{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:40:25Z","timestamp":1772912425627,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T00:00:00Z","timestamp":1463097600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11235-016-0168-0","type":"journal-article","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T16:03:00Z","timestamp":1463155380000},"page":"193-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Security assessment framework for IoT service"],"prefix":"10.1007","volume":"64","author":[{"given":"Keon Chul","family":"Park","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dong-Hee","family":"Shin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,5,13]]},"reference":[{"key":"168_CR1","doi-asserted-by":"publisher","unstructured":"Abomhara, M., & Koien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. Paper presented at the 2nd international conference on privacy and security in mobile systems, Aalborg. doi: 10.1109\/PRISMS.2014.6970594","DOI":"10.1109\/PRISMS.2014.6970594"},{"issue":"3","key":"168_CR2","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s11277-011-0384-6","volume":"61","author":"S Alam","year":"2011","unstructured":"Alam, S., Chowdhury, M. M., & Noll, J. (2011). Interoperability of security-enabled Internet of things. Wireless Personal Communications, 61(3), 567\u2013586. doi: 10.1007\/s11277-011-0384-6 .","journal-title":"Wireless Personal Communications"},{"key":"168_CR3","unstructured":"Attari, M. Y. N., Bagheri, M., & Jami, E. N. (2012). A decision making model for outsourcing of manufacturing activities by ANP and DEMATEL under fuzzy environment. International Journal of Industrial Engineering, 23(3), 163\u2013174. Retrieved from http:\/\/ijiepr.iust.ac.ir\/browse.php?a_code=A-10-149-2&slc_lang=en&sid=1 ."},{"key":"168_CR4","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/978-3-642-14478-3_42","volume-title":"Recent trends in network security and applications","author":"S Babar","year":"2010","unstructured":"Babar, S., Mahalle, P., Stango, A., Prasad, N., & Prasad, R. (2010). Proposed security model and threat taxonomy for the Internet of things. In N. Meghanathan, et al. (Eds.), Recent trends in network security and applications (pp. 420\u2013429). Berlin: Springer."},{"key":"168_CR5","doi-asserted-by":"publisher","unstructured":"Bellman, R. E., & Zadeh, L. A. (1970). Decision-making in a fuzzy environment. Management Science, 17(4), B-141\u2013B-164. doi: 10.1287\/mnsc.17.4.B141 .","DOI":"10.1287\/mnsc.17.4.B141"},{"issue":"3","key":"168_CR6","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0165-0114(85)90090-9","volume":"17","author":"JJ Buckley","year":"1985","unstructured":"Buckley, J. J. (1985). Fuzzy hierarchical analysis. Fuzzy Sets and Systems, 17(3), 233\u2013247. doi: 10.1016\/0165-0114(85)90090-9 .","journal-title":"Fuzzy Sets and Systems"},{"issue":"3","key":"168_CR7","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.1016\/j.eswa.2011.08.162","volume":"39","author":"G B\u00fcy\u00fck\u00f6zkan","year":"2012","unstructured":"B\u00fcy\u00fck\u00f6zkan, G., & \u00c7if\u00e7i, G. (2012). A novel hybrid MCDM approach based on fuzzy DEMATEL, fuzzy ANP and fuzzy TOPSIS to evaluate green suppliers. Expert Systems with Applications, 39(3), 3000\u20133011. doi: 10.1016\/j.eswa.2011.08.162 .","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"168_CR8","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/0377-2217(95)00300-2","volume":"95","author":"DY Chang","year":"1996","unstructured":"Chang, D. Y. (1996). Applications of the extent analysis method on fuzzy AHP. European Journal of Operational Research, 95(3), 649\u2013655. doi: 10.1016\/0377-2217(95)00300-2 .","journal-title":"European Journal of Operational Research"},{"issue":"3","key":"168_CR9","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1016\/j.eswa.2009.06.079","volume":"37","author":"J-K Chen","year":"2010","unstructured":"Chen, J.-K., & Chen, I.