{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T08:38:07Z","timestamp":1761986287475,"version":"build-2065373602"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cts.2015.7210391","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:46:15Z","timestamp":1440107175000},"page":"27-34","source":"Crossref","is-referenced-by-count":24,"title":["Security and privacy grand challenges for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Glenn A.","family":"Fink","sequence":"first","affiliation":[]},{"given":"Dimitri V.","family":"Zarzhitsky","sequence":"additional","affiliation":[]},{"given":"Thomas E.","family":"Carroll","sequence":"additional","affiliation":[]},{"given":"Ethan D.","family":"Farquhar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Facebook lets users look back at decade","year":"2014","author":"snider","key":"ref33"},{"journal-title":"YouTube","article-title":"Statistics","year":"2015","key":"ref32"},{"key":"ref31","first-page":"1","article-title":"United States of America National Transportation Safety Board Office of Administrative Law Judges Decisional Order","author":"geraghty","year":"2014","journal-title":"Docket CP-217\/2012EA210009"},{"key":"ref30","article-title":"LG Smart TV caught collecting data on files stored on connected USB drives","author":"cushing","year":"2013","journal-title":"Techdirt Floor64"},{"key":"ref37","article-title":"Pay to play again: a cryptolocker variant goes after the gamers","author":"ilyin","year":"2015","journal-title":"Kaspersky Lab Business Kaspersky Lab ZAO"},{"journal-title":"Chaos Computer Club","article-title":"Fingerprint biometrics hacked again","year":"2014","key":"ref36"},{"key":"ref35","article-title":"Singapore an advanced surveillance state, but citizens don't mind","author":"lee","year":"2013","journal-title":"Tech in Asia"},{"key":"ref34","article-title":"Tracking & hacking: security and privacy gaps put American drivers at risk","author":"markey","year":"2015","journal-title":"Report for Congress"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011781"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1016527.1016537"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2302386"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2012.6341202"},{"key":"ref15","first-page":"91","article-title":"Person identification using full-body motion and anthropometric biometrics from Kinect videos","volume":"iii","author":"munsell","year":"2012","journal-title":"Proceedings of the Twelth International Conference on Computer Vision"},{"key":"ref16","first-page":"176","article-title":"Multimodal person recognition using unconstrained audio and video","author":"choudhury","year":"1999","journal-title":"Proc Int Conf Audio Video-Based Biometr Person Authentication"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.168"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2014.7001385"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"ref28","article-title":"Making the Internet of Things a business reality","author":"green","year":"2014","journal-title":"Information Age Vitesse Media"},{"article-title":"Insertion, evasion and denial of service: eluding network intrusion detection","year":"1998","author":"ptacek","key":"ref4"},{"key":"ref27","article-title":"Google chief: my fears for generation Facebook","author":"taylor","year":"2010","journal-title":"The Independent"},{"key":"ref3","first-page":"251","article-title":"The Sybil attack","author":"douceur","year":"0","journal-title":"Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"journal-title":"BBC News","article-title":"Not in front of the telly: warning over &#x2018;listening&#x2019; TV","year":"2015","key":"ref29"},{"journal-title":"ITU-T SG13","article-title":"Future networks including cloud computing, mobile and next-generation networks","year":"2015","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"journal-title":"European Cyber Crime Center European Police Office","article-title":"EuroPol Internet organized crime threat assessment","year":"2014","key":"ref2"},{"journal-title":"Common Criteria","article-title":"Common Criteria for information technology security evaluation","year":"2014","key":"ref9"},{"article-title":"The flash crash: the impact of high frequency trading on an electronic market","year":"2014","author":"kirilenko","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2359538"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.10.015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2015.7049440"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9546-5"},{"key":"ref26","article-title":"The Internet of Things: how the next evolution of the Internet is changing everything","author":"evans","year":"2011","journal-title":"Cisco Internet Business Solutions Group"},{"key":"ref25","article-title":"Gartner's Internet of Things predictions","author":"rossi","year":"2015","journal-title":"Information Age Vitesse Media"}],"event":{"name":"2015 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2015,6,1]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2015,6,5]]}},"container-title":["2015 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7169724\/7210375\/07210391.pdf?arnumber=7210391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:51:09Z","timestamp":1490392269000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7210391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/cts.2015.7210391","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}