{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:12:28Z","timestamp":1725732748448},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389979"},{"type":"electronic","value":"9783642389986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38998-6_4","type":"book-chapter","created":{"date-parts":[[2013,6,19]],"date-time":"2013-06-19T21:24:39Z","timestamp":1371677079000},"page":"37-40","source":"Crossref","is-referenced-by-count":4,"title":["Monitoring and Security for the Internet of Things"],"prefix":"10.1007","author":[{"given":"Anth\u00e9a","family":"Mayzaud","sequence":"first","affiliation":[]},{"given":"R\u00e9mi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Request for Comments 6550 (Proposed Standard). IETF (2012)"},{"key":"4_CR2","unstructured":"Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A.: Security Framework for Routing over Low power and Lossy Networks, IETF Requirement Draft for Routing over Low power and Lossy Networks (ROLL) (2012) (work in progress)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Gaddour, O., Koub\u00e2a, A.: RPL in a Nutshell: a Survey. Elsevier Journal Computer Networks (2012)","DOI":"10.1016\/j.comnet.2012.06.016"},{"key":"4_CR4","unstructured":"Boumessouer, M., Chrisment, I., Frikha, M.: Analysis of Vulnerabilities and Attacks in the RPL Routing Protocol, in French, Master Thesis Report, Supcom Engineering School (July 2012)"},{"key":"4_CR5","unstructured":"NIST: An Introduction to Computer Security: The NIST Handbook (1995)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-13986-4_11","volume-title":"Mechanisms for Autonomous Management of Networks and Services","author":"O. Dabbebi","year":"2010","unstructured":"Dabbebi, O., Badonnel, R., Festor, O.: Managing Risks at Runtime in VoIP Networks and Services. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol.\u00a06155, pp. 89\u201392. Springer, Heidelberg (2010)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Bedford, T., Cooke, R.: Probabilistic Risk Analysis: Foundations and Methods. Cambridge University Press (2001)","DOI":"10.1017\/CBO9780511813597"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-540-30143-1_16","volume-title":"Recent Advances in Intrusion Detection","author":"A. Gehani","year":"2004","unstructured":"Gehani, A., Kedem, G.: RheoStat: Real-Time Risk Management. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 296\u2013314. Springer, Heidelberg (2004)"},{"key":"4_CR9","volume-title":"Proc. of the 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010","author":"W. Xie","year":"2010","unstructured":"Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., Durresi, A.: Routing Loops in DAG-Based Low Power and Lossy Networks. In: Proc. of the 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010. IEEE Computer Society, Washington (2010)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Bartolozzi, L., Pecorella, T., Fantacci, R.: ns-3 RPL Module: IPv6 Routing Protocol for Low Power and Lossy Networks. In: Proc. of the 5th International Conference on Simulation Tools and Techniques, SIMUTOOLS 2012 (2012)","DOI":"10.4108\/icst.simutools.2012.247718"}],"container-title":["Lecture Notes in Computer Science","Emerging Management Mechanisms for the Future Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38998-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T04:31:44Z","timestamp":1557808304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38998-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389979","9783642389986"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38998-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}