-S. (2010). Using a novel conjunctive MCDM approach based on DEMATEL, fuzzy ANP, and TOPSIS as an innovation support system for Taiwanese higher education. Expert Systems with Applications, 37(3), 1981\u20131990. doi: 10.1016\/j.eswa.2009.06.079 .","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"168_CR10","first-page":"236","volume":"9","author":"H Chen-Yi","year":"2007","unstructured":"Chen-Yi, H., Ke-Ting, C., & Gwo-Hshiung, T. (2007). FMCDM with fuzzy DEMATEL approach for customers\u2019 choice behavior model. International Journal of Fuzzy Systems, 9(4), 236\u2013246.","journal-title":"International Journal of Fuzzy Systems"},{"issue":"2","key":"168_CR11","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/S0377-2217(96)00026-4","volume":"96","author":"C-H Cheng","year":"1997","unstructured":"Cheng, C.-H. (1997). Evaluating naval tactical missile systems by fuzzy AHP based on the grade value of membership function. European Journal of Operational Research, 96(2), 343\u2013350. doi: 10.1016\/S0377-2217(96)00026-4 .","journal-title":"European Journal of Operational Research"},{"issue":"2","key":"168_CR12","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3390\/a6020197","volume":"6","author":"S Cirani","year":"2013","unstructured":"Cirani, S., Ferrari, G., & Veltri, L. (2013). Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview. Algorithms, 6(2), 197\u2013226. doi: 10.3390\/a6020197 .","journal-title":"Algorithms"},{"key":"168_CR13","unstructured":"Covington, M. J., & Carskadden, R. (2013, June). Threat implications of the internet of things. In 2013 5th IEEE International conference on cyber conflict (pp. 1\u201312)."},{"issue":"3","key":"168_CR14","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0888-613X(99)00025-0","volume":"21","author":"H Deng","year":"1999","unstructured":"Deng, H. (1999). Multicriteria analysis with fuzzy pairwise comparison. International Journal of Approximate Reasoning, 21(3), 215\u2013231. doi: 10.1016\/S0888-613X(99)00025-0 .","journal-title":"International Journal of Approximate Reasoning"},{"key":"168_CR15","unstructured":"Europol. (2014). The Internet Organized Crime Threat Assessment. European Cybercrime Centre (EC3). Retrieved from https:\/\/www.europol.europa.eu\/iocta\/2014\/ ."},{"issue":"4","key":"168_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1287\/opre.49.4.469.11231","volume":"49","author":"EH Forman","year":"2001","unstructured":"Forman, E. H., & Gass, S. I. (2001). The analytic hierarchy process\u2013An exposition. Operations Research, 49(4), 469\u2013486. doi: 10.1287\/opre.49.4.469.11231 .","journal-title":"Operations Research"},{"key":"168_CR17","unstructured":"FTC. (2015). Internet of things: Privacy & security in a connected world. FTC Staff Report. Retrieved from https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy\/150127iotrpt.pdf ."},{"key":"168_CR18","volume-title":"World problems, an invitation to further thought within the framework of DEMATEL","author":"A Gabus","year":"1972","unstructured":"Gabus, A., & Fontela, E. (1972). World problems, an invitation to further thought within the framework of DEMATEL. Geneva: Battelle Geneva Research Center."},{"key":"168_CR19","doi-asserted-by":"publisher","unstructured":"Gazis, V., Sasloglou, K., Frangiadakis, N., & Kikiras, P. (2012, October). Wireless sensor networking, automation technologies and machine to machine developments on the path to the Internet of Things. Paper presented at 16th Panhellenic conference on informatics (PCI), Piraeus. doi: 10.1109\/PCi.2012.64","DOI":"10.1109\/PCi.2012.64"},{"issue":"2","key":"168_CR20","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/S0165-0114(97)00140-1","volume":"91","author":"RE Giachetti","year":"1997","unstructured":"Giachetti, R. E., & Young, R. E. (1997). A parametric representation of fuzzy numbers and their arithmetic operators. Fuzzy Sets and Systems, 91(2), 185\u2013202. doi: 10.1016\/S0165-0114(97)00140-1 .","journal-title":"Fuzzy Sets and Systems"},{"key":"168_CR21","unstructured":"Guillemin, P., & Friess, P. (2009, September). Internet of things strategic research roadmap. The Cluster of European Research Projects. Technical Report."