{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:27:18Z","timestamp":1766485638528,"version":"3.37.3"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:00:00Z","timestamp":1591056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:00:00Z","timestamp":1591056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s12652-020-02128-2","type":"journal-article","created":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T20:10:59Z","timestamp":1591128659000},"page":"5903-5927","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Fuzzy logic and Fog based Secure Architecture for Internet of Things (FLFSIoT)"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6416-2143","authenticated-orcid":false,"given":"Syed Rameem","family":"Zahra","sequence":"first","affiliation":[]},{"given":"Mohammad Ahsan","family":"Chishti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,2]]},"reference":[{"key":"2128_CR2","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2018.06.04","author":"MS Ahmad","year":"2018","unstructured":"Ahmad MS (2018) Alleviating malicious insider attacks in MANET using a multipath on-demand security mechanism. Int J Comput Netw Inf Secur. https:\/\/doi.org\/10.5815\/ijcnis.2018.06.04","journal-title":"Int J Comput Netw Inf Secur"},{"key":"2128_CR3","unstructured":"Akamai (2014) Spike DDoS Toolkit. https:\/\/www.prolexic.com\/kcresources\/prolexic-threat-advisories\/prolexic-threatadvisory-spike-ddos-toolkit-botnet\/spike-ddos-toolkit-cybersecurity-US-092414.pdf. Accessed 17 Aug 2019"},{"issue":"3","key":"2128_CR4","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1109\/TNSM.2019.2929425","volume":"16","author":"A Alsirhani","year":"2019","unstructured":"Alsirhani A, Sampalli S, Bodorik P (2019) DDoS detection system: using a set of classification algorithms controlled by fuzzy logic system in apache spark. IEEE Trans Netw Serv Manage 16(3):936\u2013949. https:\/\/doi.org\/10.1109\/TNSM.2019.2929425","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2128_CR5","unstructured":"Angrishi K (2017) Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets. https:\/\/arxiv.org\/abs\/1702.03681. Accessed 17 Sep 2019"},{"key":"2128_CR6","doi-asserted-by":"crossref","unstructured":"Anthi E, Williams L, Burnap P (2018) Pulse: an adaptive intrusion detection for the Internet of Things. In: Living in the Internet of Things: cybersecurity of the IoT - 2018, IET","DOI":"10.1049\/cp.2018.0035"},{"key":"2128_CR7","doi-asserted-by":"crossref","unstructured":"Arsenault A, Diversinet, Farrell S (2001) Securely available credentials-requirements. RFC 3157. Tech Rep https:\/\/tools.ietf.org\/html\/rfc3157. Accessed 23 Aug 2019","DOI":"10.17487\/rfc3157"},{"key":"2128_CR8","doi-asserted-by":"publisher","unstructured":"Babar S, Mahalle P, Stango A, Prasad N, Prasad R (2010) Proposed security model and threat taxonomy for the Internet of Things. In: Proceedings of the recent trends in network security and applications, Berlin, pp 420\u2013429. https:\/\/doi.org\/10.1007\/978-3-642-14478-3_42","DOI":"10.1007\/978-3-642-14478-3_42"},{"issue":"2","key":"2128_CR9","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"Bao F, Chen I, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manage 9(2):169\u2013183. https:\/\/doi.org\/10.1109\/TCOMM.2012.031912.110179","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2128_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1","volume-title":"Pattern recognition with fuzzy objective function algorithms","author":"JC Bezdek","year":"1981","unstructured":"Bezdek JC (1981) Pattern recognition with fuzzy objective function algorithms. Kluwer Academic Publishers, Berline"},{"key":"2128_CR11","doi-asserted-by":"publisher","unstructured":"Bhuiyan