{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T04:16:27Z","timestamp":1773288987103,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003141","name":"Consejo Nacional de Ciencia y Tecnolog\u00eda","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003069","name":"Instituto Polit\u00e9cnico Nacional","doi-asserted-by":"publisher","award":["SIP 1999"],"award-info":[{"award-number":["SIP 1999"]}],"id":[{"id":"10.13039\/501100003069","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003069","name":"Instituto Polit\u00e9cnico Nacional","doi-asserted-by":"publisher","award":["20210039"],"award-info":[{"award-number":["20210039"]}],"id":[{"id":"10.13039\/501100003069","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Department for Business, Energy and Industrial Strategy, U.K."}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3125979","type":"journal-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T22:35:42Z","timestamp":1636410942000},"page":"154112-154135","source":"Crossref","is-referenced-by-count":16,"title":["IoTsecM: A UML\/SysML Extension for Internet of Things Security Modeling"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3772-3651","authenticated-orcid":false,"given":"Ponciano Jorge","family":"Escamilla-Ambrosio","sequence":"first","affiliation":[]},{"given":"David Alejandro","family":"Robles-Ramirez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4024-8003","authenticated-orcid":false,"given":"Theo","family":"Tryfonas","sequence":"additional","affiliation":[]},{"given":"Abraham","family":"Rodriguez-Mota","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5212-350X","authenticated-orcid":false,"given":"Gina","family":"Gallegos-Garcia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2167-2792","authenticated-orcid":false,"given":"Moises","family":"Salinas-Rosales","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2009.5399279"},{"key":"ref38","first-page":"1","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"yan","year":"2016","journal-title":"Proc Hacking Conf"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2591635.2667184"},{"key":"ref31","article-title":"Hardware support for tamper-resistant and copy-resistant software","author":"boneh","year":"2000"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926814"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2018.06.033"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70008-X"},{"key":"ref35","author":"shostack","year":"2014","journal-title":"Threat Modeling Designing for Security"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref10","author":"schrecker","year":"2016","journal-title":"Industrial Internet of Things G4 Security framework"},{"key":"ref40","author":"mccarthy","year":"2016","journal-title":"Connected & Autonomous Vehicles Introducing the Future of Mobility"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICAT.2015.7340537"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2016.05.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2012.2226578"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45800-X_32"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICSCSR2013.9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2015.02.011"},{"key":"ref18","first-page":"8","article-title":"SysML-Sec: A SysML environment for the design and development of secure embedded systems","author":"apvrille","year":"2013","journal-title":"Proc Asia&#x2013;Pacific Council Syst Eng"},{"key":"ref19","first-page":"35","article-title":"SysML-Sec attack graphs: Compact representations for complex attacks","author":"apvrille","year":"2015","journal-title":"Proc Int Workshop Graph Models Secur"},{"key":"ref28","author":"russell","year":"2018","journal-title":"Practical Internet of Things Security Design a security framework for an Internet connected ecosystem"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2876939"},{"key":"ref27","author":"menezes","year":"2018","journal-title":"Handbook of Applied Cryptography"},{"key":"ref3","author":"kandaswamy","year":"2020","journal-title":"Blockchain-Based Transformation"},{"key":"ref6","year":"2019","journal-title":"Flourish"},{"key":"ref29","first-page":"213","article-title":"Can we trust trust?","author":"gambetta","year":"2013","journal-title":"Making Breaking Cooperation Relations Electronics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEAE.2017.20"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_42"},{"key":"ref7","article-title":"Internet of Things architecture IoT","author":"serbanati","year":"2012","journal-title":"Project Deliverable D4 2&#x2014;Concepts and Solutions for Privacy and Security in the Resolution Infrastructure"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NUiConE.2011.6153246"},{"key":"ref9","author":"lin","year":"2019","journal-title":"The industrial Internet of Things volume g1 Reference architecture"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64063-1_4"},{"key":"ref20","article-title":"IoTsecM: UML\/SysML extension for Internet of Things security modeling","author":"robles-ram\u00edrez","year":"2018"},{"key":"ref22","year":"2018","journal-title":"Papyrus"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73323-4_10"},{"key":"ref42","first-page":"1139","article-title":"Securing health applications using loTsecM security modelling: Dentify. Me app case study for urgent care management","volume":"23","author":"ambrosio","year":"2019","journal-title":"Computacin y Sistemas"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(88)90325-2"},{"key":"ref41","year":"2019","journal-title":"Amenaza"},{"key":"ref23","author":"bishop","year":"2003","journal-title":"Computer Security Art and Science"},{"key":"ref26","author":"calhoun","year":"2000","journal-title":"AAA Authorization Framework"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09605568.pdf?arnumber=9605568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T20:56:43Z","timestamp":1646686603000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9605568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3125979","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}