{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:22:44Z","timestamp":1740100964363,"version":"3.37.3"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences & Engineering Research Council of Canada (NSERC)","doi-asserted-by":"publisher","award":["RGPIN-2021-04342"],"award-info":[{"award-number":["RGPIN-2021-04342"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation (NSF)","doi-asserted-by":"publisher","award":["2105007"],"award-info":[{"award-number":["2105007"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/dsc54232.2022.9888873","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T21:10:18Z","timestamp":1664226618000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments"],"prefix":"10.1109","author":[{"given":"Talal","family":"Halabi","sequence":"first","affiliation":[{"name":"The University of Winnipeg,Winnipeg,MB,Canada"}]},{"given":"Aawista","family":"Chaudhry","sequence":"additional","affiliation":[{"name":"Queen&#x0027;s University,Kingston,ON,Canada"}]},{"given":"Sarra","family":"Alqahtani","sequence":"additional","affiliation":[{"name":"Wake Forest University,Winston-Salem,NC,USA"}]},{"given":"Mohammad","family":"Zulkernine","sequence":"additional","affiliation":[{"name":"Queen&#x0027;s University,Kingston,ON,Canada"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3397776.3397783"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2994977"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2016.01.012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975048"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI50040.2020.00013"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00027"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s21124060"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/fi13030073"},{"key":"ref35","first-page":"1","article-title":"Attack detection using federated learning in medical cyber-physical systems","author":"schneble","year":"0","journal-title":"28th International Conference on Computer Communications and Networks (ICCCN)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115782"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3453142.3493511"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2014.6816388"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/app11073101"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-020-09335-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527951"},{"key":"ref17","article-title":"Interdependence-aware game-theoretic framework for secure intelligent transportation systems","author":"ferdowsi","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.04.005"},{"key":"ref19","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"0","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1051\/e3sconf\/202127001036"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110349"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3046688"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100361"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.10.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65048-3_14"},{"key":"ref2","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2014.973467"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2872936"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3055386.3055390"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101660"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218444"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60033-8_29"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3080527"},{"key":"ref26","first-page":"76","article-title":"Predicting advanced persistent threats for iot systems based on federated learning","author":"li","year":"2020","journal-title":"International Conference on Security Privacy and Anonymity in Computation Communication and Storage"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6001"}],"event":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2022,6,22]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2022,6,24]]}},"container-title":["2022 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9888143\/9888794\/09888873.pdf?arnumber=9888873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T19:57:40Z","timestamp":1664308660000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9888873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/dsc54232.2022.9888873","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}