{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:37:23Z","timestamp":1758267443243},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T00:00:00Z","timestamp":1488412800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-4056-z","type":"journal-article","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T16:00:17Z","timestamp":1488470417000},"page":"4149-4169","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Analysis and Security Evaluation of Security Threat on Broadcasting Service"],"prefix":"10.1007","volume":"95","author":[{"given":"Jong Han","family":"Lee","sequence":"first","affiliation":[]},{"given":"Seung Joo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,2]]},"reference":[{"key":"4056_CR1","unstructured":"EBU Project Group B\/CA. (1995). Functional model of a conditional access system, EBU Technical Review."},{"issue":"1","key":"4056_CR2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/30.754430","volume":"45","author":"F-K Tu","year":"1999","unstructured":"Tu, F.-K., Laih, C.-S., & Tung, H.-H. (1999). On key distribution management for conditional access system on pay-TV system. IEEE Transactions on Consumer Electronics, 45(1), 151\u2013158.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"4056_CR3","unstructured":"Tianbo, L., Feng, X., Yong, P., & Jin, X. (2011). Analysis of security standardization for IPTV. In 2011 3rd international conference on advanced computer control, pp. 219\u2013223."},{"key":"4056_CR4","unstructured":"Song, W. J., Kim, W. H., Kim, B. G., Kang, M., & Choi, M. (2003). Contents protection system using smart card interface for digital CATV network based on the OpenCable specification. In 2003 IEEE international conference on consumer electronics, pp. 274\u2013275."},{"key":"4056_CR5","unstructured":"https:\/\/en.wikipedia.rog\/wiki\/CVSS\n                        \n                    ."},{"key":"4056_CR6","unstructured":"Joh, H., & Malaiya, Y. K. (2010). A framework for software security risk evaluation using the vulnerability lifecycle and CVSS metrics. In 2010 international workshop on risk trust in extended enterprises, pp. 430\u2013434."},{"key":"4056_CR7","unstructured":"Joh, H., & Malaiya, Y. K. (2011). Defining and assessing quantitative security risk measures using vulnerability lifecycle and CVSS metrics. In The 2011 international conference on security and management, pp. 10\u201316."},{"key":"4056_CR8","unstructured":"Wang, S., Xia, C., Jinghua, & Jia, Q. (2015). Vulnerability evaluation based on CVSS and environmental information statistics. In 2015 4th international conference on computer science and network technology, pp. 1249\u20131252."},{"key":"4056_CR9","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-319-33630-5_5","volume":"471","author":"A Younis","year":"2016","unstructured":"Younis, A., Malaiya, Y. K., & Ray, I. (2016). Evaluating CVSS base score using vulnerability rewards programs. ICT Systems Security and Privacy Protection, 471, 62\u201375.","journal-title":"ICT Systems Security and Privacy Protection"},{"issue":"7","key":"4056_CR10","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/PROC.1970.7839","volume":"58","author":"ES Smith","year":"1970","unstructured":"Smith, E. S. (1970). The emergence of CATV: A look at the evolution of a revolution. Proceeding of the IEEE, 58(7), 967\u2013982.","journal-title":"Proceeding of the IEEE"},{"issue":"11","key":"4056_CR11","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2008.4689257","volume":"46","author":"M Jeffrey","year":"2008","unstructured":"Jeffrey, M., Park, S., Lee, K., Adams, G., & Savage, S. (2008). Content security for IPTV. IEEE Communications Magazine, 46(11), 138\u2013146.","journal-title":"IEEE Communications Magazine"},{"issue":"15","key":"4056_CR12","doi-asserted-by":"crossref","first-page":"1855","DOI":"10.1016\/j.comcom.2012.06.002","volume":"35","author":"J Llort","year":"2012","unstructured":"Llort, J., Canovas, A., Tomas, J., & Atenas, M. (2012). A network management algorithm and protocol for improving QoE in mobile IPTV. Computer Communication, 35(15), 1855\u20131870.","journal-title":"Computer Communication"},{"key":"4056_CR13","unstructured":"STRIDE Threat Model., \n                        https:\/\/msdn.microsoft.com\/en-us\/library\/ee823878(v=cs.20).aspx\n                        \n                    ."},{"key":"4056_CR14","unstructured":"ENISA Threat Landscape 2014. (2014). Overview of current and emerging cyber-threats."},{"key":"4056_CR15","unstructured":"NIST SP 800-30 Rev.1. (2012). Guide for conducting risk assessments."},{"key":"4056_CR16","unstructured":"ITU-T. (2009). Functional requirements and architecture for IPTV security aspects, X.1191."},{"key":"4056_CR17","unstructured":"CVSS v3.0. (2015). Specification document."},{"key":"4056_CR18","unstructured":"CVSS v3.0. (2015). User guide."},{"key":"4056_CR19","unstructured":"CVSS v3.0. (2015). Examples."},{"key":"4056_CR20","unstructured":"https:\/\/www.cvedetails.com\/vendor\/833\/Linksys.html\n                        \n                    ."},{"key":"4056_CR21","unstructured":"https:\/\/www.cvedetails.com\/vendor\/11936\/Tp-link.html\n                        \n                    ."},{"key":"4056_CR22","unstructured":"http:\/\/mychristiantv.com.au\/wp-content\/uploads\/Instal-Life-Update%20STB-USB-2016.pdf\n                        \n                    ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4056-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4056-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4056-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T17:27:05Z","timestamp":1502213225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4056-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,2]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["4056"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4056-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,2]]}}}