{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T04:51:07Z","timestamp":1762059067273,"version":"build-2065373602"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/eit53891.2022.9814003","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T19:32:19Z","timestamp":1657222339000},"page":"290-295","source":"Crossref","is-referenced-by-count":7,"title":["Tackling Multiple Security Threats in an IoT Environment"],"prefix":"10.1109","author":[{"given":"Mikhail","family":"Gromov","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A"}]},{"given":"David","family":"Arnold","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A"}]},{"given":"Jafar","family":"Saniie","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0043"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI51257.2020.9247722"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSP51677.2021.9357592"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856708"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3046442"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409101"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS48893.2020.9096818"}],"event":{"name":"2022 IEEE International Conference on Electro Information Technology (eIT)","start":{"date-parts":[[2022,5,19]]},"location":"Mankato, MN, USA","end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9813697\/9813750\/09814003.pdf?arnumber=9814003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:45:09Z","timestamp":1659660309000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9814003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/eit53891.2022.9814003","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}