{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:58:03Z","timestamp":1726001883793},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811313271"},{"type":"electronic","value":"9789811313288"}],"license":[{"start":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T00:00:00Z","timestamp":1543449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1328-8_102","type":"book-chapter","created":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T15:12:12Z","timestamp":1543417932000},"page":"787-792","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Study on the Security Performance Improvement in BoT Perspective in Order to Overcome Security Weaknesses of IoT Devices"],"prefix":"10.1007","author":[{"given":"Seong-kyu","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jun-Ho","family":"Huh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,29]]},"reference":[{"key":"102_CR1","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"Minhaj Ahmad Khan","year":"2018","unstructured":"Khan MA, Salah K (2017) IoT security: review, blockchain solutions, and open challenges. Future Gener Comput Syst 82:343\u2013365","journal-title":"Future Generation Computer Systems"},{"doi-asserted-by":"crossref","unstructured":"da Cruz MAA, Rodrigues JJPC, Sangaiah AK, Al-Muhtadi J, Korotaev V (2018) Performance evaluation of IoT middleware. J Netw Comput Appl 109:267\u2013290","key":"102_CR2","DOI":"10.1016\/j.jnca.2018.02.013"},{"doi-asserted-by":"crossref","unstructured":"Afzal B, Umair M, Shah GA, Ahmed E (2017) Enabling IoT platforms for social IoT applications: vision, feature mapping, and challenges. Future Gener Comput Syst 356\u2013376","key":"102_CR3","DOI":"10.1016\/j.future.2017.12.002"},{"key":"102_CR4","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2017.09.002","volume":"68","author":"I Farris","year":"2017","unstructured":"Farris I, Orsino A, Militano L, Iera A, Araniti G (2017) Federated IoT services leveraging 5G technologies at the edge. Ad Hoc Netw 68:58\u201369","journal-title":"Ad Hoc Netw"},{"key":"102_CR5","first-page":"8","volume":"38","author":"M Ammar","year":"2017","unstructured":"Ammar M, Russello G, Crispo B (2017) Internet of Things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8\u201327","journal-title":"J Inf Secur Appl"},{"doi-asserted-by":"crossref","unstructured":"Akatyev N, James JI (2017) Evidence identification in IoT networks based on threat assessment. Future Gener Comput Syst 83\u201390","key":"102_CR6","DOI":"10.1016\/j.future.2017.10.012"},{"key":"102_CR7","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1016\/j.future.2017.08.058","volume":"79","author":"S Muralidharan","year":"2018","unstructured":"Muralidharan S, Roy A, Saxena N (2018) MDP-IoT: MDP based interest forwarding for heterogeneous traffic in IoT-NDN environment. Future Gener Comput Syst 79:892\u2013908","journal-title":"Future Gener Comput Syst"},{"key":"102_CR8","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.future.2017.11.021","volume":"82","author":"N Nesa","year":"2017","unstructured":"Nesa N, Ghosh T, Banerjee I (2017) Non-parametric sequence-based learning approach for outlier detection in IoT. Future Gener Comput Syst 82:412\u2013421","journal-title":"Future Gener Comput Syst"},{"key":"102_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2017.10.004","volume":"39","author":"W Ying","year":"2018","unstructured":"Ying W, Jia S, Du W (2018) Digital enablement of blockchain: evidence from HNA group. Int J Inf Manag 39:1\u20134","journal-title":"Int J Inf Manag"},{"doi-asserted-by":"crossref","unstructured":"Chen Y (2018) Blockchain tokens and the potential democratization of entrepreneurship and innovation. Bus Horiz 10\u201316","key":"102_CR10","DOI":"10.1016\/j.bushor.2018.03.006"},{"doi-asserted-by":"crossref","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2018) A survey on the security of blockchain systems. Future Gener Comput Syst 80\u201389","key":"102_CR11","DOI":"10.1016\/j.future.2018.06.017"},{"doi-asserted-by":"crossref","unstructured":"Savelyev A (2017) Copyright in the blockchain era: promises and challenges. Comput Law Secur Rev 120\u2013126","key":"102_CR12","DOI":"10.2139\/ssrn.3075246"},{"doi-asserted-by":"crossref","unstructured":"\u00d6nder I, Treiblmaier H (2018) Blockchain and tourism: three research propositions. Ann Tour Res 234\u2013238","key":"102_CR13","DOI":"10.1016\/j.annals.2018.03.005"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1328-8_102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T05:52:41Z","timestamp":1573019561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1328-8_102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,29]]},"ISBN":["9789811313271","9789811313288"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1328-8_102","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2018,11,29]]},"assertion":[{"value":"MUE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia and Ubiquitous Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salerno","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mue2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mue-conference.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}