M, Wu J (2016) Collusion attack detection in networked systems. In: Proceedings of the 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (IEEE DASC 2016), Auckland, pp 286\u2013293. https:\/\/doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.67","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.67"},{"key":"2128_CR12","doi-asserted-by":"publisher","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the Internet of Things. In: MCC workshop on mobile cloud computing, ACM, pp 13\u201316. https:\/\/doi.org\/10.1145\/2342509.2342513","DOI":"10.1145\/2342509.2342513"},{"key":"2128_CR13","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta A, Donato WD, Persico V, Pescape A (2016) Integration of cloud computing and Internet of Things: a survey. Future Gener Comput Syst 56:684\u2013700. https:\/\/doi.org\/10.1016\/j.future.2015.09.021","journal-title":"Future Gener Comput Syst"},{"key":"2128_CR14","unstructured":"Chui M, Loffler M, Roberts R (2015) Unlocking the potential of the Internet of Things. Mckinsay Global Institute. https:\/\/www.mckinsey.com\/industries\/high-tech\/our-insights\/the-internet-of-things. Accessed 03 Aug 2019"},{"issue":"3","key":"2128_CR15","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti M, Dragoni N, Lesyk V (2016) A survey of man in the middle attacks. IEEE Commun Surv Tutor 18(3):2027\u20132051. https:\/\/doi.org\/10.1109\/COMST.2016.2548426","journal-title":"IEEE Commun Surv Tutor"},{"key":"2128_CR16","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2017","unstructured":"Diro AA, Chilamkurti N (2017) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761\u2013768. https:\/\/doi.org\/10.1016\/j.future.2017.08.043","journal-title":"Future Gener Comput Syst"},{"key":"2128_CR17","doi-asserted-by":"publisher","unstructured":"Durfina L, Kroustek J, Zemek P (2013) PsybOt malware: a step-by-step decompilation case study. In: 20th Working Conference on Reverse Engineering, Koblenz, pp 449\u2013456. https:\/\/doi.org\/10.1109\/WCRE.2013.6671321\u00a0","DOI":"10.1109\/WCRE.2013.6671321"},{"key":"2128_CR18","unstructured":"Federico F (2012) LightAidra source code on GitHub. GitHub. https:\/\/github.com\/eurialo\/lightaidra. Accessed 02 Oct 2019"},{"key":"2128_CR19","unstructured":"Forouzan BA (2007) Data communications and networking. In: Forouzan Networking Series. McGraw-Hill, New York, NY, USA"},{"key":"2128_CR20","unstructured":"Fortiguard team (2018) Reaper: the next evolution of IoT botnets. Fortinet. Available at: https:\/\/www.fortinet.com\/blog\/threat-research\/reaper-the-next-evolution-of-iot-botnets.html. Accessed 22 Aug 2019"},{"key":"2128_CR21","unstructured":"Gannon M, Warner G, Arora A (2017) An accidental discovery of IoT botnets and a method for investigating them with a Custom Lua Dissector. In: Annual ADFSL Conference on Digital Forensics, Security and Law, pp 27\u201338. Available at:\u00a0 https:\/\/commons.erau.edu\/adfsl\/2017\/papers\/3 \u00a0"},{"key":"2128_CR22","unstructured":"Graham J (2014) Understanding and mitigating NTP-based DDoS attacks. https:\/\/blog.cloudflare.com\/understanding-and-mitigating-ntp-based-ddos-attacks\/. Accessed 04 Aug 2019"},{"key":"2128_CR23","unstructured":"Greenberg A (2018) The reaper IoT botnet has already infected a million networks. Wired. https:\/\/www.wired.com\/story\/reaper-iot-botnet-infected-million-networks\/. Accessed 20 Aug 2019"},{"key":"2128_CR24","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1002\/spe.2509","volume":"47","author":"H Gupta","year":"2017","unstructured":"Gupta H, Dastjerdi AV, Ghosh SK, Buyya R (2017) iFogSim: a toolkit for modeling and simulation of resource management techniques in Internet of Things, edge