{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T08:06:54Z","timestamp":1771747614466,"version":"3.50.1"},"reference-count":179,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"RU Grants (under Faculties) of the Malaysia Research University Network (MRUN), University of Malaya, Malaysia","award":["GPF017D-2019"],"award-info":[{"award-number":["GPF017D-2019"]}]},{"name":"Faculty of Computer Science and Information Technology, University of Malaya"},{"name":"Center for Research in Industry 4.0, University of Malaya"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3065123","type":"journal-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T21:17:48Z","timestamp":1615411068000},"page":"41757-41786","source":"Crossref","is-referenced-by-count":37,"title":["Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey"],"prefix":"10.1109","volume":"9","author":[{"given":"Noman","family":"Mazhar","sequence":"first","affiliation":[]},{"given":"Rosli","family":"Salleh","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Zeeshan","sequence":"additional","affiliation":[]},{"given":"M. Muzaffar","family":"Hameed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.3390\/s20154265"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110451"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00111"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/3360322.3361004"},{"key":"ref173","article-title":"SoK: Beyond IoT MUD deployments&#x2014;Challenges and future directions","author":"feraudo","year":"2020","journal-title":"arXiv 2004 08003"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971213"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3010023"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23357-0_4"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/IPTCOMM.2018.8567639"},{"key":"ref168","year":"2013","journal-title":"EXtensible Access Control Markup Language (XACML) Version 3 0"},{"key":"ref169","author":"selander","year":"2019","journal-title":"Ephemeral Diffie-Hellman Over COSE (EDHOC)"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNS.2015.7292385"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2344013"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2015.11.008"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: Attack and defense strategies","volume":"20","author":"xu","year":"2006","journal-title":"IEEE Netw"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.11.003"},{"key":"ref30","first-page":"1","article-title":"RFID security: Attacks, countermeasures and challenges","author":"burmester","year":"2007","journal-title":"Proc 5th RFID Acad Convocation RFID J Conf"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref36","first-page":"459","article-title":"A taxonomy of attacks in RPL-based Internet of Things","volume":"18","author":"mayzaud","year":"2016","journal-title":"Int J Netw Secur"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDECOM.2011.5738547"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref28","first-page":"374","article-title":"Study on security architecture in the Internet of Things","volume":"1","author":"li","year":"2012","journal-title":"Proc Int Conf Meas Inf Control"},{"key":"ref27","first-page":"14","article-title":"Classification of RFID attacks","volume":"15693","author":"mitrokotsa","year":"2010","journal-title":"GEN"},{"key":"ref179","author":"hamza","year":"2018","journal-title":"Mudgee"},{"key":"ref29","first-page":"12","article-title":"Internet of Things: Architecture and security","volume":"3","author":"uttarkar","year":"2014","journal-title":"Int J Comput Appl"},{"key":"ref20","author":"rock","year":"2020","journal-title":"Report 57% of IoT Devices Vulnerable to Severe Attack"},{"key":"ref22","year":"2020","journal-title":"Exploit Database Remote"},{"key":"ref21","year":"2020","journal-title":"Exploit Database Local"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973622"},{"key":"ref23","author":"ziv chang","year":"2019","journal-title":"The IoT Attack Surface Threats and Security Solutions&#x2014;Security News"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.3390\/s19061433"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.83"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO.2017.8289757"},{"key":"ref25","first-page":"77","article-title":"Wireless network security: Vulnerabilities, threats and countermeasures","volume":"3","author":"choi","year":"2008","journal-title":"Int J Multimedia Ubiquitous Eng"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58424-9_35"},{"key":"ref51","author":"william","year":"2008","journal-title":"Computer Security Principles and Practice"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720962999"},{"key":"ref153","first-page":"756","article-title":"D&#x00CF;oT: A federated self-learning anomaly detection system for IoT","author":"nguyen","year":"2019","journal-title":"Proc IEEE 39th Int Conf Distrib Comput Syst (ICDCS)"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF49715.2020.9221407"},{"key":"ref155","first-page":"305","article-title":"IoT device profiling: From MUD files to $S \\times C$\n contracts","author":"matth\u00edasson","year":"2020","journal-title":"Proc Open Identity Summit"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00008"},{"key":"ref152","year":"2021","journal-title":"5 November 2020 23 54 UTC"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394528"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101968"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939272"},{"key":"ref148","article-title":"The FORA fog computing platform for industrial IoT","author":"pop","year":"2020","journal-title":"arXiv 2007 02696"},{"key":"ref149","article-title":"Architecture analysis and design language (AADL)","author":"as","year":"2004"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2017.7915573"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1039-6"},{"key":"ref57","first-page":"1","article-title":"A survey on comparative analysis of tools for the detection