{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:21:05Z","timestamp":1740169265954,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001665","name":"French National Research Agency in the framework of the \u201cInvestissements d\u2019avenir\u201d Program","doi-asserted-by":"publisher","award":["ANR-15-IDEX-02"],"award-info":[{"award-number":["ANR-15-IDEX-02"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3128287","type":"journal-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T22:16:34Z","timestamp":1637014594000},"page":"154902-154913","source":"Crossref","is-referenced-by-count":1,"title":["Systematic Mapping Study of Security in Multi-Embedded-Agent Systems"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6811-3886","authenticated-orcid":false,"given":"Arthur","family":"Baudet","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0493-9096","authenticated-orcid":false,"given":"Oum-El-Kheir","family":"Aktouf","sequence":"additional","affiliation":[]},{"given":"Annabelle","family":"Mercier","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Elbaz-Vincent","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3148"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2016.031"},{"journal-title":"Sciencedirect Advanced Search Tool","year":"2020","author":"v","key":"ref31"},{"journal-title":"Springer Search Tool","year":"2020","key":"ref30"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2013.6726582"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0140"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010090405266"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25928-2_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0006594802240235"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10472-016-9530-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2017.57"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3712-z"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/S026988891800005X"},{"journal-title":"Security in Computing","year":"2006","author":"pfleeger","key":"ref17"},{"journal-title":"Managing Information Systems Security and Privacy","year":"2006","author":"trcek","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31513-8_3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2222034"},{"journal-title":"ACM Digital Library Advanced Search Tool","year":"2020","key":"ref28"},{"journal-title":"Systematic Mapping Study of Security in Multi-Embedded-Agent Systems Dataset","year":"2021","author":"baudet","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJAOSE.2015.078435"},{"journal-title":"IEEE Xplore Advanced Search Tool","year":"2020","key":"ref29"},{"key":"ref5","first-page":"27","author":"m\u00fcller","year":"2014","journal-title":"Application Impact of Multi-agent Systems and Technologies A Survey"},{"key":"ref8","first-page":"79","article-title":"Multiagent systems and societies of agents","volume":"1","author":"huhns","year":"1999","journal-title":"Multiagent Syst Modern Approach Distrib Artif Intell"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/35.689634"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"article-title":"Guidelines for performing systematic literature reviews in software engineering","year":"2007","author":"kitchenham","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888900008122"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9343-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.09.130"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44631-1_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2019.101728"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s11768-016-5123-9","article-title":"A survey on the security of cyber-physical systems","volume":"14","author":"guangyu","year":"2016","journal-title":"Control Theory Technol"},{"article-title":"Systematic review in software engineering","year":"2005","author":"biolchini","key":"ref26"},{"key":"ref25","first-page":"1","article-title":"Cybersecurity issues in wireless sensor networks: Current challenges and solutions","volume":"16","author":"boubiche","year":"2020","journal-title":"Wireless Pers Commun"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09615051.pdf?arnumber=9615051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T20:53:47Z","timestamp":1646686427000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3128287","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}