and fog computing environments. Soft Pract Exper 47:1275\u20131296. https:\/\/doi.org\/10.1002\/spe.2509","journal-title":"Soft Pract Exper"},{"key":"2128_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1402-8","volume":"90","author":"KK Haripriya","year":"2019","unstructured":"Haripriya KK (2019) Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for Internet of Things. EURASIP J Wirel Commun Netw 90:1\u201315. https:\/\/doi.org\/10.1186\/s13638-019-1402-8","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"2128_CR26","unstructured":"Hayashi K (2013) Linux Darlloz. https:\/\/www.symantec.com\/security_response\/. Accessed 07 Sep 2019"},{"key":"2128_CR27","unstructured":"Hayashi K (2014) IoT worm used to mine cryptocurrency. https:\/\/www.symantec.com\/connect\/blogs\/iot-worm-used-mine-cryptocurrency. Accessed 29 Aug 2019"},{"key":"2128_CR28","doi-asserted-by":"publisher","unstructured":"Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the Internet of Things. In: 2015 IEEE World Congress on Services, New York, pp 21\u201328. https:\/\/doi.org\/10.1109\/SERVICES.2015.12","DOI":"10.1109\/SERVICES.2015.12"},{"issue":"12","key":"2128_CR29","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2016.1600398CM","volume":"54","author":"L Hou","year":"2016","unstructured":"Hou L, Zhao S, Xiong X et al (2016) Internet of Things cloud: architecture and implementation. IEEE Commun Mag 54(12):32\u201339. https:\/\/doi.org\/10.1109\/MCOM.2016.1600398CM","journal-title":"IEEE Commun Mag"},{"key":"2128_CR30","unstructured":"Iadmin (2018) Hydra IRC bot, the 25 minute overview of the kit. https:\/\/insecurety.net\/hydra-irc-bot-the-25-minute-overview-of-the-kit\/. Accessed 10 Sep 2019"},{"key":"2128_CR31","unstructured":"loulianou PP, Vassilakis V, Moscholios ID, Logothetis MD (2018) A signature-based intrusion detection system for the Internet of Things. In: Information and communication technology forum (in press)"},{"key":"2128_CR33","doi-asserted-by":"publisher","unstructured":"Ivan S, Sheng W (2014) The fog computing paradigm: scenarios and security Issues. In: Federated Conference on Computer Science and Information Systems, Warsaw, pp 1\u20138. https:\/\/doi.org\/10.15439\/2014F503","DOI":"10.15439\/2014F503"},{"key":"2128_CR32","doi-asserted-by":"publisher","DOI":"10.18564\/jasss.3660","author":"SS Izquierdo","year":"2018","unstructured":"Izquierdo SS, Izquierdo LR (2018) Mamdani fuzzy systems for modelling and simulation: a critical assessment. JASSS. https:\/\/doi.org\/10.18564\/jasss.3660","journal-title":"JASSS"},{"key":"2128_CR34","doi-asserted-by":"publisher","unstructured":"Jalali F, Khodadustan S, Gray C, Hinton K, Suits F (2017) Greening IoT with fog: a survey. In: International Conference on Edge Computing, Honolulu, HI, pp 25\u201331. https:\/\/doi.org\/10.1109\/IEEE.EDGE.2017.13","DOI":"10.1109\/IEEE.EDGE.2017.13"},{"key":"2128_CR35","unstructured":"Janus M (2011) Heads of the hydra. Malware for network devices. Available at: https:\/\/securelist.com\/heads-of-the-hydra-malware-for-network-devices\/36396\/. Accessed 01 Oct 2019"},{"key":"2128_CR36","first-page":"1337","volume-title":"DEMO: an IDS framework for Internet of Things empowered by 6LoWPAN. In: Proceedingsof the 2013 ACM SIGSAC conference on computer and communications security, CCS '13","author":"P Kasinathan","year":"2013","unstructured":"Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito M (2013) DEMO: an IDS framework for Internet of Things empowered by 6LoWPAN. In: Proceedingsof the 2013 ACM SIGSAC conference on computer and communications security, CCS '13. ACM, New York, pp 1337\u20131340"},{"issue":"8","key":"2128_CR37","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1109\/TMC.2010.249","volume":"10","author":"I