{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T20:25:27Z","timestamp":1774124727640,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":57,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811680588","type":"print"},{"value":"9789811680595","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_9","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"128-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0701-6761","authenticated-orcid":false,"given":"Rao Faizan","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7157-3020","authenticated-orcid":false,"given":"Amgad","family":"Muneer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2496-1311","authenticated-orcid":false,"given":"P. D. D.","family":"Dominic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6598-3536","authenticated-orcid":false,"given":"Shakirah Mohd","family":"Taib","sequence":"additional","affiliation":[]},{"given":"Ebrahim A. A.","family":"Ghaleb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"9_CR1","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton, K.: That \u2018internet of things\u2019 thing. RFID J. 22, 97\u2013114 (2009)","journal-title":"RFID J."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Alqourabah, H., Muneer, A., Fati, S.M.: A smart fire detection system using IoT technology with automatic water sprinkler. Int. J. Electr. Comput. Eng. 11, 2994\u20133002 (2021)","DOI":"10.11591\/ijece.v11i4.pp2994-3002"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Shahzad, K., Shareef, K., Ali, R.F., Nawab, R.M.A., Abid, A.: Generating process model collection with diverse label and structural features. In: 2016 Sixth International Conference on Innovative Computing Technology (INTECH), pp. 644\u2013649. IEEE (2016)","DOI":"10.1109\/INTECH.2016.7845083"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Chong, G., Zhihao, L., Yifeng, Y.: The research and implement of smart home system based on internet of things. In: 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 2944\u20132947. IEEE (2011)","DOI":"10.1109\/ICECC.2011.6066672"},{"key":"9_CR5","unstructured":"Zhang, C., Green, R.: Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In: Proceedings of the 18th Symposium on Communications & Networking, pp. 8\u201315 (2015)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, Z.-K., Cho, M.C.Y., Wang, C.-W., Hsu, C.-W., Chen, C.-K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230\u2013234. IEEE (2014)","DOI":"10.1109\/SOCA.2014.58"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663\u2013667. IEEE (2013)","DOI":"10.1109\/CIS.2013.145"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"317","DOI":"10.12928\/telkomnika.v18i1.12434","volume":"18","author":"A Muneer","year":"2020","unstructured":"Muneer, A., Fati, S.M., Fuddah, S.: Smart health monitoring system using IoT based smart fitness mirror. Telkomnika 18, 317\u2013331 (2020)","journal-title":"Telkomnika"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"560","DOI":"10.3390\/sym13040560","volume":"13","author":"S Naseer","year":"2021","unstructured":"Naseer, S., Ali, R.F., Muneer, A., Fati, S.M.: IAmideV-deep: valine amidation site prediction in proteins using deep learning and pseudo amino acid compositions. Symmetry (Basel) 13, 560 (2021)","journal-title":"Symmetry (Basel)"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"73624","DOI":"10.1109\/ACCESS.2021.3080041","volume":"9","author":"S Naseer","year":"2021","unstructured":"Naseer, S., Ali, R.F., Fati, S.M., Muneer, A.: iNitroY-deep: computational identification of nitrotyrosine sites to supplement carcinogenesis studies using deep learning. IEEE Access 9, 73624\u201373640 (2021)","journal-title":"IEEE Access"},{"key":"9_CR11","first-page":"232","volume":"10","author":"F Alshohoumi","year":"2019","unstructured":"Alshohoumi, F., Sarrab, M., AlHamadani, A., Al-Abri, D.: Systematic review of existing IoT architectures security and privacy issues and concerns. Int. J. Adv. Comput. Sci. Appl. 10, 232\u2013251 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Fati, S.M., Muneer, A., Mungur, D., Badawi, A.: Integrated health monitoring system using GSM and IoT. In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/ICSCEE.2018.8538366"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"104","DOI":"10.4018\/JITR.2019070107","volume":"12","author":"A Muneer","year":"2019","unstructured":"Muneer, A., Fati, S.M.: Automated health monitoring system using advanced technology. J. Inf. Technol. Res. 12, 104\u2013132 (2019)","journal-title":"J. Inf. Technol. Res."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Qadri, I., Muneer, A., Fati, S.M.: Automatic robotic scanning and inspection mechanism for mines using IoT. In: IOP Conference Series: Materials Science and Engineering, p. 12001. IOP Publishing (2021)","DOI":"10.1088\/1757-899X\/1045\/1\/012001"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCC.2016.63","volume":"3","author":"D Puthal","year":"2016","unstructured":"Puthal, D., Nepal, S., Ranjan, R., Chen, J.: Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Comput. 3, 64\u201371 (2016)","journal-title":"IEEE Cloud Comput."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Rughoobur, P., Nagowah, L.: A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. In: 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), pp. 811\u2013817. IEEE (2017)","DOI":"10.1109\/ICTUS.2017.8286118"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.future.2018.03.007","volume":"85","author":"H HaddadPajouh","year":"2018","unstructured":"HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.