of ARP poisoning","author":"aggarwal","year":"2017","journal-title":"Proc 2nd Int Conf Telecommun Netw (TEL-NET)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00944-z"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT2.2015.7292734"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/I2C2.2017.8321914"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821514"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7298r1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.5120\/5056-7374"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7049"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947157"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904123"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.3390\/s20071882"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022272"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229566"},{"key":"ref161","author":"moran","year":"2019","journal-title":"A Firmwar Update Architecture for Internet of Things Devices"},{"key":"ref160","first-page":"1","article-title":"Updating IoT devices: Challenges and potential approaches","author":"hernandez-ramos","year":"2020","journal-title":"Proc Global Internet Things Summit (GIoTS)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s20071863"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref6","first-page":"361","article-title":"Smartauth: User-centered authorization for the Internet of Things","author":"tian","year":"2017","journal-title":"Proc 26th Secur Symp (USENIX Secur )"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.3002423"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8520"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/jip.1482"},{"key":"ref7","first-page":"531","article-title":"Flowfence: Practical data protection for emerging iot application frameworks","author":"fernandes","year":"2016","journal-title":"Proc 25th USENIX Secur Symp (USENIX Secur )"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2019.8931384"},{"key":"ref158","article-title":"The truth about blockchain harvard business review","author":"iansiti","year":"2017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8259"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCC.2018.8390461"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2716115"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.47893\/IJSSAN.2011.1015"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.09.001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2737524"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTECH.2011.5942091"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524930"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.225"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110329"},{"key":"ref126","year":"2020","journal-title":"OpenWRT wireless freedom"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8612"},{"key":"ref124","author":"mongodb","year":"2016","journal-title":"Mongodb"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055253"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1012.0352"},{"key":"ref128","first-page":"15","article-title":"SDN security considerations in the data center","author":"mcbride","year":"2013","journal-title":"Open Networking Foundation-ONF SOLUTION BRIEF"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_10"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"ref130","year":"2019","journal-title":"Virtual Network Function (VNF) Definition Architecture and Design"},{"key":"ref77","article-title":"Detection of unauthorized IoT devices using machine learning techniques","author":"meidan","year":"2017","journal-title":"arXiv 1709 04647"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00023"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148821"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3384217.3386395"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.3390\/sym12091576"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110409"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761559"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.3005388"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3743"},{"key":"ref136","first-page":"1","article-title":"Transparent microsegmentation in smart home IoT networks","author":"osman","year":"2020","journal-title":"Proc 3rd USENIX Workshop Hot Topics Edge Comput (HotEdge)"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE51007.2020.00011"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2987780"},{"key":"ref137","first-page":"1","article-title":"Towards an architecture for trusted edge IoT security gateways","author":"mccormack","year":"2020","journal-title":"Proc 3rd USENIX Workshop Hot Topics Edge Comput (HotEdge)"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.55"},{"key":"ref139","article-title":"IoT network security: Requirements, threats, and countermeasures","author":"hamza","year":"2020","journal-title":"arXiv 2008 09339"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85538-5_22"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_22"},{"key":"ref63","first-page":"2177","article-title":"IoT sentinel: Automated device-type identification for security enforcement in IoT","author":"miettinen","year":"2017","journal-title":"Proc IEEE 37th Int Conf Distrib Comput Syst (ICDCS)"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2833206"},{"key":"ref140","first-page":"1","article-title":"Throwing MUD into the FOG: Defending IoT and fog by expanding MUD to fog network","author":"andalibi","year":"2019","journal-title":"Proc 2nd USENIX Workshop Hot Topics Edge Comput (HotEdge)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"ref141","author":"rawat","year":"2017","journal-title":"Industrial Internet of Things Cybermanufacturing Systems"},{"key":"ref66","article-title":"Network time protocol (version 3) specification, implementation and analysis,&#x2019; Internet request for comments","author":"mills","year":"1992"},{"key":"ref142","first-page":"1","article-title":"Openfog reference