Khalil","year":"2010","unstructured":"Khalil I, Bagchi S (2010) Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Trans Mob Comput 10(8):1096\u20131112. https:\/\/doi.org\/10.1109\/TMC.2010.249","journal-title":"IEEE Trans Mob Comput"},{"key":"2128_CR38","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of Things security: a top-down survey. Comput Netw 141:199\u2013221. https:\/\/doi.org\/10.1016\/j.comnet.2018.03.012","journal-title":"Comput Netw"},{"key":"2128_CR39","unstructured":"Kozhakhmet K, Bortsova G, Inoue A, Atymtayeva L (2012) Expert system for security audit using fuzzy logic. In: Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference, pp 146\u2013151"},{"key":"2128_CR40","first-page":"1205","volume-title":"Advanced technologies, embedded and multimedia for human-centric computing, lecture notes in electrical engineering","author":"T Lee","year":"2014","unstructured":"Lee T, Wen C, Chang L, Chiang H, Hsieh M (2014) A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. In: Huang Y-M, Chao H-C, Deng D-J, Park JJJH (eds) Advanced technologies, embedded and multimedia for human-centric computing, lecture notes in electrical engineering, vol 260. Springer, Netherlands, pp 1205\u20131213"},{"issue":"2","key":"2128_CR41","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/JIOT.2018.2883344","volume":"6","author":"J Li","year":"2019","unstructured":"Li J, Zhao Z, Li R, Zhang H (2019) AI-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J 6(2):2093\u20132102. https:\/\/doi.org\/10.1109\/JIOT.2018.2883344","journal-title":"IEEE Internet Things J"},{"key":"2128_CR42","doi-asserted-by":"publisher","unstructured":"Liu C, Zhang Y, Li Z, Zhang J, Qin H, Zeng J (2015) Dynamic defense architecture for the security of the Internet of Things. In: 11th International Conference on Computational Intelligence and Security, Shenzhen, pp 390\u2013393. https:\/\/doi.org\/10.1109\/CIS.2015.100","DOI":"10.1109\/CIS.2015.100"},{"issue":"4","key":"2128_CR43","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/COMST.2016.2582841","volume":"18","author":"NC Luong","year":"2016","unstructured":"Luong NC, Hoang DT, Wang P, Niyato D, Kim DI, Han Z (2016) Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: a survey. IEEE Commun Surveys Tuts 18(4):2546\u20132590. https:\/\/doi.org\/10.1109\/COMST.2016.2582841","journal-title":"IEEE Commun Surveys Tuts"},{"key":"2128_CR44","doi-asserted-by":"publisher","unstructured":"Malecot EL, Inoue D (2013) The carna botnet through the lens of a net-work telescope. In: Proceedings of 6th international symposium on foundations and practice of security,\u00a0Lecture Notes in Computer Science, vol 8352,\u00a0pp 426\u2013441, Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-05302-8_26","DOI":"10.1007\/978-3-319-05302-8_26"},{"key":"2128_CR45","unstructured":"McKendrick J (2019) Researchers sound alarms about IoT security. https:\/\/www.rtinsights.com\/researchers-sound-alarms-about-iot-security\/. Accessed 01 Aug 2019"},{"key":"2128_CR46","unstructured":"McMillan R (2010) Chuck Norris botnet karate-chops routers hard. https:\/\/www.computerworld.com\/article\/2521061\/chuck-norris-botnet-karate-chops-routers-hard.html. Accessed 25 Sep 2019"},{"key":"2128_CR47","doi-asserted-by":"publisher","first-page":"19293","DOI":"10.1109\/ACCESS.2017.2749422","volume":"5","author":"M Mukherjee","year":"2017","unstructured":"Mukherjee M, Matam R, Shu L et al (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293\u201319304. https:\/\/doi.org\/10.1109\/ACCESS.2017.2749422","journal-title":"IEEE Access"},{"key":"2128_CR48","unstructured":"Newswire PR (2016) Level 3 Threat Research Labs, Attack of Things. https:\/\/blog.level3.com\/security\/attack-of-things\/. Accessed 27 Oct 2019."