{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:05:09Z","timestamp":1761807909622,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319165271"},{"type":"electronic","value":"9783319165288"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16528-8_36","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T07:57:20Z","timestamp":1426492640000},"page":"387-396","source":"Crossref","is-referenced-by-count":3,"title":["Detection of Dangerous Situations Using a Smart Internet of Things System"],"prefix":"10.1007","author":[{"given":"Nuno Vasco","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Ana Isabel","family":"Azevedo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"36_CR1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"Luigi Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Computer Networks, 2787\u20132805 (2010)","journal-title":"Computer Networks"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Bonetto, R., Bui, N., Lakkundi, V., Oliverau, A., Serbanati, A., Rossi, M.: Secure Communication for Smart IoT Objects: Protocol Stacks, Use Cases and Practical Examples (2012) 978-1-4673-1239-4\/12","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Zhai, J., Barreto, A.: Stress Detection in Computer Users Based on Digital Signal Processing of Noninvasive Physiological Variables. In: 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2006, pp. 1355\u20131358. IEEE (2006)","DOI":"10.1109\/IEMBS.2006.259421"},{"key":"36_CR4","first-page":"114","volume-title":"Managing Interactions in Smart Environments","author":"Anind K. Dey","year":"2000","unstructured":"Dey, A.K., Abowd, G.D., Salber, D.: Managing Interactions in Smart Environments. Springer London (2000)"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Healey, J.A., Picard, R.W.: Detecting Stress During Real-World Driving Tasks Using Physiological Sensors. Technical report, HP Laboratories Cambridge (2004)","DOI":"10.1109\/TITS.2005.848368"},{"key":"36_CR6","unstructured":"Rimini-Doering, M., Manstetten, D., Altmueller, T., Ladstaetter, U., Mahler, M.: Monitoring Driver Drowsiness and Stress in a Driving Simulator. In: Proceedings of the First International Driving Symposium on Human Factors in Driver Assessment, Training and Vehicle Design"},{"issue":"15","key":"36_CR7","doi-asserted-by":"crossref","first-page":"749","DOI":"10.12988\/ces.2014.4685","volume":"7","author":"J. Byun","year":"2014","unstructured":"Byun, J., Nasridinov, A.: Internet of Things for Smart Crime Detection. Contemporary Engineering Sciences\u00a07(15), 749\u2013754 (2014)","journal-title":"Contemporary Engineering Sciences"},{"key":"36_CR8","unstructured":"National Center for Biotechnology Information, \n                      http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC1761894"},{"key":"36_CR9","unstructured":"Alberti, A.M., Singh, D.: Internet of Things: Perspectives, Challenges and Opportunities. In: International Workshop on Telecommunications (2013)"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of Internet of Things: perspectives and challenges. Springer Science+Business Media, New York (2014)","DOI":"10.1007\/s11276-014-0761-7"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Bormann, C.: 6LoWPAN: The Wireless Embedded Internet. Wiley Publishing (2010)","DOI":"10.1002\/9780470686218"}],"container-title":["Advances in Intelligent Systems and Computing","New Contributions in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16528-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T06:53:06Z","timestamp":1676011986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16528-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319165271","9783319165288"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16528-8_36","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}