},{"key":"168_CR22","unstructured":"IoT-A. (2012). D4.2 concepts and solutions for privacy and security in the resolution infrastructure. FP7 Integrated Project Internet of Things Architecture. Retrieved from http:\/\/www.iot-a.eu\/public\/public-documents\/d4.2\/view ."},{"issue":"1","key":"168_CR23","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/S0925-5273(00)00081-5","volume":"69","author":"EE Karsak","year":"2001","unstructured":"Karsak, E. E., & Tolga, E. (2001). Fuzzy multi-criteria decision-making procedure for evaluating advanced manufacturing system investments. International Journal of Production Economics, 69(1), 49\u201364. doi: 10.1016\/S0925-5273(00)00081-5 .","journal-title":"International Journal of Production Economics"},{"issue":"1","key":"168_CR24","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/S0377-2217(99)00118-6","volume":"124","author":"LC Leung","year":"2000","unstructured":"Leung, L. C., & Cao, D. (2000). On consistency and ranking of alternatives in fuzzy AHP. European Journal of Operational Research, 124(1), 102\u2013113. doi: 10.1016\/S0377-2217(99)00118-6 .","journal-title":"European Journal of Operational Research"},{"issue":"6","key":"168_CR25","doi-asserted-by":"publisher","first-page":"9683","DOI":"10.1016\/j.eswa.2008.11.040","volume":"36","author":"C-L Lin","year":"2009","unstructured":"Lin, C.-L., & Tzeng, G.-H. (2009). A value-created system of science (technology) park by using DEMATEL. Expert Systems with Applications, 36(6), 9683\u20139697. doi: 10.1016\/j.eswa.2008.11.040 .","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"168_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1093\/idpl\/ipv004","volume":"5","author":"MH Maras","year":"2015","unstructured":"Maras, M. H. (2015). Internet of Things: Security and privacy implications. International Data Privacy Law, 5(2), 99\u2013104. doi: 10.1093\/idpl\/ipv004 .","journal-title":"International Data Privacy Law"},{"issue":"8","key":"168_CR27","doi-asserted-by":"publisher","first-page":"4126","DOI":"10.1016\/j.eswa.2015.01.003","volume":"42","author":"A Mardani","year":"2015","unstructured":"Mardani, A., Jusoh, A., & Zavadskas, E. K. (2015). Fuzzy multiple criteria decision-making techniques and applications\u2013Two decades review from 1994 to 2014. Expert Systems with Applications, 42(8), 4126\u20134148. doi: 10.1016\/j.eswa.2015.01.003 .","journal-title":"Expert Systems with Applications"},{"key":"168_CR28","unstructured":"Middleton, P., Kjeldsen, P., & Tully, J. (2013, November).Forecast: The Internet of things, worldwide. Stamford, CT: Gartner Research. Retrieved from https:\/\/www.gartner.com\/doc\/2625419\/forecast-internet-things-worldwide ."},{"issue":"2","key":"168_CR29","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S0305-0548(03)00012-1","volume":"31","author":"L Mikhailov","year":"2004","unstructured":"Mikhailov, L. (2004). Group prioritization in the AHP by fuzzy preference programming method. Computers & Operations Research, 31(2), 293\u2013301. doi: 10.1016\/S0305-0548(03)00012-1 .","journal-title":"Computers & Operations Research"},{"key":"168_CR30","unstructured":"Ministry of Science, ICT and Future Planning. (2013). Vitamin Project Initiatives for creative economy in Korea. http:\/\/www.msip.go.kr\/webzine\/index.do , https:\/\/www.facebook.com\/vitathon"},{"issue":"7","key":"168_CR31","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497\u20131516. doi: 10.1016\/j.adhoc.2012.02.016 .","journal-title":"Ad Hoc Networks"},{"key":"168_CR32","unstructured":"Nedeltchev, P. (2014). The Internet of everything is the new economy. Cisco. Retrieved from http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/enterprise\/cisco-on-cisco\/Cisco_IT_Trends_IoE_Is_the_New_Economy.html ."