{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:53:18Z","timestamp":1761490398809,"version":"3.41.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T00:00:00Z","timestamp":1509580800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"PAPD fund"},{"name":"Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["(2017BDKFJJ017)"],"award-info":[{"award-number":["(2017BDKFJJ017)"]}]},{"name":"CICAEET fund"},{"name":"National Key R&D Program of China","award":["2017YFB0802703"],"award-info":[{"award-number":["2017YFB0802703"]}]},{"name":"CCF-Venustech Hongyan Research Initiative","award":["2016-009,2017-004"],"award-info":[{"award-number":["2016-009,2017-004"]}]},{"name":"Science and Technology Foundation Project of Guizhou Province","award":["QianKeHeJiChu[2016]1115"],"award-info":[{"award-number":["QianKeHeJiChu[2016]1115"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s00779-017-1084-3","type":"journal-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T09:45:13Z","timestamp":1509615913000},"page":"153-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1232-2053","authenticated-orcid":false,"given":"Min","family":"Lei","sequence":"first","affiliation":[]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Huizhong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Chunru","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Minyao","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"issue":"2","key":"1084_CR1","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1109\/JIOT.2016.2597150","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang Y et al (2017) General theory of security and a study case in internet of things. IEEE Internet Things J 4(2):592\u2013600","journal-title":"IEEE Internet Things J"},{"key":"1084_CR2","doi-asserted-by":"publisher","unstructured":"Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur. https:\/\/doi.org\/10.1109\/TIFS.2017.2705620","DOI":"10.1109\/TIFS.2017.2705620"},{"key":"1084_CR3","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.knosys.2016.10.016","volume":"115","author":"Y Kong","year":"2016","unstructured":"Kong Y, Zhang M, Ye D (2016) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl-Based Syst 115:123\u2013132","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"1084_CR4","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1084_CR5","doi-asserted-by":"publisher","unstructured":"Shen J, Liu D, Shen J, Liu Q, Sun X (2017) A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mobile Comput. https:\/\/doi.org\/10.1016\/j.pmcj.2017.03.013","DOI":"10.1016\/j.pmcj.2017.03.013"},{"key":"1084_CR6","doi-asserted-by":"publisher","unstructured":"Xiong L, Xu Z, Shi Y-Q (2017) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process. https:\/\/doi.org\/10.1007\/s11045-017-0497-5","DOI":"10.1007\/s11045-017-0497-5"},{"key":"1084_CR7","doi-asserted-by":"publisher","unstructured":"Shen J, Chang S, Shen J, Liu Q, Sun X (2016) A lightweight multi-layer authentication protocol for wireless body area networks. Futur Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2016.11.033","DOI":"10.1016\/j.future.2016.11.033"},{"key":"1084_CR8","unstructured":"Verma H, Jain M, Goel K, Virkram A, Verma G (2016) Smart home system based on Internet of things, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) , IEEE, pp 2073\u20132075"},{"key":"1084_CR9","doi-asserted-by":"crossref","unstructured":"Babak Salamat, Todd Jackson, Gregor Wagner, et al. Runtime defense against code injection attacks using replicated execution, IEEE Trans Dependable Secure Comput IEEE, vol. 8, n. 4,2011, pp. 588\u2013601","DOI":"10.1109\/TDSC.2011.18"},{"key":"1084_CR10","first-page":"214","volume-title":"Dynamically-enabled cyberspace defense","author":"L Yang","year":"2016","unstructured":"Yang L, Yu Q (2016) Dynamically-enabled cyberspace defense, 1st edn. The People\u2019s Posts and Telecommunications Press (Posts & Telecom Press), Beijing, pp 214\u2013215","edition":"1"},{"key":"1084_CR11","unstructured":"Yang L, Hu S, Ho T-Y (2015) Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. Comput Aided Des (ICCAD) IEEE 183\u2013190"},{"key":"1084_CR12","doi-asserted-by":"crossref","unstructured":"Nuno Antunes, Marco Vieira, Defending against Web application vulnerabilities, Computer, vol. 45, n. 2, 2011, pp. 66\u201372","DOI":"10.1109\/MC.2011.259"},{"key":"1084_CR13","unstructured":"Liu QX et al (2012) Research on key technology of vulnerability threat classification. J Commun"},{"key":"1084_CR14","doi-asserted-by":"crossref","unstructured":"Srivatsa M, Liu L (2005) Vulnerabilities and security threats in structured overlay networks: a quantitative analysis, 2004 20th Annual Computer Security Applications Conference, IEEE, pp 252\u2013261","DOI":"10.1109\/CSAC.2004.50"},{"key":"1084_CR15","doi-asserted-by":"crossref","unstructured":"Li X, Chang X, Board John A, et al (2017) A novel approach for software vulnerability classification, 2017 Annual Reliability and Maintainability Symposium (RAMS), IEEE, pp 1\u20137","DOI":"10.1109\/RAM.2017.7889792"},{"key":"1084_CR16","unstructured":"Jin S, Wang Y, Cui X, et al (2009) A review of classification method for network vulnerability, 2009 I.E. International Conference on System, Man and Cybernetics (SMC), IEEE, pp 1171\u20131175"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-017-1084-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1084-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1084-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T20:52:23Z","timestamp":1750971143000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-017-1084-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,2]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["1084"],"URL":"https:\/\/doi.org\/10.1007\/s00779-017-1084-3","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2017,11,2]]}}}