{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:45:36Z","timestamp":1769118336600,"version":"3.49.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/dsc54232.2022.9888903","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T17:10:18Z","timestamp":1664212218000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things"],"prefix":"10.1109","author":[{"given":"Abel O. Gomez","family":"Rivera","sequence":"first","affiliation":[{"name":"University of Texas at El Paso,Department of Computer Science,TX,USA"}]},{"given":"Evan M.","family":"White","sequence":"additional","affiliation":[{"name":"University of Texas at El Paso,Department of Computer Science,TX,USA"}]},{"given":"Jaime C.","family":"Acosta","sequence":"additional","affiliation":[{"name":"CCDC Army Research Laboratory,El Paso,TX,USA"}]},{"given":"Deepak","family":"Tosh","sequence":"additional","affiliation":[{"name":"University of Texas at El Paso,Department of Computer Science,TX,USA"}]}],"member":"263","reference":[{"key":"ref10","first-page":"65","author":"ali","year":"2018","journal-title":"WSN Security Mechanisms for CPS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273112"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00022"},{"key":"ref13","year":"0"},{"key":"ref14","year":"0","journal-title":"Common Open Research Emulator (CORE) | Networks and Communication Systems Branch"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900291"},{"key":"ref3","author":"padmavathi","year":"2009","journal-title":"A Survey of Attacks Security Mechanisms and Challenges in Wireless Sensor Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9021061"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2648857"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020774"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599722"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020764"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC50486.2020.9318168"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020977"}],"event":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","location":"Edinburgh, United Kingdom","start":{"date-parts":[[2022,6,22]]},"end":{"date-parts":[[2022,6,24]]}},"container-title":["2022 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9888143\/9888794\/09888903.pdf?arnumber=9888903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T11:16:51Z","timestamp":1664277411000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9888903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/dsc54232.2022.9888903","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}