},{"issue":"1","key":"2128_CR49","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for Internet of Things applications challenges and solutions. IEEE Commun Surv Tut 20(1):601\u2013628. https:\/\/doi.org\/10.1109\/COMST.2017.2762345","journal-title":"IEEE Commun Surv Tut"},{"key":"2128_CR50","unstructured":"Nordrum A (2016) Popular Internet of Things forecast of 50 billion devices by 2020 is outdated. IEEE Spectrum. https:\/\/spectrum.ieee.org\/tech-talk\/telecom\/internet\/popular-internet-of-thingsforecast-of-50-billion-devices-by-2020-isoutdated. Accessed 01 Aug 2019"},{"key":"2128_CR51","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961277","author":"G Noubir","year":"2003","unstructured":"Noubir G, Lin G (2003) Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob Comput Commun Rev. https:\/\/doi.org\/10.1145\/961268.961277","journal-title":"SIGMOBILE Mob Comput Commun Rev"},{"key":"2128_CR500","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1016\/j.future.2019.04.019","volume":"100","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Generation Comput Syst 100:882\u2013892","journal-title":"Future Generation Comput Syst"},{"key":"2128_CR52","doi-asserted-by":"publisher","unstructured":"Ouechtati H, Azzouna NB, Said LB (2020) A fuzzy logic based trust-ABAC model for the Internet of Things. In: International Conference on Advanced Information Networking and Applications, vol 926, pp 1157\u20131168. https:\/\/doi.org\/10.1007\/978-3-030-15032-7_97","DOI":"10.1007\/978-3-030-15032-7_97"},{"key":"2128_CR53","first-page":"50","volume":"3","author":"M Panda","year":"2013","unstructured":"Panda M (2013) Security threats at each layer of wireless sensor networks. Int J Adv Res Comput Sci Softw Eng 3:50\u201356","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"issue":"12","key":"2128_CR54","doi-asserted-by":"publisher","first-page":"3583","DOI":"10.1007\/s13369-015-1822-7","volume":"40","author":"M Poongodi","year":"2015","unstructured":"Poongodi M, Bose S (2015) A novel intrusion detection system based ontrust evaluation to defend against DDoS attack in MANET. Arab J Sci Eng 40(12):3583\u20133594. https:\/\/doi.org\/10.1007\/s13369-015-1822-7","journal-title":"Arab J Sci Eng"},{"key":"2128_CR55","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79\u201389. https:\/\/doi.org\/10.1016\/j.asoc.2018.05.049","journal-title":"Appl Soft Comput"},{"key":"2128_CR56","unstructured":"Rayome AD (2017) DDoS attacks increased 91% in 2017 thanks to IoT. TechRepublic. https:\/\/www.techrepublic.com\/article\/ddos-attacks-increased-91-in-2017-thanks-to-iot\/. Accessed 03 Aug 2019"},{"key":"2128_CR57","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the Internet of Things. Adhoc Netw 11:2661\u20132674. https:\/\/doi.org\/10.1016\/j.adhoc.2013.04.014","journal-title":"Adhoc Netw"},{"key":"2128_CR58","doi-asserted-by":"publisher","unstructured":"Reddy VB, Negi A, Venkataraman S, Venkataraman VR (2019) A similarity based trust model to mitigate badmouthing attacks in Internet of Things (IoT). In: 2019 IEEE 5th World Forum on Inter-net of Things (WF-IoT), Limerick, Ireland, pp 278\u2013282. https:\/\/doi.org\/10.1109\/WF-IoT.2019.8767170","DOI":"10.1109\/WF-IoT.2019.8767170"},{"issue":"4","key":"2128_CR59","doi-asserted-by":"publisher","first-page":"607","DOI":"10.12694\/scpe.v20i4.1562","volume":"20","author":"TJ Saleem","year":"2019","unstructured":"Saleem TJ, Chishti MA (2019a) Data analytics in the Internet of Things: a survey. Scalable Comput 20(4):607\u2013629. https:\/\/doi.org\/10.12694\/scpe.v20i4.1562","journal-title":"Scalable