},{"issue":"4","key":"168_CR33","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2013.74","volume":"46","author":"H Ning","year":"2013","unstructured":"Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the Internet of Things. Computer, 46(4), 46\u201353. doi: 10.1109\/MC.2013.74 .","journal-title":"Computer"},{"issue":"2","key":"168_CR34","doi-asserted-by":"publisher","first-page":"3887","DOI":"10.1016\/j.eswa.2008.02.045","volume":"36","author":"S \u00d6n\u00fct","year":"2009","unstructured":"\u00d6n\u00fct, S., Kara, S. S., & I\u015fik, E. (2009). Long term supplier selection using a combined fuzzy MCDM approach: A case study for a telecommunication company. Expert Systems with Applications, 36(2), 3887\u20133895. doi: 10.1016\/j.eswa.2008.02.045 .","journal-title":"Expert Systems with Applications"},{"key":"168_CR35","doi-asserted-by":"crossref","unstructured":"Park, K. C., Shin, J. W., & Lee, B. G. (2014). Analysis of authentication methods for smartphone banking service using ANP. KSII Transactions on Internet and Information Systems (TIIS), 8(6), 2087\u20132103. Retrieved from http:\/\/www.dbpia.co.kr\/Article\/3531347 .","DOI":"10.3837\/tiis.2014.06.016"},{"issue":"4","key":"168_CR36","first-page":"825","volume":"3","author":"J Ramik","year":"2007","unstructured":"Ramik, J. (2007). A decision system using ANP and fuzzy inputs. International Journal of Innovative Computing, Information and Control, 3(4), 825\u2013837.","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"10","key":"168_CR37","doi-asserted-by":"publisher","first-page":"3711","DOI":"10.1109\/JSEN.2013.2277656","volume":"13","author":"S Raza","year":"2013","unstructured":"Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight secure CoAP for the internet of things. IEEE Sensors Journal, 13(10), 3711\u20133720. doi: 10.1109\/JSEN.2013.2277656 .","journal-title":"IEEE Sensors Journal"},{"issue":"10","key":"168_CR38","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266\u20132279.","journal-title":"Computer Networks"},{"key":"168_CR39","volume-title":"The analytic network process: Decision making with dependence and feedback; the organization and prioritization of complexity","author":"TL Saaty","year":"1996","unstructured":"Saaty, T. L. (1996). The analytic network process: Decision making with dependence and feedback; the organization and prioritization of complexity. Pittsburgh, PA: RWS Publications."},{"key":"168_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/0-387-33987-6_1","volume-title":"Decision making with the analytic network process","author":"TL Saaty","year":"2006","unstructured":"Saaty, T. L. (2006). The analytic network process. In T. L. Saaty & L. G. Vargas (Eds.), Decision making with the analytic network process (pp. 1\u201326). Berlin: Springer."},{"issue":"5","key":"168_CR41","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.intcom.2010.05.001","volume":"22","author":"D Shin","year":"2010","unstructured":"Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428\u2013438.","journal-title":"Interacting with Computers"},{"issue":"4","key":"168_CR42","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.tele.2014.02.003","volume":"31","author":"D Shin","year":"2014","unstructured":"Shin, D. (2014). A socio-technical framework for Internet-of-Things design: A human-centered design for the Internet of Things. Telematics and Informatics, 31(4), 519\u2013531.","journal-title":"Telematics and Informatics"},{"issue":"8","key":"168_CR43","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1016\/j.telpol.2014.10.001","volume":"39","author":"D Shin","year":"2015","unstructured":"Shin, D. (2015). Effect of the customer experience on satisfaction with smartphones: Assessing smart satisfaction index with partial least squares. Telecommunications Policy, 39(8), 627\u2013641.","journal-title":"Telecommunications Policy"},{"issue":"12","key":"168_CR44","doi-asserted-by":"crossref","first-page":"7745","DOI":"10.1016\/j.eswa.2010.04.066","volume":"37","author":"C-C Sun","year":"2010","unstructured":"Sun, C.