{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:20:36Z","timestamp":1730211636910,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,31]]},"DOI":"10.1109\/csr57506.2023.10224938","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:50:16Z","timestamp":1693245016000},"page":"636-640","source":"Crossref","is-referenced-by-count":0,"title":["How to secure the IoT-based surveillance systems in an ELEGANT way"],"prefix":"10.1109","author":[{"given":"Aleksandra","family":"Pawlicka","sequence":"first","affiliation":[{"name":"ITTI,Poznan,Poland"}]},{"given":"Damian","family":"Puchalski","sequence":"additional","affiliation":[{"name":"ITTI,Poznan,Poland"}]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"ITTI,Poznan,Poland"}]},{"given":"Rafa\u2224","family":"Kozik","sequence":"additional","affiliation":[{"name":"ITTI,Poznan,Poland"}]},{"given":"Michal","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"ITTI,Poznan,Poland"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988854"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/174383"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"4319","DOI":"10.3390\/s21134319","article-title":"The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset","volume":"21","author":"mihailescu","year":"2021","journal-title":"SENSORS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917623"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212647"},{"key":"ref36","first-page":"1612","article-title":"A short introduction to boosting","volume":"14","author":"freund","year":"1999","journal-title":"Journal-Japanese Society For Artificial Intelligence"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2995289.2995290"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/s19112424"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010016"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8753870"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50423-6_15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.05.003"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.3390\/electronics11071126","article-title":"Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework","volume":"11","author":"mazhar","year":"2022","journal-title":"Electronics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01568-7"},{"journal-title":"Threat Modeling Designing for Security","year":"2014","author":"shostack","key":"ref16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1331033"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2021.07.010"},{"journal-title":"Armies of hacked iot devices launch unprecedented ddos attacks - cso online","year":"0","key":"ref24"},{"journal-title":"3 steps Cyber breach recovery plan - based on verkada breach","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/app11125571"},{"journal-title":"Botnet mirai and largest internet blackout seqred","year":"0","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409181"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s22166164"},{"journal-title":"CSA","article-title":"Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products","year":"2016","key":"ref21"},{"journal-title":"Bosch-2018-1202-bt - bosch psirt","year":"0","key":"ref28"},{"journal-title":"vulnerabilities-in-foscam-ip-cameras_report pdf","year":"0","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s20174806"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3157"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"ref9","article-title":"A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing","author":"moustafa","year":"2019","journal-title":"ArXiv"},{"key":"ref4","article-title":"Detection of Cyber-attacks Traces in IoT Data","volume":"26","author":"dutta","year":"2020","journal-title":"Journal of Universal Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/info12040154"},{"journal-title":"ETA Project Website","article-title":"ELEGANT project website","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.002"}],"event":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2023,7,31]]},"location":"Venice, Italy","end":{"date-parts":[[2023,8,2]]}},"container-title":["2023 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10224900\/10224823\/10224938.pdf?arnumber=10224938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:51:39Z","timestamp":1695664299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10224938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,31]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/csr57506.2023.10224938","relation":{},"subject":[],"published":{"date-parts":[[2023,7,31]]}}}