Comput"},{"key":"2128_CR60","doi-asserted-by":"publisher","unstructured":"Saleem TJ, Chishti MA (2019b) Deep learning for Internet of Things data analytics. In: Procedia computer science, pp 381\u2013390. https:\/\/doi.org\/10.1016\/j.procs.2019.12.120","DOI":"10.1016\/j.procs.2019.12.120"},{"key":"2128_CR61","unstructured":"Sarukkai S (2017) Ransomware and Internet of Things: a growing threat. https:\/\/www.esecurityplanet.com\/network-security\/ransomware-and-the-internet-of-things-a-growing-threat.html. Accessed 20 Sep 2019"},{"key":"2128_CR62","unstructured":"Savage K, Coogan P, Lau H (2015) The evolution of ransomware. Symantec. https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/the-evolution-of-ransomware.pdf. Accessed 05 Sep 2019"},{"key":"2128_CR63","unstructured":"Schirrmacher NB, Ondrus J, Tan FTC (2018) Towards a response to ransomware: examining digital capabilities of the wannacry attack. In: PACIS 2018 proceedings,\u00a0Digital Capabilities in Cybercrime, Available at: https:\/\/aisel.aisnet.org\/cgi\/viewcontent.cgi?article=1209&context=pacis2018"},{"key":"2128_CR64","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.engappai.2014.02.001","volume":"32","author":"S Shamshirband","year":"2014","unstructured":"Shamshirband S, Patel A, Anuar NB, Kiah LM, Abraham A (2014) Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng Appl Artif Intell 32:228\u2013241. https:\/\/doi.org\/10.1016\/j.engappai.2014.02.001","journal-title":"Eng Appl Artif Intell"},{"key":"2128_CR65","unstructured":"Spring T (2016) BASHLITE family of Malware infects 1 million IoT devices. https:\/\/threatpost.com\/bashlite-family-of-malware-infects-1-million-iot-devices. Accessed 04 Nov 2019"},{"key":"2128_CR66","unstructured":"Tajitsu N (2017) Honda halts japan car plant after wannacry virus hits computer network. https:\/\/www.reuters.com\/article\/us-honda-cyberattack-idUSKBN19C0EI. Accessed 19 Oct 2019"},{"issue":"1","key":"2128_CR67","first-page":"31","volume":"5","author":"K Tamil","year":"2010","unstructured":"Tamil K, Sridharan D (2010) Security vulnerabilities in wireless sensor networks: a survey. J Inf Assur Secur 5(1):31\u201344","journal-title":"J Inf Assur Secur"},{"key":"2128_CR68","unstructured":"Ullrich J (2014) Linksys worm (the moon) captured. https:\/\/isc.sans.edu\/forums\/diary\/Linksys+Worm+TheMoon+Captured\/17630. Accessed 23 Sep 2019"},{"issue":"5","key":"2128_CR69","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero LM, Merino LR (2014) Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIG COMM Comp Commun Rev 44(5):27\u201332. https:\/\/doi.org\/10.1145\/2677046.2677052","journal-title":"ACM SIG COMM Comp Commun Rev"},{"key":"2128_CR70","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.049","author":"S Velliangiri","year":"2020","unstructured":"Velliangiri S, Pandey HM (2020) Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms. Future Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2020.03.049","journal-title":"Future Gener Comput Syst"},{"key":"2128_CR71","unstructured":"Weagle S (2018) Financial impact of mirai DDoS attack on dyn revealed in new data. https:\/\/www.corero.com\/blog\/797-financial-impact-of-mirai-ddos-attack-on-dyn-revealed-in-newdata.html. Accessed 05 Sep 2019"},{"key":"2128_CR73","doi-asserted-by":"publisher","unstructured":"Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc\u201905, pp 46\u201357. https:\/\/doi.org\/10.1145\/1062689.1062697","DOI":"10.1145\/1062689.1062697"},{"key":"2128_CR74","doi-asserted-by":"publisher","unstructured":"Yadav J, Kharat V, Deshpande A (2014) Zadeh-Deshpande (ZD) fuzzy logic based formalism for linguistic description of air quality: a case study. In: International Conference on Informatics, Electron-ics and Vision, Dhaka, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICIEV.2014.6850706.","DOI":"10.1109\/ICIEV.2014.6850706."