-K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Futur. Gener. Comput. Syst. 85, 88\u201396 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 32\u201337. IEEE (2017)","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi, A.D., Srivastava, G., Dhar, S., Singh, R.: A decentralized privacy-preserving healthcare blockchain for IoT. Sensors. 19, 326 (2019)","journal-title":"Sensors."},{"key":"9_CR20","unstructured":"Alessandro, S., Felix, G., Mauro, C., Jens-Matthias, B.: Raspberry Pi IDS: a fruitful intrusion detection system for IoT. In: 2017 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016), pp. 1\u20139 (2016)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Thirumalai, C., Kar, H.: Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices. In: 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/IPACT.2017.8244948"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Pham, C., Lim, Y., Tan, Y.: Management architecture for heterogeneous IoT devices in home network. In: 2016 IEEE 5th Global Conference on Consumer Electronics, pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/GCCE.2016.7800448"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Ham, H.-S., Kim, H.-H., Kim, M.-S., Choi, M.-J.: Linear SVM-based android malware detection for reliable IoT services. J. Appl. Math. 2014, 10p. (2014)","DOI":"10.1155\/2014\/594501"},{"key":"9_CR24","unstructured":"Sharma, V., Kim, J., Kwon, S., You, I., Lee, K., Yim, K.: A framework for mitigating zero-day attacks in IoT. arXiv Prepr. arXiv:1804.05549 (2018)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Siby, S., Maiti, R.R., Tippenhauer, N.O.: IoTScanner: detecting privacy threats in IoT neighborhoods. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 23\u201330 (2017)","DOI":"10.1145\/3055245.3055253"},{"key":"9_CR26","first-page":"382","volume":"7","author":"R Rizal","year":"2018","unstructured":"Rizal, R., Riadi, I., Prayudi, Y.: Network forensics for detecting flooding attack on internet of things (IoT) device. Int. J. Cyber-Secur. Digit. Forensics 7, 382\u2013390 (2018)","journal-title":"Int. J. Cyber-Secur. Digit. Forensics"},{"key":"9_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-030-16458-4_2","volume-title":"Codes, Cryptology and Information Security","author":"S Takarabt","year":"2019","unstructured":"Takarabt, S., et al.: Cache-timing attacks still threaten IoT devices. In: Carlet, C., Guilley, S., Nitaj, A., Souidi, E. (eds.) C2SI 2019. LNCS, vol. 11445, pp. 13\u201330. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16458-4_2"},{"key":"9_CR28","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-95189-8_8","volume-title":"Security in Computer and Information Sciences","author":"O Brun","year":"2018","unstructured":"Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y.M., Augusto-Gonzalez, J., Ramos, M.: Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. Communications in Computer and Information Science, vol. 821, pp. 79\u201389. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95189-8_8"},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore, S., Park, J.H.: Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 72, 79\u201389 (2018)","journal-title":"Appl. Soft Comput."},{"key":"9_CR30","doi-asserted-by":"publisher","first-page":"3383","DOI":"10.3390\/app11083383","volume":"11","author":"RF Ali","year":"2021","unstructured":"Ali, R.F., Dominic, P.D.D., Ali, S.E.A., Rehman, M., Sohail, A.: Information security behavior and information security policy compliance: a systematic literature review for identifying the transformation process from noncompliance to compliance. Appl. Sci. 11, 3383 (2021)","journal-title":"Appl. Sci."},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"2800","DOI":"10.3390\/su13052800","volume":"13","author":"K Dong","year":"2021","unstructured":"Dong, K., Ali, R.F., Dominic, P.D.D., Ali, S.E.A.: The effect of organizational information security climate on information security policy compliance: the mediating effect of social bonding towards healthcare nurses. Sustainability 13, 2800 (2021)","journal-title":"Sustainability"},{"key":"9_CR32","first-page":"205","volume":"9","author":"Y Li","year":"2015","unstructured":"Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. Int. J. Secur. Its Appl. 9, 205\u2013216 (2015)","journal-title":"Int. J. Secur. Its Appl."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Liu, C., Zhang, Y., Zhang, H.: A novel approach to IoT security based on immunology. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 771\u2013775. IEEE (2013)","DOI":"10.1109\/CIS.2013.168"},{"key":"9_CR34","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.cose.2017.08.016","volume":"74","author":"AS Sohal","year":"2018","unstructured":"Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340\u2013354 (2018)","journal-title":"Comput. Secur."