{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:59:30Z","timestamp":1729612770989,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10073429","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"1336-1339","source":"Crossref","is-referenced-by-count":6,"title":["A Frame Work of Security Attacks, Issues Classifications and Configuration Strategy for IoT Networks for the Successful Implementation"],"prefix":"10.1109","author":[{"given":"Vipul","family":"Bansal","sequence":"first","affiliation":[{"name":"Kurukshetra University,Information Technology,Haryana,India"}]},{"given":"Siddharth","family":"Pandey","sequence":"additional","affiliation":[{"name":"Invertis University,Department of Computer Application,Bareilly,Uttar Pradesh"}]},{"given":"Surendra Kumar","family":"Shukla","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science &#x0026; Engineering,Dehradun,Uttarakhand,India"}]},{"given":"Devendra","family":"Singh","sequence":"additional","affiliation":[{"name":"Uttaranchal Institute of Technology Uttaranchal University,Dehradun,Uttarakhand,India"}]},{"given":"Sunitha Aravind","family":"Rathod","sequence":"additional","affiliation":[{"name":"St. Martin&#x2019;s Engineering College,Department of ECE,Secunderabad,Telangana,India"}]},{"given":"Jos\u00e9 Luis Arias","family":"Gonz\u00e1les","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Peru,Business Department,Peru"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2788362"},{"volume-title":"Cisco Visual Networking Indicators: Forecasts and Trends, White Paper 2017-2022","year":"2019","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2866820"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2878704"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2438891"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"ref7","first-page":"52","article-title":"Security tradeoffs in resource-constrained nodes for IoT applications","volume":"12","author":"Alharby","year":"2018","journal-title":"International Academic and Scientific Research & Innovation"},{"key":"ref8","first-page":"1","article-title":"Modeling the cost of energy security in wireless sensor networks: The case of 802.15.4","volume-title":"International Telecom unication Conference 2008","author":"Mura"},{"key":"ref9","first-page":"1","article-title":"Enhancement of image contrast using histogram Equalization","volume-title":"National conference on Emerging Trends in Engineering & Technology (ETEAT)","author":"Kumar"},{"key":"ref10","first-page":"1","article-title":"Image denoising based on wavelet transformation","volume-title":"International Conference on Recent Trends of Computer Technology in Academic (ICRTCTA). Janardan Rai Nagar Rajasthan Vidyapeeth University","author":"Kumar"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1063\/5.0177498","article-title":"Soft computing based Solar Follower using Raspberry Pi 4B","volume-title":"accepted in International Conference on Advance Computing and Ingenious Technology in Engineering Science (SCOPUS)","author":"Kumar"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2709742"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2839593"},{"key":"ref14","first-page":"74","article-title":"Novel network traffic control method based on unattended deep learning for software-defined wireless networks","author":"Mao","year":"2018","journal-title":"IEEE Communications sans thread, flight 25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1063\/5.0074225"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1063\/5.0074211"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.11.121"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1918379"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2021.117016"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10073429.pdf?arnumber=10073429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T21:24:42Z","timestamp":1729113882000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10073429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10073429","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}