{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T06:40:25Z","timestamp":1741761625029,"version":"3.38.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,22]]},"DOI":"10.1109\/aiccsa63423.2024.10912537","type":"proceedings-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T17:30:46Z","timestamp":1741714246000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Identification Management for Zero Trust Through Network Analysis"],"prefix":"10.1109","author":[{"given":"Amal","family":"Alshehri","sequence":"first","affiliation":[{"name":"University of North Texas,Department of Computer Science &#x0026; Engineering"}]},{"given":"Burak","family":"Tufekci","sequence":"additional","affiliation":[{"name":"University of North Texas,Department of Computer Science &#x0026; Engineering"}]},{"given":"Cihan","family":"Tunc","sequence":"additional","affiliation":[{"name":"University of North Texas,Department of Computer Science &#x0026; Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2018.00037"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5366222"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107174"},{"journal-title":"IoTAC","article-title":"Iot malware attacks up by 37% in the first half of 2023","year":"2023","key":"ref4"},{"volume-title":"2023 threatlabz report indicates 400% growth in iot malware attacks","year":"2023","author":"ThreatLabz","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2017.7945418"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW55968.2022.00034"},{"key":"ref9","first-page":"207","article-title":"Zero trust architecture","volume":"800","author":"Stafford","year":"2020","journal-title":"NIST special publication"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6476274"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.13052\/nbjict1902-097X.2018.010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030566"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3326356"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSDE59766.2023.10487721"},{"journal-title":"MQTT","article-title":"Mqtt: The standard for iot messaging","year":"2024","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2016.07.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.10.118"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.38094\/jastt20165"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1996.549118"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2016.01.011"},{"key":"ref21","first-page":"2825","volume-title":"Scikit-learn: Machine learning in Python","author":"Pedregosa","year":"2011"},{"volume-title":"Accuracy, precision, recall & fl","year":"2023","author":"Klu","key":"ref22"}],"event":{"name":"2024 IEEE\/ACS 21st International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2024,10,22]]},"location":"Sousse, Tunisia","end":{"date-parts":[[2024,10,26]]}},"container-title":["2024 IEEE\/ACS 21st International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10912072\/10912519\/10912537.pdf?arnumber=10912537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T05:59:33Z","timestamp":1741759173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10912537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,22]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/aiccsa63423.2024.10912537","relation":{},"subject":[],"published":{"date-parts":[[2024,10,22]]}}}