-C. (2010). A performance evaluation model by integrating fuzzy AHP and fuzzy TOPSIS methods. Expert Systems with Applications, 37(12), 7745\u20137754.","journal-title":"Expert Systems with Applications"},{"key":"168_CR45","doi-asserted-by":"crossref","unstructured":"Syamsuddin, I., & Hwang, J. (2010, October). A new fuzzy MCDM framework to evaluate e-government security strategy. Paper presented at 2010 4th international conference on application of information and communication technologies, Uzbekistan.","DOI":"10.1109\/ICAICT.2010.5612065"},{"issue":"18","key":"168_CR46","doi-asserted-by":"publisher","first-page":"8112","DOI":"10.1016\/j.eswa.2014.07.021","volume":"41","author":"S Tadi\u0107","year":"2014","unstructured":"Tadi\u0107, S., Ze\u010devi\u0107, S., & Krsti\u0107, M. (2014). A novel hybrid MCDM model based on fuzzy DEMATEL, fuzzy ANP and fuzzy VIKOR for city logistics concept selection. Expert Systems with Applications, 41(18), 8112\u20138128. doi: 10.1016\/j.eswa.2014.07.021 .","journal-title":"Expert Systems with Applications"},{"issue":"7","key":"168_CR47","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.im.2013.05.008","volume":"50","author":"M Tavana","year":"2013","unstructured":"Tavana, M., Zandi, F., & Katehakis, M. N. (2013). A hybrid fuzzy group ANP-TOPSIS framework for assessment of e-government readiness from a CiRM perspective. Information & Management, 50(7), 383\u2013397.","journal-title":"Information & Management"},{"issue":"5","key":"168_CR48","doi-asserted-by":"publisher","first-page":"9015","DOI":"10.1016\/j.eswa.2008.12.052","volume":"36","author":"M-L Tseng","year":"2009","unstructured":"Tseng, M.-L. (2009). Using the extension of DEMATEL to integrate hotel service quality perceptions into a cause-effect model in uncertainty. Expert Systems with Applications, 36(5), 9015\u20139023. doi: 10.1016\/j.eswa.2008.12.052 .","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"168_CR49","first-page":"7","volume":"61","author":"Z Turskis","year":"2009","unstructured":"Turskis, Z., Zavadskas, E. K., & Peldschus, F. (2009). Multi-criteria optimization system for decision making in construction design and management. Engineering Economics, 61(1), 7\u201317.","journal-title":"Engineering Economics"},{"issue":"3","key":"168_CR50","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/BF03326087","volume":"6","author":"G Tuzkaya","year":"2009","unstructured":"Tuzkaya, G., Ozgen, A., Ozgen, D., & Tuzkaya, U. (2009). Environmental performance evaluation of suppliers: A hybrid fuzzy multi-criteria decision approach. International Journal of Environmental Science & Technology, 6(3), 477\u2013490. doi: 10.1007\/BF03326087 .","journal-title":"International Journal of Environmental Science & Technology"},{"issue":"15","key":"168_CR51","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.1016\/j.ins.2008.03.015","volume":"178","author":"UR Tuzkaya","year":"2008","unstructured":"Tuzkaya, U. R., & \u00d6n\u00fct, S. (2008). A fuzzy analytic network process based approach to transportation-mode selection between Turkey and Germany: A case study. Information Sciences, 178(15), 3133\u20133146. doi: 10.1016\/j.ins.2008.03.015 .","journal-title":"Information Sciences"},{"key":"168_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2014.09.014","author":"\u00d6 Uygun","year":"2014","unstructured":"Uygun, \u00d6., Ka\u00e7amak, H., & Kahraman, \u00dc. A. (2014). An integrated DEMATEL and Fuzzy ANP techniques for evaluation and selection of outsourcing provider for a telecommunication company. Computers & Industrial Engineering,. doi: 10.1016\/j.cie.2014.09.014 .","journal-title":"Computers & Industrial Engineering"},{"issue":"1","key":"168_CR53","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0165-0114(83)80082-7","volume":"11","author":"P Laarhoven Van","year":"1983","unstructured":"Van Laarhoven, P., & Pedrycz, W. (1983). A fuzzy extension of Saaty\u2019s priority theory. Fuzzy Sets and Systems, 11(1), 199\u2013227. doi: 10.1016\/S0165-0114(83)80082-7 .","journal-title":"Fuzzy Sets and Systems"},{"issue":"2","key":"168_CR54","first-page":"97","volume":"13","author":"D