{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:13:39Z","timestamp":1761581619209,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/apnoms.2017.8094190","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T22:16:37Z","timestamp":1509660997000},"page":"123-128","source":"Crossref","is-referenced-by-count":5,"title":["Firmware over the air for home cybersecurity in the Internet of Things"],"prefix":"10.1109","author":[{"given":"Che-Chun","family":"Teng","sequence":"first","affiliation":[]},{"given":"Jia-Wei","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Ya-Shian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chin-Ping","family":"Chuang","sequence":"additional","affiliation":[]},{"given":"Mei-Chun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The dolev-yao intruder is the most powerful attacker","volume":"1","author":"cervesato","year":"2001","journal-title":"16th Annual Symposium on Logic in Computer ScienceLICS"},{"journal-title":"Technical report Imperva Application Defense Center","article-title":"Consumer password worst practices","year":"2010","key":"ref11"},{"journal-title":"Broadband Forum","article-title":"TR-069, CPE WAN Management Protocol v1.3. Technical report","year":"2011","key":"ref12"},{"key":"ref13","article-title":"Integrating flexible support for security policies into the Linux operating system","author":"peter loscocco","year":"2001","journal-title":"Proceedings of the FREENIX Track 2001 USENIX Annual Technical Conference Boston USENIX Association"},{"key":"ref14","first-page":"1","article-title":"A trusted Linux client (TLC)","volume":"1","author":"david","year":"2005","journal-title":"Technical Paper IBM Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.017"},{"key":"ref16","article-title":"IoT Privacy and Security Challenges for Smart Home Environments","volume":"7 3","author":"huichen","year":"2016","journal-title":"Information"},{"journal-title":"Federal Office for Information Security Germany","article-title":"Cyber-Angriffe auf Telekom: BSI fordert Umsetzung geeigneter Schutzma?nahmen","year":"2016","key":"ref4"},{"journal-title":"alert TA16&#x2013;288A","article-title":"Heightened DDoS Threat Posed by Mirai and Other Botnets","year":"2016","key":"ref3"},{"key":"ref6","first-page":"10","article-title":"Webcam hack shows vulnerability of connected devices","author":"tereza","year":"2016","journal-title":"Engineering & Technology 11 11"},{"key":"ref5","first-page":"76","article-title":"Botnets and Internet of Things Security","author":"elisa","year":"2017","journal-title":"Computer 50 2"},{"journal-title":"Over the air mobile device software management","year":"0","author":"parixit","key":"ref8"},{"journal-title":"vision and whitepaper","article-title":"HGI. Home gateway initiative","year":"2005","key":"ref7"},{"key":"ref2","first-page":"1","article-title":"Threat implications of the Internet of Things","author":"covington","year":"2013","journal-title":"2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2013) CyCon"},{"journal-title":"Will Be in Use in 2017","article-title":"Gartner Inc., &#x201C;Gartner Says 8.4 Billion Connected &#x201C;Things","year":"2017","key":"ref1"},{"key":"ref9","article-title":"Security and privacy in the Internet of Things: Current status and open issues","author":"mohamed","year":"2014","journal-title":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) PRISMS"}],"event":{"name":"2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2017,9,27]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2017,9,29]]}},"container-title":["2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8082389\/8094028\/08094190.pdf?arnumber=8094190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T16:06:01Z","timestamp":1512057961000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8094190\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/apnoms.2017.8094190","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}