nahorney, B., Gorman, B.O., O\u2019Brien, D., Wallace, S., Wood, P., Wueest, C.: ISTR April 2017. Internet Security Threat Report - Symantec 22(April), 77 (2017)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Nurse, J.R., Creese, S., Goldsmith, M., Lamberts, K.: Guidelines for usable cybersecurity: past and present. In: Proceedings of the 2011 3rd International Workshop on Cyberspace Safety and Security, CSS 2011, pp. 21\u201326 (2011)","DOI":"10.1109\/CSS.2011.6058566"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Realpe, P.C., Collazos, C.A., Hurtado, J., Granollers, A.: Towards an integration of usability and security for user authentication. In: Proceedings of the XVI International Conference on Human Computer Interaction, p. 43. ACM (2015)","DOI":"10.1145\/2829875.2829912"},{"issue":"11","key":"7_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/2629487","volume":"57","author":"T August","year":"2014","unstructured":"August, T., August, R., Shin, H.: Designing user incentives for cybersecurity. Commun. ACM 57(11), 43\u201346 (2014)","journal-title":"Commun. ACM"},{"key":"7_CR5","unstructured":"Roesch, M.: Snort: lightweight intrusion detection for networks. In: 13th Systems Administration Conference on LISA 1999, pp. 229\u2013238 (1999)"},{"key":"7_CR6","unstructured":"(OISF), Open Information Security Foundation: Suricata. https:\/\/suricata-ids.org\/"},{"issue":"23\u201324","key":"7_CR7","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23\u201324), 2435\u20132463 (1999)","journal-title":"Comput. Netw."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Marchal, S., Jiang, X., State, R., Engel, T.: A big data architecture for large scale security monitoring. In: Proceedings of the 2014 IEEE International Congress on Big Data, BigDataCongress 2014, pp. 56\u201363 (2014)","DOI":"10.1109\/BigData.Congress.2014.18"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Koike, H., Ohno, K., Koizumi, K.: Visualizing cyber attacks using IP matrix. In: 2005 Proceedings of the IEEE Workshop on Visualization for Computer Security, VizSEC 2005, pp. 91\u201398 (2005)","DOI":"10.1109\/VIZSEC.2005.1532070"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Xie, P., Li, J.H., Ou, X., Liu, P., Levy, R.: Using Bayesian networks for cyber security analysis. In: 2010 IEEE\/IFIP International Conference on Dependable Systems and Networks DSN, pp. 211\u2013220 (2010)","DOI":"10.1109\/DSN.2010.5544924"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Jibao, L., Huiqiang, W., Liang, Z.: Study of network security situation awareness model based on simple additive weight and grey theory. In: 2006 International Conference on Computational Intelligence and Security, vol. 2, pp. 1545\u20131548 (2006)","DOI":"10.1109\/ICCIAS.2006.295320"},{"key":"7_CR12","unstructured":"Jakobson, G.: Mission cyber security situation assessment using impact dependency graphs. In: 14th International Conference on Information Fusion, pp. 1\u20138, July 2011"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s11277-017-4434-6","volume":"95","author":"S Tweneboah-Koduah","year":"2017","unstructured":"Tweneboah-Koduah, S., Skouby, K.E., Tadayoni, R.: Cyber security threats to IoT applications and service domains. Wirel. Pers. Commun. 95(1), 169\u2013185 (2017)","journal-title":"Wirel. Pers. Commun."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Pamukov, M.E.: Application of artificial immune systems for the creation of IoT intrusion detection systems. In: 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 564\u2013568. IEEE, September 2017","DOI":"10.1109\/IDAACS.2017.8095144"},{"key":"7_CR15","unstructured":"Chen, C.Y., Hasan, M., Mohan, S.: Securing real-time internet-of-things. arXiv preprint arXiv:1705.08489 , 1\u201310, May 2017"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Zegzhda, P.: Safe integration of SIEM systems with internet of things: data aggregation, integrity control, and bioinspired safe routing. In: Proceedings of the 9th International Conference on Security of Information and Networks, SIN 2016, pp. 81\u201387 (2016)","DOI":"10.1145\/2947626.2947639"},{"issue":"3","key":"7_CR17","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info7030044","volume":"7","author":"H Lin","year":"2016","unstructured":"Lin, H., Bergmann, N.W.: IoT privacy and security challenges for smart home environments. Information 7(3), 44 (2016)","journal-title":"Information"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Pacheco, J., Hariri, S.: IoT security framework for smart cyber infrastructures. In: 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp. 