architecture for fog computing","year":"2017","journal-title":"Proc Archit Work Group"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2030"},{"key":"ref143","year":"2015","journal-title":"Industrial Internet reference architecture"},{"key":"ref68","first-page":"53","article-title":"W.C.Jakes: &#x2018;Microwave mobile communications","volume":"1","author":"whatley","year":"1974","journal-title":"J Inf Technol Educ"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016937"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00117"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3000269"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.3390\/app9214576"},{"key":"ref1","year":"2015","journal-title":"Gratner Newsroom"},{"key":"ref109","year":"0"},{"key":"ref95","first-page":"1","article-title":"Challenges in deep learning","author":"angelov","year":"2016","journal-title":"Proc ESANN"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref94","article-title":"IoT device identification using deep learning","author":"kotak","year":"2020","journal-title":"arXiv 2002 11686"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2131"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2818"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/IOTAIS.2018.8600824"},{"key":"ref105","first-page":"1","article-title":"Link layer discovery protocol and MIB","volume":"20","author":"congdon","year":"2002","journal-title":"V1 0 May"},{"key":"ref91","first-page":"138","article-title":"A survey of semi-supervised learning","volume":"5","author":"sadarangani","year":"2016","journal-title":"International Journal of Research in Engineering Science & Technology"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2132"},{"key":"ref90","article-title":"Fundamental limitations of semi-supervised learning","author":"lu","year":"2009"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7170"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554398"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7042"},{"key":"ref112","first-page":"1829","article-title":"RFC2616: Hypertext transfer protocol&#x2013;HTTP\/1.1","volume":"1","author":"fielding","year":"1999","journal-title":"Status STANDARDS TRACK"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-018-1819-2"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3670"},{"key":"ref99","author":"joy","year":"2020","journal-title":"Pros and Cons of Reinforcement Learning"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref97","article-title":"Probabilistic reasoning and Bayesian networks","author":"mccloskey","year":"2000","journal-title":"Proc Neural Netw Mach Learn (ICSG)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8519"},{"key":"ref11","year":"2018","journal-title":"Manufacturer Usage Descriptions"},{"key":"ref12","first-page":"15a","author":"manufacturer","year":"2020","journal-title":"Securing small-business and home Internet of Things (IoT) devices"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1737"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229571"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314352"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3748"},{"key":"ref16","year":"2018","journal-title":"OWASP Internet of Things (IoT) Project"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2976075"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8250"},{"key":"ref17","first-page":"717","article-title":"SDN based intrusion detection and prevention systems using manufacturer usage description: A survey","volume":"11","author":"mazhar","year":"2020","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2865604"},{"key":"ref18","year":"2019","journal-title":"Internet of Things Market Size Share & COVID-19 Impact Analysis"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref119","year":"2020","journal-title":"802 1x Overview and EAP Types"},{"key":"ref19","author":"gyarmathy","year":"2020","journal-title":"Comprehensive guide to iot statistics you need to know in 2020"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/SCVT.2017.8240312"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5912"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5280"},{"key":"ref116","author":"seaman","year":"2018"},{"key":"ref80","article-title":"IoTSense: Behavioral fingerprinting of IoT devices","author":"bezawada","year":"2018","journal-title":"arXiv 1804 03852"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6268"},{"key":"ref120","article-title":"Securing small business and home Internet of Things (IoT) devices: Mitigating network-based attacks using manufacturer usage description (MUD)","author":"dodson","year":"2020"},{"key":"ref89","first-page":"1","article-title":"An IoT device identification method based on semi-supervised learning","author":"fan","year":"2020","journal-title":"Proc 16th Int Conf Netw Service Manage (CNSM)"},{"key":"ref121","year":"2018","journal-title":"The Open Source MUD Manager"},{"key":"ref122","first-page":"1","article-title":"Soft MUD: Implementing manufacturer usage descriptions on OpenFlow SDN switches","author":"ranganathan","year":"2019","journal-title":"Proc Int Conf Netw (ICN)"},{"key":"ref123","author":"dekok","year":"2008","journal-title":"FreeRADIUS"},{"key":"ref85","first-page":"1","article-title":"An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach","volume":"10","author":"hosseinpour","year":"2016","journal-title":"Int J Digit Content Technol Appl"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.05.049"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0521-x"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148110"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09374442.pdf?arnumber=9374442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:04Z","timestamp":1639770904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9374442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":179,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3065123","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}