{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:07:51Z","timestamp":1756634871701,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031578526"},{"type":"electronic","value":"9783031578533"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57853-3_36","type":"book-chapter","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:01:52Z","timestamp":1712635312000},"page":"424-436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Approach to\u00a0Attack Modeling for\u00a0the\u00a0IoT: Creating Attack Trees from\u00a0System Descriptions"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o B. F.","family":"Sequeiros","sequence":"first","affiliation":[]},{"given":"Francisco Tchissaquila","family":"Chimuco","sequence":"additional","affiliation":[]},{"given":"Tiago M. C.","family":"Sim\u00f5es","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[]},{"given":"Pedro R. M.","family":"In\u00e1cio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","unstructured":"Al-Qaseemi, S.A., Almulhim, H.A., Almulhim, M.F., Chaudhry, S.R.: IoT architecture challenges and issues: lack of standardization. In: 2016 Future Technologies Conference (FTC), pp. 731\u2013738 (2016). https:\/\/doi.org\/10.1109\/FTC.2016.7821686","DOI":"10.1109\/FTC.2016.7821686"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Al-Qaseemi, S.A., Almulhim, H.A., Almulhim, M.F., Chaudhry, S.R.: IoT architecture challenges and issues: lack of standardization. In: 2016 Future Technologies Conference (FTC), pp. 731\u2013738. IEEE (2016)","DOI":"10.1109\/FTC.2016.7821686"},{"key":"36_CR3","unstructured":"Caltagirone, S., Pendergast, A., Betz, C.: The diamond model of intrusion analysis. Technical report, Center For Cyber Intelligence Analysis and Threat Research Hanover Md (2013)"},{"key":"36_CR4","unstructured":"Cisco: IoT reference model (2014). http:\/\/cdn.iotwf.com\/resources\/72\/IoT_Reference_Model_04_June_2014.pdf"},{"key":"36_CR5","unstructured":"ENISA: Good practices for security of IoT: secure software development lifecycle. Technical report (2019)"},{"key":"36_CR6","unstructured":"ETSI: M2M architecture (2011). https:\/\/docbox.etsi.org\/workshop\/2011\/201110_m2mworkshop\/02_m2m_standard\/m2mwg2_architecture_pareglio.pdf"},{"issue":"10","key":"36_CR7","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.3390\/sym12101674","volume":"12","author":"R Hassan","year":"2020","unstructured":"Hassan, R., Qamar, F., Hasan, M.K., Aman, A.H.M., Ahmed, A.S.: Internet of things and its applications: a comprehensive survey. Symmetry 12(10), 1674 (2020)","journal-title":"Symmetry"},{"key":"36_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-40196-1_15","volume-title":"Quantitative Evaluation of Systems","author":"B Kordy","year":"2013","unstructured":"Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: security analysis with attack\u2013defense trees. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 173\u2013176. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40196-1_15"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","volume":"9","author":"N Mishra","year":"2021","unstructured":"Mishra, N., Pandya, S.: Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review. IEEE Access 9, 59353\u201359377 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3073408","journal-title":"IEEE Access"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., Rahman, M.A.: IoTSAT: a formal framework for security analysis of the internet of things (IoT). In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 180\u2013188. IEEE (2016)","DOI":"10.1109\/CNS.2016.7860484"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Samaila, M.G., Jos\u00e9, M.Z., Sequeiros, J.B., Freire, M.M., In\u00e1cio, P.R.: IoT-HarPSecA: a framework for facilitating the design and development of secure IoT devices. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp.\u00a01\u20137 (2019)","DOI":"10.1145\/3339252.3340514"},{"issue":"12","key":"36_CR12","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."},{"issue":"2","key":"36_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3376123","volume":"53","author":"JB Sequeiros","year":"2020","unstructured":"Sequeiros, J.B., Chimuco, F.T., Samaila, M.G., Freire, M.M., In\u00e1cio, P.R.: Attack and system modeling applied to IoT, cloud, and mobile ecosystems: embedding security by design. ACM Comput. Surv. (CSUR) 53(2), 1\u201332 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"36_CR14","unstructured":"Instituto de\u00a0Telecomunica\u00e7\u00f5es: Securiotesign (2022). https:\/\/lx.it.pt\/securIoTesign\/"},{"key":"36_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/978-3-319-22915-7_40","volume-title":"Security in Computing and Communications","author":"T Yadav","year":"2015","unstructured":"Yadav, T., Rao, A.M.: Technical aspects of cyber kill chain. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Mart\u00ednez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 438\u2013452. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22915-7_40"},{"key":"36_CR16","unstructured":"Yathuvaran, A.: AT-AT (attack tree analysis tool) (2022). https:\/\/github.com\/yathuvaran\/AT-AT"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57853-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:06:58Z","timestamp":1712635618000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57853-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031578526","9783031578533"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57853-3_36","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}