},{"key":"2128_CR75","doi-asserted-by":"publisher","unstructured":"Yang Z, Yue Y, Yang Y, Peng Y, Wang X, Liu W (2011) Study and application on the architecture and key technologies for IoT. In: International Conference on Multimedia Technology, Hangzhou, pp 747\u2013751. https:\/\/doi.org\/10.1109\/ICMT.2011.6002149","DOI":"10.1109\/ICMT.2011.6002149"},{"key":"2128_CR76","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5288-3","author":"Q Yaseen","year":"2017","unstructured":"Yaseen Q, Aldwairi M, Jararweh Y, Al-Ayoub M, Gupta B (2017) Collusion attacks mitigation in Internet of Things: a fog based model. Multimed Tool Appl. https:\/\/doi.org\/10.1007\/s11042-017-5288-3(Springer)","journal-title":"Multimed Tool Appl"},{"issue":"3","key":"2128_CR77","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338\u2013353. https:\/\/doi.org\/10.1016\/S0019-9958(65)90241-X","journal-title":"Inf Control"},{"key":"2128_CR78","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/BF00485052","volume":"30","author":"LA Zadeh","year":"1975","unstructured":"Zadeh LA (1975) Fuzzy logic and approximate reasoning. Synthese 30:407\u2013428. https:\/\/doi.org\/10.1007\/BF00485052","journal-title":"Synthese"},{"issue":"4","key":"2128_CR79","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/2.53","volume":"21","author":"LA Zadeh","year":"1988","unstructured":"Zadeh LA (1988) Fuzzy logic. Computer 21(4):83\u201393. https:\/\/doi.org\/10.1109\/2.53","journal-title":"Computer"},{"key":"2128_CR80","doi-asserted-by":"crossref","unstructured":"Zahra SR (2018) MNP: Malicious node prevention in vehicular Ad hoc networks. IJCNA 5(2): 9\u201321. https:\/\/www.ijcna.org\/Manuscripts\/IJCNA-2018-O-02.pdf","DOI":"10.22247\/ijcna\/2018\/49390"},{"issue":"3","key":"2128_CR81","doi-asserted-by":"publisher","first-page":"457","DOI":"10.12694\/scpe.v20i3.1544","volume":"20","author":"SR Zahra","year":"2019","unstructured":"Zahra SR, Chishti MA (2019a) Assessing the services, security threats, challenges and solutions in the Internet of Things. Scal Comput Pract Exp 20(3):457\u2013484. https:\/\/doi.org\/10.12694\/scpe.v20i3.1544","journal-title":"Scal Comput Pract Exp"},{"key":"2128_CR82","doi-asserted-by":"publisher","unstructured":"Zahra SR, Chishti MA (2019b) Ransomware and Internet of Things: a new security nightmare. In: 9th International Conference on Cloud Computing, Data Science, and Engineering (Confluence 2019), Noida, India, pp 551\u2013555. https:\/\/doi.org\/10.1109\/CONFLUENCE.2019.8776926","DOI":"10.1109\/CONFLUENCE.2019.8776926"},{"issue":"2","key":"2128_CR83","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/JIOT.2018.2847733","volume":"6","author":"W Zhou","year":"2018","unstructured":"Zhou W, Jia Y, Peng A et al (2018) The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J 6(2):1606\u20131616. https:\/\/doi.org\/10.1109\/JIOT.2018.2847733","journal-title":"IEEE Internet Things J"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02128-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02128-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02128-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T12:23:15Z","timestamp":1684844595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02128-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,2]]},"references-count":82,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["2128"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02128-2","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2020,6,2]]},"assertion":[{"value":"30 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}