{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T19:47:12Z","timestamp":1748548032004,"version":"3.30.2"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008238","name":"Hitachi","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008238","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/commnet63022.2024.10793300","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T19:09:17Z","timestamp":1734462557000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["MQTT-MTD: Integrating Moving Target Defense into MQTT Protocol as an Alternative to TLS"],"prefix":"10.1109","author":[{"given":"Kentaro","family":"Kusumi","sequence":"first","affiliation":[{"name":"Kyushu University,School of Engineering"}]},{"given":"Hiroshi","family":"Koide","sequence":"additional","affiliation":[{"name":"Research Institute for Information Technology, Kyushu University"}]}],"member":"263","reference":[{"article-title":"MQTT Version 3.1.1. OASIS Standard","year":"2014","author":"Banks","key":"ref1"},{"volume-title":"MQTT Version 5.0. OASIS Standard.","year":"2019","author":"Banks","key":"ref2"},{"journal-title":"MQTT topics - AWS IoT Core","year":"2024","key":"ref3"},{"year":"2011","key":"ref4","article-title":"Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program"},{"volume-title":"Current IoT Forecast Highlights - Transforma Insights","year":"2024","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s110706799"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352562"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1601321"},{"issue":"2","key":"ref10","first-page":"104","article-title":"A Framework of Moving Target Defenses for the Internet of Things","volume":"8","author":"Oo","year":"2019","journal-title":"Bulletin of Networking, Computing, Systems, and Software"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3054997"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3467021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24138\/jcomss.v14i4.604"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3477086.3480838"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3409334.3452067"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3412030"},{"key":"ref18","article-title":"Man-in-the-middle attacks on mqtt-based iot using bert based adversarial message generation","volume-title":"KDD 2020 AIoT Workshop","volume":"8","author":"Wong"},{"year":"2024","key":"ref19","article-title":"ESP32-C3 Technical Reference Manual"},{"article-title":"Welcome to MQTT-PWN! -MQTT-PWN 1.0 documentation","year":"2018","author":"Abeles","key":"ref20"}],"event":{"name":"2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet)","start":{"date-parts":[[2024,12,4]]},"location":"Rabat, Morocco","end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10793106\/10793244\/10793300.pdf?arnumber=10793300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T08:13:31Z","timestamp":1734509611000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10793300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/commnet63022.2024.10793300","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}