{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:36:24Z","timestamp":1768012584561,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/csnet64211.2024.10851733","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:35:01Z","timestamp":1738089301000},"page":"248-253","source":"Crossref","is-referenced-by-count":5,"title":["Pirates of the MQTT: Raiding IIoT Systems with a Rogue Client"],"prefix":"10.1109","author":[{"given":"Wael","family":"Alsabbagh","sequence":"first","affiliation":[{"name":"Brandenburg University of Technology Cottbus-Senftenberg,Cottbus,Germany"}]},{"given":"Samuel","family":"Amogbonjaye","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology Cottbus-Senftenberg,Cottbus,Germany"}]},{"given":"Chaerin","family":"Kim","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology Cottbus-Senftenberg,Cottbus,Germany"}]},{"given":"Peter","family":"Langend\u00f6rfer","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology Cottbus-Senftenberg,Cottbus,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ojies.2023.3335976"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/svcc61185.2024.10637363"},{"key":"ref3","article-title":"A Payload of Lies: False Data Injection Attacks on MQTT-based IIoT Systems","volume-title":"2024 Annual Conference of the IEEE Industrial Electronics Society (lECON)","author":"Alsabbagh"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CIoT63799.2024.10757025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2016.7503802"},{"key":"ref7","volume-title":"Comparison of authentication options for MQTT communication in an IoT basedsmart grid solution","author":"Tewolde","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud49737.2020.00032"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/iced.2016.7804660"},{"key":"ref10","first-page":"613","article-title":"Being hacked: Under-standing victims\u2019 experiences of IoT hacking","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Rostami","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/gcwcn.2018.8668630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2023.3331552"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/dasc-picom-cbdcom-cyberscitech49142.2020.00020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3308195"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/lars\/sbr\/wre56824.2022.9995868"}],"event":{"name":"2024 8th Cyber Security in Networking Conference (CSNet)","location":"Paris, France","start":{"date-parts":[[2024,12,4]]},"end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 8th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10851715\/10851472\/10851733.pdf?arnumber=10851733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:44:58Z","timestamp":1738133098000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10851733\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/csnet64211.2024.10851733","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}