{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:47:26Z","timestamp":1730202446756,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/cccs.2019.8888136","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T19:58:48Z","timestamp":1572551928000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["BRAIN-IoT: Model-Based Framework for Dependable Sensing and Actuation in Intelligent Decentralized IoT Systems"],"prefix":"10.1109","author":[{"given":"Davide","family":"Conzon","sequence":"first","affiliation":[]},{"given":"Mohammad Rifat Ahmmad","family":"Rashid","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Angel","family":"Soriano","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Nicholson","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Ferrera","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2019","key":"ref10","article-title":"CYBER; Cyber Security for Consumer Internet of Things"},{"key":"ref11","article-title":"The EU General Data Protection Regulation (GDPR)","author":"voigt","year":"2017","journal-title":"A Practical Guide 1st Ed Cham Springer International Publishing"},{"journal-title":"Drawdown the most comprehensive plan ever proposed to reverse global warming","year":"2017","author":"wilkinson","key":"ref12"},{"journal-title":"IoT Analytics","article-title":"List of 450 iot platform companies","year":"2017","key":"ref13"},{"key":"ref14","first-page":"373","article-title":"Sharing user iot devices in the cloud","author":"gurgen","year":"2014","journal-title":"IEEE World Forum on Internet of Things (WF-IoT)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref16","article-title":"The Datagram Transport Layer Security (DTLS) Protocol Version 1.3","author":"rescorla","year":"2016","journal-title":"Work in Progress draft-rescorla-tls-dtls13-00"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.005"},{"key":"ref18","article-title":"Understanding the internet of things: definition, potentials, and societal role of a fast evolving paradigm","volume":"56","author":"atzori","year":"2016","journal-title":"Ad Hoc Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2006.27"},{"journal-title":"European Commission","article-title":"Horizon 2020 Work Programme 2016-2017:Internet Of Things Large Scale Pilots","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2017.7943156"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319275"},{"journal-title":"Signals and boundaries Building blocks for complex adaptive systems","year":"2012","author":"vermesan","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/WorldS4.2019.8903975","article-title":"Dynamic fog computing platform for event-driven deployment and orchestration of distributed internet of things applications","author":"nicholson","year":"2019","journal-title":"2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4)"},{"key":"ref7","article-title":"Iot european security and privacy projects: Integration, architectures and interoperability","author":"ferrera","year":"2018","journal-title":"Next Generation Internet of Things Distributed Intelligence at the Edge and Human Machine-to-Machine Cooperation"},{"journal-title":"MACH DES RES","article-title":"M2M Global Forecast & Analysis Report","year":"2015","key":"ref2"},{"key":"ref1","article-title":"Unlocking the potential of the Internet of Things","author":"james manyika","year":"2015","journal-title":"McKinsey Digital"},{"journal-title":"Strategic Opportunities for 21st Century Cyber-Physical Systems","year":"2012","author":"cohen","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16277-0_19"},{"journal-title":"The paremus service fabric A technical overview","year":"2009","key":"ref22"},{"key":"ref21","article-title":"Osgi core release 7","author":"alliance","year":"2018","journal-title":"OSGi alliance"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"}],"event":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","start":{"date-parts":[[2019,10,10]]},"location":"Rome, Italy","end":{"date-parts":[[2019,10,12]]}},"container-title":["2019 4th International Conference on Computing, Communications and Security (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8883094\/8888030\/08888136.pdf?arnumber=8888136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:49:06Z","timestamp":1658080146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8888136\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cccs.2019.8888136","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}