{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:09:42Z","timestamp":1742962182735,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819907403"},{"type":"electronic","value":"9789819907410"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-0741-0_11","type":"book-chapter","created":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T09:04:34Z","timestamp":1680253474000},"page":"154-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Review of Smart Home Privacy-Protecting Strategies from a Wireless Eavesdropping Attack"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3256-8648","authenticated-orcid":false,"given":"Mohammad Ali","family":"Nassiri Abrishamchi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0022-3039","authenticated-orcid":false,"given":"Anazida","family":"Zainal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,1]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"7266","DOI":"10.1109\/JIOT.2019.2915952","volume":"6","author":"W Xu","year":"2019","unstructured":"Xu, W., et al.: The design, implementation, and deployment of a smart lighting system for smart buildings. IEEE Internet Things J. 6(4), 7266\u20137281 (2019)","journal-title":"IEEE Internet Things J."},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-030-50309-3_26","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"JM Haney","year":"2020","unstructured":"Haney, J.M., Furman, S.M., Acar, Y.: Smart home security and privacy mitigations: consumer perceptions, practices, and challenges. In: Moallem, A. (ed.) HCII 2020. LNCS, vol. 12210, pp. 393\u2013411. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50309-3_26"},{"key":"11_CR3","unstructured":"Tabassum, M., Kosinski, T., Lipford, H.R.: \u201cI don\u2019t own the data\u201d: end user perceptions of smart home device data practices and risks. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Dasgupta, A., Gill, A.Q., Hussain, F.: Privacy of IoT-enabled smart home systems. In: Internet of Things (IoT) for Automated and Smart Applications, p. 9. IntechOpen, London (2019)","DOI":"10.5772\/intechopen.84338"},{"key":"11_CR5","unstructured":"Abrishamchi, M.N., et al.: A probability based hybrid energy-efficient privacy preserving scheme to encounter with wireless traffic snooping in smart home (2017)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Naru, E.R., Saini, H., Sharma, M.: A recent review on lightweight cryptography in IoT. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE (2017)","DOI":"10.1109\/I-SMAC.2017.8058307"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Abrishamchi, M.A.N., et al.: Side channel attacks on smart home systems: a short overview. In: IECON 2017\u201343rd Annual Conference of the IEEE Industrial Electronics Society. IEEE (2017)","DOI":"10.1109\/IECON.2017.8217429"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Srinivasan, V., Stankovic, J., Whitehouse, K.: Protecting your daily in-home activity information from a wireless snooping attack. In: Proceedings of the 10th International Conference on Ubiquitous Computing (2008)","DOI":"10.1145\/1409635.1409663"},{"key":"11_CR9","unstructured":"Noto, M., Sato, H.: A method for the shortest path search by extended Dijkstra algorithm. In: SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. \u2018Cybernetics Evolving to Systems, Humans, Organizations, and Their Complex Interactions\u2019. IEEE (2000)"},{"issue":"3","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3178155","volume":"51","author":"N Saeed","year":"2018","unstructured":"Saeed, N., et al.: A survey on multidimensional scaling. ACM Comput. Surv. (CSUR) 51(3), 1\u201325 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"4","key":"11_CR11","first-page":"3","volume":"100","author":"K Teknomo","year":"2006","unstructured":"Teknomo, K.: K-means clustering tutorial. Medicine 100(4), 3 (2006)","journal-title":"Medicine"},{"key":"11_CR12","unstructured":"Roughgarden, T., Cs261: A second course in algorithms, lecture# 5: Minimum-cost bipartite matching (2016)"},{"issue":"21","key":"11_CR13","doi-asserted-by":"publisher","first-page":"8564","DOI":"10.3390\/s22218564","volume":"22","author":"MA Nassiri Abrishamchi","year":"2022","unstructured":"Nassiri Abrishamchi, M.A., et al.: Smart home privacy protection methods against a passive wireless snooping side-channel attack. Sensors 22(21), 8564 (2022)","journal-title":"Sensors"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TMC.2011.267","volume":"12","author":"B Alomair","year":"2011","unstructured":"Alomair, B., et al.: Toward a statistical framework for source anonymity in sensor networks. IEEE Trans. Mob. Comput. 12(2), 248\u2013260 (2011)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"9","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou, Y., et al.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727\u20131765 (2016)","journal-title":"Proc. IEEE"},{"issue":"2","key":"11_CR16","first-page":"248","volume":"82","author":"S Jeba","year":"2012","unstructured":"Jeba, S., Paramasivan, B.: False data injection attack and its countermeasures in wireless sensor networks. Eur. J. Sci. Res. 82(2), 248\u2013257 (2012)","journal-title":"Eur. J. Sci. Res."},{"issue":"3","key":"11_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480730.2480737","volume":"9","author":"Y Yang","year":"2013","unstructured":"Yang, Y., et al.: Towards statistically strong source anonymity for sensor networks. ACM Trans. Sens. Netw. (TOSN) 9(3), 1\u201323 (2013)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"11_CR18","first-page":"85","volume":"7","author":"H Park","year":"2013","unstructured":"Park, H., Park, T., Son, S.H.: A comparative study of privacy protection methods for smart home environments. Int. J. Smart Home 7, 85\u201394 (2013)","journal-title":"Int. J. Smart Home"},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/fi9010007","volume":"9","author":"J He","year":"2017","unstructured":"He, J., et al.: An adaptive privacy protection method for smart home environments using supervised learning. Future Internet 9(1), 7 (2017)","journal-title":"Future Internet"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Data Science and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-0741-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T20:49:30Z","timestamp":1685479770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-0741-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819907403","9789819907410"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-0741-0_11","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DaSET","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Data Science and Emerging Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"daset2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdaset.com","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}