{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T05:47:07Z","timestamp":1759384027120},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T00:00:00Z","timestamp":1493251200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0877-5","type":"journal-article","created":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T06:39:02Z","timestamp":1493275142000},"page":"409-421","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Trust in IoT: dynamic remote attestation through efficient behavior capture"],"prefix":"10.1007","volume":"21","author":[{"given":"Toqeer","family":"Ali","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Nauman","sequence":"additional","affiliation":[]},{"given":"Salman","family":"Jan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,27]]},"reference":[{"key":"877_CR1","unstructured":"Internet of Things. http:\/\/www.gartner.com\/newsroom\/id\/3165317"},{"key":"877_CR2","unstructured":"Embedded linux keeps growing. https:\/\/www.linux.com\/news\/embedded-linux-keeps-growing-amid-iot-disruption-says-study (2016). Accessed 08 April 2016"},{"key":"877_CR3","first-page":"6","volume":"1","author":"B Zhao","year":"2015","unstructured":"Zhao, B., Zhang, H., Guo, H., Qi, Y.: White list security management mechanism based on trusted computing technology. System 1, 6 (2015)","journal-title":"System"},{"key":"877_CR4","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: SSYM\u201904: Proceedings of the 13th Conference on USENIX Security Symposium (2004)"},{"key":"877_CR5","doi-asserted-by":"publisher","unstructured":"Li, X., Xuan, Z., Wen, L.: Research on the architecture of trusted security system based on the internet of things. In: Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on, vol.\u00a02, pp. 1172\u20131175 (2011). doi: 10.1109\/ICICTA.2011.578","DOI":"10.1109\/ICICTA.2011.578"},{"key":"877_CR6","unstructured":"Tcg. trusted computing group, http:\/\/www.trustedcomputinggroup.org\/"},{"issue":"2","key":"877_CR7","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10207-011-0124-7","volume":"10","author":"G Coker","year":"2011","unstructured":"Coker, G., Guttman, J., Loscocco, P., Herzog, A., Millen, J., O\u2019Hanlon, B., Ramsdell, J., Segall, A., Sheehy, J., Sniffen, B.: Principles of remote attestation. Int J Inf Secur 10(2), 63\u201381 (2011). doi: 10.1007\/s10207-011-0124-7","journal-title":"Int J Inf Secur"},{"key":"877_CR8","unstructured":"Sailer, R., Zhang, X., Jaeger, T., Van\u00a0Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. InUSENIX Security Symposium, vol. 13, pp. 223\u2013238.(2004)"},{"key":"877_CR9","doi-asserted-by":"publisher","unstructured":"Gu, L., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on program execution. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC \u201908, pp. 11\u201320. ACM, New York (2008). doi: 10.1145\/1456455.1456458","DOI":"10.1145\/1456455.1456458"},{"key":"877_CR10","doi-asserted-by":"crossref","unstructured":"Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In: Dependable Systems & Networks, 2009. DSN\u201909. IEEE\/IFIP International Conference on, pp. 115\u2013124. IEEE (2009)","DOI":"10.1109\/DSN.2009.5270348"},{"key":"877_CR11","unstructured":"Trusting Computing Group. http:\/\/www.trustedcomputinggroup.org\/ (2014). Accessed 17 Dec 2015"},{"key":"877_CR12","unstructured":"Glibc. http:\/\/www.infosecurity-magazine.com\/news\/glibc-flaw-affects-linux-machines (2016). Accessed 05 April 2016"},{"key":"877_CR13","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., et\u00a0al.: The matter of heartbleed. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 475\u2013488. ACM (2014)","DOI":"10.1145\/2663716.2663755"},{"key":"877_CR14","doi-asserted-by":"publisher","unstructured":"Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux kernel integrity measurement using contextual inspection. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC \u201907, pp. 21\u201329. ACM, New York (2007). doi: 10.1145\/1314354.1314362","DOI":"10.1145\/1314354.1314362"},{"key":"877_CR15","unstructured":"Liang, G., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on function execution (2009)"},{"key":"877_CR16","doi-asserted-by":"crossref","unstructured":"Tanveer, T.A., Alam, M., Nauman, M.: Scalable remote attestation with privacy protection. In: Trusted Systems, pp. 73\u201387. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14597-1_5"},{"key":"877_CR17","doi-asserted-by":"crossref","unstructured":"Ismail, R., Syed, T.A., Musa, S.: Design and implementation of an efficient framework for behaviour attestation using n-call slides. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, p.\u00a036. ACM (2014)","DOI":"10.1145\/2557977.2558002"},{"key":"877_CR18","doi-asserted-by":"crossref","unstructured":"Uppuluri, P., Sekar, R.: Experiences with specification-based intrusion detection. In: Recent Advances in Intrusion Detection, pp. 172\u2013189. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45474-8_11"},{"key":"877_CR19","doi-asserted-by":"crossref","unstructured":"Ni, L., Zheng, H.Y.: An unsupervised intrusion detection method combined clustering with chaos simulated annealing. In: Machine Learning and Cybernetics, 2007 International Conference on, vol.\u00a06, pp. 3217\u20133222. IEEE (2007)","DOI":"10.1109\/ICMLC.2007.4370702"},{"key":"877_CR20","unstructured":"Gong, Y., Mabu, S., Chen, C., Wang, Y., Hirasawa, K.: Intrusion detection system combining misuse detection and anomaly detection using genetic network programming. In: ICCAS-SICE, 2009, pp. 3463\u20133467. IEEE (2009)"},{"issue":"4","key":"877_CR21","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1109\/TC.2013.13","volume":"63","author":"G Creech","year":"2014","unstructured":"Creech, G., Hu, J.: A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns. IEEE Trans Computers 63(4), 807\u2013819 (2014)","journal-title":"IEEE Trans Computers"},{"key":"877_CR22","doi-asserted-by":"crossref","unstructured":"Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing system-wide information flow for malware detection and analysis. In: Proceedings of the 14th ACM Conference on Computer and communications security, pp. 116\u2013127. ACM (2007)","DOI":"10.1145\/1315245.1315261"},{"key":"877_CR23","doi-asserted-by":"crossref","unstructured":"Canali, D., Lanzi, A., Balzarotti, D., Kruegel, C., Christodorescu, M., Kirda, E.: A quantitative study of accuracy in system call-based malware detection. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp. 122\u2013132. ACM (2012)","DOI":"10.1145\/2338965.2336768"},{"issue":"4","key":"877_CR24","first-page":"1193","volume":"14","author":"T Ali","year":"2011","unstructured":"Ali, T., Alam, M., Nauman, M., Ali, T., Ali, M., Anwar, S.: A scalable and privacy preserving remote attestation mechanism. Inf-An Int Interdiscipl J 14(4), 1193\u20131203 (2011)","journal-title":"Inf-An Int Interdiscipl J"},{"key":"877_CR25","doi-asserted-by":"publisher","unstructured":"Ismail, R., Syed, T.A., Musa, S.: Design and implementation of an efficient framework for behaviour attestation using n-call slides. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC \u201914, pp. 36:1\u201336:8. ACM, New York (2014). doi: 10.1145\/2557977.2558002","DOI":"10.1145\/2557977.2558002"},{"issue":"1","key":"877_CR26","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009). doi: 10.1145\/1656274.1656278","journal-title":"SIGKDD Explor. Newsl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0877-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0877-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0877-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,22]],"date-time":"2019-09-22T00:05:53Z","timestamp":1569110753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0877-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,27]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["877"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0877-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,27]]}}}