},{"key":"9_CR35","doi-asserted-by":"publisher","first-page":"8576","DOI":"10.3390\/su12208576","volume":"12","author":"RF Ali","year":"2020","unstructured":"Ali, R.F., Dominic, P.D.D., Ali, K.: Organizational governance, social bonds and information security policy compliance: a perspective towards oil and gas employees. Sustainability 12, 8576 (2020)","journal-title":"Sustainability"},{"key":"9_CR36","doi-asserted-by":"publisher","first-page":"30708","DOI":"10.1109\/ACCESS.2019.2900174","volume":"7","author":"K Shahzad","year":"2019","unstructured":"Shahzad, K., et al.: A process model collection and gold standard correspondences for process model matching. IEEE Access 7, 30708\u201330723 (2019)","journal-title":"IEEE Access"},{"key":"9_CR37","first-page":"1275","volume":"63","author":"RF Ali","year":"2020","unstructured":"Ali, R.F., Dominic, P., Karunakaran, P.K.: Information security policy and compliance in oil and gas organizations\u2014a pilot study. Solid State Technol. 63, 1275\u20131282 (2020)","journal-title":"Solid State Technol."},{"key":"9_CR38","first-page":"21601","volume":"63","author":"RF Ali","year":"2020","unstructured":"Ali, R.F., Dominic, P.D.D., Ali, S.E.A., Naseer, S.: Information security behavior of IT professionals (role of polices and compliance). Solid State Technol. 63, 21601\u201321608 (2020)","journal-title":"Solid State Technol."},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"1882","DOI":"10.3390\/sym12111882","volume":"12","author":"S Naseer","year":"2020","unstructured":"Naseer, S., Faizan Ali, R., Dominic, P.D.D., Saleem, Y.: Learning representations of network traffic using deep neural networks for network anomaly detection: a perspective towards oil and gas IT infrastructures. Symmetry (Basel) 12, 1882 (2020)","journal-title":"Symmetry (Basel)"},{"key":"9_CR40","doi-asserted-by":"publisher","first-page":"187","DOI":"10.3390\/fi12110187","volume":"12","author":"A Muneer","year":"2020","unstructured":"Muneer, A., Fati, S.M.: A comparative analysis of machine learning techniques for cyberbullying detection on Twitter. Futur. Internet. 12, 187 (2020)","journal-title":"Futur. Internet."},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Naseer, S., Ali, R.F., Khan, Y.D., Dominic, P.D.D.: iGluK-deep: computational identification of lysine glutarylation sites using deep neural networks with general pseudo amino acid compositions. J. Biomol. Struct. Dyn. 1\u201314 (2021)","DOI":"10.1080\/07391102.2021.1962738"},{"key":"9_CR42","unstructured":"Muneer, A., Ali, R.F., Fati, S.M., Naseer, S.: COVID-19 recognition using self-supervised learning approach in three new computed tomography databases. J. Hunan Univ. Nat. Sci. 48, 227\u2013234 (2021)"},{"key":"9_CR43","doi-asserted-by":"publisher","first-page":"196747","DOI":"10.1109\/ACCESS.2020.3034033","volume":"8","author":"A Muneer","year":"2020","unstructured":"Muneer, A., Fati, S.M.: Efficient and automated herbs classification approach based on shape and texture features using deep learning. IEEE Access 8, 196747\u2013196764 (2020)","journal-title":"IEEE Access"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob), pp. 163\u2013167. IEEE (2015)","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), pp. 321\u2013326. IEEE (2016)","DOI":"10.1109\/ICED.2016.7804660"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities (2018)","DOI":"10.1016\/j.future.2017.07.060"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of Things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336\u2013341. IEEE (2015)","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Ahemd, M.M., Shah, M.A., Wahid, A.: IoT security: a layered approach for attacks & defenses. In: 2017 international conference on Communication Technologies (ComTech), pp. 104\u2013110. IEEE (2017)","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"9_CR49","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Sadeghi, A.-R., Tsudik, G., Zeitouni, S.: DARPA: device attestation resilient to physical attacks. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 171\u2013182 (2016)","DOI":"10.1145\/2939918.2939938"},{"key":"9_CR50","doi-asserted-by":"crossref","unstructured":"ul Sami, I., Ahmad, M.B., Asif, M., Ullah, R.: DoS\/DDoS detection for E-healthcare in Internet of Things. Int. J. Adv. Comput. Sci. Appl. 9, 297\u2013300 (2018)","DOI":"10.14569\/IJACSA.2018.090140"},{"key":"9_CR51","doi-asserted-by":"crossref","unstructured":"Arasteh, H., et al.: IoT-based smart cities: a survey. In: 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/EEEIC.2016.7555867"},{"key":"9_CR52","doi-asserted-by":"crossref","unstructured":"Palani, K., Holt, E., Smith, S.: Invisible and forgotten: zero-day blooms in the IoT. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/PERCOMW.2016.7457163"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"Vashi, S., Ram, J., Modi, J., Verma, S., Prakash, C.: Internet of Things (IoT): a vision, architectural elements, and security issues. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 492\u2013496. IEEE (2017)","DOI":"10.1109\/I-SMAC.2017.8058399"},{"key":"9_CR54","doi-asserted-by":"crossref","unstructured":"Al-Sarawi, S., Anbar, M., Alieyan, K., Alzubaidi, M.: Internet of Things (IoT) communication protocols. In: 2017 8th International Conference on Information Technology (ICIT), pp. 685\u2013690. IEEE (2017)","DOI":"10.1109\/ICITECH.2017.8079928"},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: mirai and other botnets. Comput. (Long. Beach. Calif.) 50, 80\u201384 (2017)","DOI":"10.1109\/MC.2017.201"},{"key":"9_CR56","doi-asserted-by":"crossref","unstructured":"Wurm, J., Hoang, K., Arias, O., Sadeghi, A.-R., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 519\u2013524. IEEE (2016)","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"9_CR57","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:13:23Z","timestamp":1638450803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}