Vukovi\u0107","year":"2014","unstructured":"Vukovi\u0107, D. (2014). Security issues in Internet of Things (IOT) related to passive RFID tags. Facta Universitatis, Series: Automatic Control and Robotics, 13(2), 97\u2013105.","journal-title":"Facta Universitatis, Series: Automatic Control and Robotics"},{"issue":"1","key":"168_CR55","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R. H. (2010). Internet of Things-New security and privacy challenges. Computer Law & Security Review, 26(1), 23\u201330. doi: 10.1016\/j.clsr.2009.11.008 .","journal-title":"Computer Law & Security Review"},{"issue":"2","key":"168_CR56","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.eswa.2005.12.005","volume":"32","author":"W-W Wu","year":"2007","unstructured":"Wu, W.-W., & Lee, Y.-T. (2007). Developing global managers\u2019 competencies using the fuzzy DEMATEL method. Expert Systems with Applications, 32(2), 499\u2013507. doi: 10.1016\/j.eswa.2005.12.005 .","journal-title":"Expert Systems with Applications"},{"key":"168_CR57","doi-asserted-by":"publisher","unstructured":"Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120\u2013134. doi: 10.1016\/j.jnca.2014.01.014 .","DOI":"10.1016\/j.jnca.2014.01.014"},{"issue":"4","key":"168_CR58","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ijinfomgt.2011.11.005","volume":"32","author":"H-W Yang","year":"2012","unstructured":"Yang, H.-W., & Chang, K.-F. (2012). Combining means-end chain and fuzzy ANP to explore customers\u2019 decision process in selecting bundles. International Journal of Information Management, 32(4), 381\u2013395. doi: 10.1016\/j.ijinfomgt.2011.11.005 .","journal-title":"International Journal of Information Management"},{"key":"168_CR59","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.ins.2011.09.012","volume":"232","author":"YPO Yang","year":"2013","unstructured":"Yang, Y. P. O., Shieh, H. M., & Tzeng, G. H. (2013). A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Information Sciences, 232, 482\u2013500. doi: 10.1016\/j.ins.2011.09.012 .","journal-title":"Information Sciences"},{"key":"168_CR60","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.renene.2013.12.003","volume":"66","author":"T-M Yeh","year":"2014","unstructured":"Yeh, T.-M., & Huang, Y.-L. (2014). Factors in determining wind farm location: Integrating GQM, fuzzy DEMATEL, and ANP. Renewable Energy, 66, 159\u2013169. doi: 10.1016\/j.renene.2013.12.003 .","journal-title":"Renewable Energy"},{"issue":"2","key":"168_CR61","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1016\/j.eswa.2009.06.002","volume":"37","author":"\u0130 Y\u00fcksel","year":"2010","unstructured":"Y\u00fcksel, \u0130., & Da\u011fdeviren, M. (2010). Using the fuzzy analytic network process (ANP) for Balanced Scorecard (BSC): A case study for a manufacturing firm. Expert Systems with Applications, 37(2), 1270\u20131278. doi: 10.1016\/j.eswa.2009.06.002 .","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"168_CR62","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh, L. A. (1965). Fuzzy sets. Information and Control, 8(3), 338\u2013353.","journal-title":"Information and Control"}],"updated-by":[{"DOI":"10.1007\/s11235-016-0228-5","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2016,9,7]],"date-time":"2016-09-07T00:00:00Z","timestamp":1473206400000}}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0168-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-016-0168-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0168-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0168-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:50:22Z","timestamp":1559386222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-016-0168-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,13]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["168"],"URL":"https:\/\/doi.org\/10.1007\/s11235-016-0168-0","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11235-016-0228-5","asserted-by":"object"}]},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,13]]}}}