{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:17:38Z","timestamp":1772039858202,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/giots.2019.8766407","type":"proceedings-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T23:46:38Z","timestamp":1563839198000},"page":"1-6","source":"Crossref","is-referenced-by-count":69,"title":["Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems"],"prefix":"10.1109","author":[{"given":"Aikaterini","family":"Roukounaki","sequence":"first","affiliation":[]},{"given":"Sofoklis","family":"Efremidis","sequence":"additional","affiliation":[]},{"given":"John","family":"Soldatos","sequence":"additional","affiliation":[]},{"given":"Juergen","family":"Neises","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Walloschke","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Kefalakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254306"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.65"},{"key":"ref13","author":"schweichhart","year":"2016","journal-title":"Reference Architectural Model Industrie 4 0 - An Introduction"},{"key":"ref14","article-title":"Industrial Internet of Things Volume G4: Security Framework","author":"schrecker","year":"2016","journal-title":"IIC Security Framework IIC PUB G4 V1 0 PB 20160926"},{"key":"ref15","article-title":"The Industrial Internet of Things: Volume G1: Reference Architecture","author":"lin","year":"2017","journal-title":"Industrial Internet Consortium Reference Architecture IIC PUB G1 V1 80 20170131"},{"key":"ref16","author":"bever","year":"2009","journal-title":"The OpenO&M Information Service Bus and Common Interoperability Registry"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref3","article-title":"Machine Learning based Trust Computational Model for IoT Services","author":"jayasinghe","year":"2018","journal-title":"IEEE Transactions on Sustainable Computing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2404803"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s16101701"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1511-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16546-2_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925694"}],"event":{"name":"2019 Global IoT Summit (GIoTS)","location":"Aarhus, Denmark","start":{"date-parts":[[2019,6,17]]},"end":{"date-parts":[[2019,6,21]]}},"container-title":["2019 Global IoT Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764050\/8766345\/08766407.pdf?arnumber=8766407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:25:13Z","timestamp":1658262313000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8766407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/giots.2019.8766407","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}