242\u2013247. IEEE, September 2017","DOI":"10.1109\/FAS-W.2016.58"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Park, Y., Daftari, S., Inamdar, P., Salavi, S., Savanand, A., Kim, Y.: IoTGuard: scalable and agile safeguards for internet of things. In: Proceedings of the IEEE Military Communications Conference MILCOM, pp. 61\u201366 (2016)","DOI":"10.1109\/MILCOM.2016.7795302"},{"key":"7_CR20","unstructured":"F-Secure: F-secure sense router. https:\/\/www.f-secure.com\/en\/web\/home_global\/sense"},{"key":"7_CR21","unstructured":"Luma Home Inc. https:\/\/lumahome.com\/"},{"key":"7_CR22","unstructured":"BullGuard: Dojo by bullguard. https:\/\/dojo.bullguard.com\/"},{"key":"7_CR23","unstructured":"CUJO: Cujo llc. https:\/\/www.getcujo.com\/"},{"key":"7_CR24","unstructured":"Bitdefender BOX 2. https:\/\/www.bitdefender.com\/box\/"},{"key":"7_CR25","unstructured":"Norton Core\u2122: Symantec corporation. https:\/\/us.norton.com\/core"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained-node networks. Technical report, Internet Engineering Task Force (IETF), May 2014","DOI":"10.17487\/rfc7228"},{"issue":"4","key":"7_CR27","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1504\/IJCAET.2014.065419","volume":"6","author":"S Mittal","year":"2014","unstructured":"Mittal, S.: A survey of techniques for improving energy efficiency in embedded computing systems. Int. J. Comput. Aided Eng. Technol. 6(4), 440 (2014)","journal-title":"Int. J. Comput. Aided Eng. Technol."},{"issue":"5","key":"7_CR28","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/JIOT.2015.2419740","volume":"2","author":"Z Sheng","year":"2015","unstructured":"Sheng, Z., Wang, H., Yin, C., Hu, X., Yang, S., Leung, V.C.M.: Lightweight management of resource-constrained sensor devices in internet of things. IEEE Internet Things J. 2(5), 402\u2013411 (2015)","journal-title":"IEEE Internet Things J."},{"key":"7_CR29","doi-asserted-by":"publisher","first-page":"16393","DOI":"10.1109\/ACCESS.2017.2742020","volume":"5","author":"H Wang","year":"2017","unstructured":"Wang, H., Xiong, D., Wang, P., Liu, Y.: A lightweight XMPP publish\/subscribe scheme for resource-constrained IoT devices. IEEE Access 5, 16393\u201316405 (2017)","journal-title":"IEEE Access"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Sethi, M., Kortoci, P., Di Francesco, M., Aura, T.: Secure and low-power authentication for resource-constrained devices. In: 2015 5th International Conference on the Internet of Things (IOT), pp. 30\u201336. IEEE, October 2015","DOI":"10.1109\/IOT.2015.7356545"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Porambage, P., Braeken, A., Gurtov, A., Ylianttila, M., Spinsante, S.: Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 711\u2013714. IEEE, December 2015","DOI":"10.1109\/WF-IoT.2015.7389141"},{"key":"7_CR32","unstructured":"Barnard-Wills, D., Marinos, L., Portesi, S.: Threat landscape and good practice guide for smart home and converged media. Technical report, ENISA (2014)"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Kouzinopoulos, C.S., Spathoulas, G., Giannoutakis, K.M., Votis, K., Pandey, P., Tzovaras, D., Katsikas, S.K., Collen, A., Nijdam, N.A.: Using blockchains to strengthen the security of internet of things. In: Gelenbe, E., Campegiani, P., Czachorski, T., Katsikas, S., Komnios, I., Romano, L., Tzovaras, D. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 90\u2013100. Springer, Cham (2018)","DOI":"10.1007\/978-3-319-95189-8_9"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Kadioglu, Y.M. : Energy life-time of wireless nodes with network attacks and mitigation. In: ICC 2018 Workshops. IEEE (2018)","DOI":"10.1109\/ICCW.2018.8403561"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Brun, O., Yin, Y., Gelenbe, E., Murat Kadioglu, Y., Augusto-Gonzalez, J., Ramos, M.: Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In: Gelenbe, E., Campegiani, P., Czachorski, T., Katsikas, S., Komnios, I., Romano, L., Tzovaras, D. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 79\u201389. Springer, Cham (2018)","DOI":"10.1007\/978-3-319-95189-8_8"}],"container-title":["Communications in Computer and Information Science","Security in Computer and Information Sciences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95189-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T19:53:18Z","timestamp":1751745198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95189-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951881","9783319951898"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95189-8_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}