{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:02Z","timestamp":1767339602998,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/eit53891.2022.9813914","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T15:32:19Z","timestamp":1657207939000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["IoT Security for Smart Home: Issues and Solutions"],"prefix":"10.1109","author":[{"given":"Ioannis","family":"Antzoulis","sequence":"first","affiliation":[{"name":"East Stroudsburg University,Department of Computer Science,East Stroudsburg,PA,USA"}]},{"given":"Md Minhaz","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"East Stroudsburg University,Department of Computer Science,East Stroudsburg,PA,USA"}]},{"given":"Shadman","family":"Latiff","sequence":"additional","affiliation":[{"name":"American International University Bangladesh,Department of Computer Science,Dhaka,Bangladesh"}]}],"member":"263","reference":[{"journal-title":"U S Food and Drug Administration","article-title":"Cybersecurity Issues in St. Jude Med Implantable Devices Alert","year":"2017","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2926462"},{"key":"ref12","article-title":"Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces","volume":"16","author":"costin","year":"2015","journal-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS"},{"article-title":"Machine Learning in IoT Security: Current Solutions and Future Challenges","year":"2019","author":"hussain","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"ref16","article-title":"Exclusive: Amazon says 100 million Alexa devices have been sold","author":"bohn","year":"2019","journal-title":"The Verge"},{"key":"ref17","article-title":"The Internet of Things: How the Next Evolution of the Internet Is Changing Everything","author":"evans","year":"2011","journal-title":"Cisco"},{"key":"ref18","article-title":"Microsoft and partners design new device security requirements to protect against targeted firmware attacks","author":"weston","year":"2019","journal-title":"Microsoft Secure"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2017.00104"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491884"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.05.049"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.29007\/kg5j"},{"key":"ref6","article-title":"Measures to Protect Cloud Data","author":"mayerski","year":"2021","journal-title":"The 2021 IEEE International Conference on Electro Information Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491902"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2019.8834072"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491923"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME52200.2021.9591011"},{"key":"ref1","article-title":"The little-known story of the first IoT device","author":"teicher","year":"2018","journal-title":"IBM Industries"},{"key":"ref9","first-page":"102","volume":"82","author":"smith","year":"2022","journal-title":"Ethical Hacking Skills to Fight Cybersecurity Threats EPiC Series in Computing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2019.8834112"},{"journal-title":"GitHub - firmadyne\/firmadyne System for emulation and dynamic analysis of Linux-based firmware (n d )","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491925"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME52200.2021.9591062"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00113"},{"article-title":"Blockchain in Internet of Things: Challenges and Solutions","year":"2016","author":"dorri","key":"ref25"}],"event":{"name":"2022 IEEE International Conference on Electro Information Technology (eIT)","start":{"date-parts":[[2022,5,19]]},"location":"Mankato, MN, USA","end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9813697\/9813750\/09813914.pdf?arnumber=9813914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T20:45:10Z","timestamp":1659645910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9813914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/eit53891.2022.9813914","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}