{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T00:49:41Z","timestamp":1774140581608,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1836601"],"award-info":[{"award-number":["CNS-1836601"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"iCyPhy Research Center (Industrial Cyber-Physical Systems"},{"DOI":"10.13039\/501100004830","name":"Siemens","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004830","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006761","name":"Bureau of Educational and Cultural Affairs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006761","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2901509","type":"journal-article","created":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T14:50:56Z","timestamp":1551106256000},"page":"27244-27256","source":"Crossref","is-referenced-by-count":12,"title":["On Enabling Technologies for the Internet of Important Things"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8833-4117","authenticated-orcid":false,"given":"Marten","family":"Lohstroh","sequence":"first","affiliation":[]},{"given":"Hokeun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"John C.","family":"Eidson","sequence":"additional","affiliation":[]},{"given":"Chadlia","family":"Jerad","sequence":"additional","affiliation":[]},{"given":"Beth","family":"Osyk","sequence":"additional","affiliation":[]},{"given":"Edward A.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Don&#x2019;t call us, We&#x2019;ll call you: Characterizing callbacks in javascript","author":"gallaba","year":"2015","journal-title":"Proc Int'l Symp on Empirical Software Engineering and Measurement (ESEM)"},{"key":"ref38","article-title":"Discrete-event models","author":"lee","year":"2014","journal-title":"System Design Modeling and Simulation Using Ptolemy II"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506426"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49498-1_2"},{"key":"ref31","article-title":"PILOT: An actor-oriented learning and optimization toolkit","author":"akkaya","year":"2015","journal-title":"International Workshop on Robotic Sensor Networks"},{"key":"ref30","article-title":"Data-driven cyber-physical systems via real-time stream analytics and machine learning","author":"akkaya","year":"2016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.059"},{"key":"ref36","first-page":"1","article-title":"The emergence of networking abstractions and techniques in TinyOS","author":"levis","year":"2004","journal-title":"Proc 1st USENIX Symp Netw Syst Design Implement (NSDI '04)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1992.753322"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.180"},{"key":"ref28","article-title":"New opportunities for timing with SDN and NFV","author":"stein","year":"2015","journal-title":"Proc of its"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161237"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2599640"},{"key":"ref2","author":"hilton","year":"2016","journal-title":"Dyn Analysis Summary of Friday October 21 Attack"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/253769.253801"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3137003.3137010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/514183.514185"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.24"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCS.2015.7324674"},{"key":"ref23","author":"eidson","year":"2006","journal-title":"Measurement Control and Communication Using IEEE 1588"},{"key":"ref26","article-title":"Sentinel project&#x2014;Report on GNSS vulnerabilitiies","author":"curry","year":"2014"},{"key":"ref25","first-page":"936","article-title":"The white rabbit project","author":"serrano","year":"2009","journal-title":"Proc 12th Int Conf Accel Large Exp Phys Control Syst"},{"key":"ref50","author":"virding","year":"1996","journal-title":"Concurrent Programming in Erlang"},{"key":"ref51","author":"m\u00fcller","year":"2016","journal-title":"Now - The Physics of Time"},{"key":"ref58","first-page":"317","article-title":"A predictable and command-level priority-based DRAM controller for mixed-criticality systems","author":"kim","year":"2015","journal-title":"Proc IEEE Real-Time and Embedded Technol Appl Symp (RTAS)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2014.6925994"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.153"},{"key":"ref55","first-page":"112","article-title":"A time-driven scheduling model for real-time systems","author":"jensen","year":"1985","journal-title":"Proc IEEE Real-Time Syst Symp (RTSS)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2728606.2728629"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/s150304837"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11180.001.0001"},{"key":"ref10","author":"morris","year":"2017","journal-title":"Google&#x2019;s Latest Failure Shows How Immature its Hardware IS"},{"key":"ref11","author":"tung","year":"2016","journal-title":"Mozilla to China&#x2019;s WoSign We&#x2019;ll Kill Firefox Trust in You After Mis-Issued GitHub Certs"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22969-0_2"},{"key":"ref12","author":"seltzer","year":"2013","journal-title":"BGP Spoofing&#x2014;Why Nothing on the Internet is Actually Secure"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2812598"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3680960"},{"key":"ref16","year":"2016","journal-title":"Easy Hackers Take Down a Hospital"},{"key":"ref17","author":"marr","year":"2018","journal-title":"Why The Internet Of Medical Things (IoMT) Will Start To Transform Healthcare In 2018"},{"key":"ref18","author":"mathews","year":"2016","journal-title":"Hackers use DDoS Attack to Cut Heat to Apartments"},{"key":"ref19","article-title":"Corero DDoS trends report|Q2&#x2013;Q3 2017","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831354"},{"key":"ref5","year":"2017","journal-title":"How the AWS IoT Platform Works&#x2014;Amazon Web Services"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3054980"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6313049"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2016.18"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1978.810404"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-96757-3"},{"key":"ref48","author":"galletly","year":"1996","journal-title":"OCCAM 2"},{"key":"ref47","author":"burns","year":"2001","journal-title":"Real-Time Systems and Programming Languages Ada Real-Time Java and C\/Real-Time POSIX"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/2.7053"},{"key":"ref41","article-title":"A javascript extension providing deterministic temporal semantics for the Internet of things","author":"jerad","year":"2017"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/359763.359798"},{"key":"ref43","author":"buttazzo","year":"2005","journal-title":"Hard Real-Time Computing Systems Predictable Scheduling Algorithms and Applications"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08651508.pdf?arnumber=8651508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:54:09Z","timestamp":1641988449000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8651508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2901509","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}