{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:10:48Z","timestamp":1729613448073,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/comsnets.2019.8711243","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T23:00:56Z","timestamp":1557788456000},"page":"383-390","source":"Crossref","is-referenced-by-count":1,"title":["PlumeWalk: Towards Threat Provenance Localization for IoT Networks"],"prefix":"10.1109","author":[{"given":"Aditya","family":"Ahuja","sequence":"first","affiliation":[]},{"given":"Himanshu","family":"Gandhi","sequence":"additional","affiliation":[]},{"given":"Rajeev","family":"Shorey","sequence":"additional","affiliation":[]},{"given":"Devadatta","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Tew","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/bs.host.2016.07.001","article-title":"Cygraph: graphbased analytics and visualization for cybersecurity","volume":"35","author":"noel","year":"2016","journal-title":"Handbook of Statistics"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2017.02.06"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1145\/2991561.2998467","article-title":"Splitpipeline model for worm propagation over iot","author":"choi","year":"2016","journal-title":"Proceedings of the International Conference on the Internet of Things"},{"journal-title":"Ptp approach in network security for misbehavior detection","year":"2015","author":"pathak","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860484"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9"},{"key":"ref35","first-page":"18","article-title":"Machine to machine trust in the iot era","author":"liu","year":"2016","journal-title":"AAMAS-TRUST"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.10.012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2334272"},{"journal-title":"A Taxonomy of Network and Computer Attack Methodologies","year":"2003","author":"hansman","key":"ref11"},{"key":"ref12","article-title":"Attack taxonomies and ontologies","author":"abrek","year":"2015","journal-title":"Seminar Future Internet SS2014 Network Architectures and Services"},{"journal-title":"AVOIDIT A Cyber Attack Taxonomy","year":"2009","author":"simmons","key":"ref13"},{"journal-title":"WCry\/WanaCry Ransomware Technical Analysis","year":"2017","author":"rousseau","key":"ref14"},{"journal-title":"The industrial internet of things reference architecture","year":"2017","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132753"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66505-4_3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-014-1031-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2007.11.001"},{"key":"ref3","article-title":"Mirai and iot botnet analysis","author":"graham","year":"2017","journal-title":"RSA Conference"},{"journal-title":"A technical analysis of wannacry ransomware","year":"2017","author":"labs","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2696031"},{"key":"ref5","article-title":"Turning internet of things(iot) into internet of vulnerabilities (iov): Iot botnets","volume":"abs 1702 3681","author":"angrishi","year":"2017","journal-title":"CoRR"},{"journal-title":"Examples of a TLS Vulnerability and Attack","year":"2017","key":"ref8"},{"journal-title":"IoT Attack Surface Areas","year":"2017","key":"ref7"},{"key":"ref2","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"journal-title":"IoT Threat Advisory CVE-2017-7577","year":"2017","key":"ref9"},{"journal-title":"Gartner Says Worldwide IoT Security Spending to Reach $348 Million in 2016","year":"2016","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.312"},{"key":"ref22","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"roesch","year":"1999","journal-title":"LISA"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230851"},{"journal-title":"Complex Network","year":"2017","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638196"},{"key":"ref26","first-page":"287","article-title":"Finding the most prominent group in complex networks","volume":"20","author":"puzis","year":"2007","journal-title":"AI communications"},{"journal-title":"Betweenness Centrality","year":"2017","key":"ref25"}],"event":{"name":"2019 11th International Conference on Communication Systems & Networks (COMSNETS)","start":{"date-parts":[[2019,1,7]]},"location":"Bengaluru, India","end":{"date-parts":[[2019,1,11]]}},"container-title":["2019 11th International Conference on Communication Systems &amp; Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8703514\/8711008\/08711243.pdf?arnumber=8711243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T23:38:48Z","timestamp":1663457928000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8711243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2019.8711243","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}