{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T11:54:07Z","timestamp":1752666847589,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/iccw.2015.7247576","type":"proceedings-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T17:18:06Z","timestamp":1442251086000},"page":"2633-2638","source":"Crossref","is-referenced-by-count":12,"title":["VisIoT: A threat visualisation tool for IoT systems security"],"prefix":"10.1109","author":[{"given":"Panagiotis","family":"Sarigiannidis","sequence":"first","affiliation":[]},{"given":"Eirini","family":"Karapistoli","sequence":"additional","affiliation":[]},{"given":"Anastasios A.","family":"Economides","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"ref3","first-page":"1","article-title":"A Survey of Visualization Systems for Network Security","volume":"1","author":"shiravi","year":"2011","journal-title":"IEEE Trans Visualiz and Computer Graphics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.23"},{"journal-title":"Security Data Visualization Graphical Techniques for Network Analysis","year":"2007","author":"conti","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref5","first-page":"1","article-title":"Visual-assisted wormhole attack detection for wireless sensor networks","author":"karapistoli","year":"0","journal-title":"Conference on Security and Privacy in Communication Networks (SecureComm)"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-540-85933-8_13","article-title":"Wireless Cyber Assets Discovery Visualization","author":"prole","year":"2008","journal-title":"Proc 5th Int'l Workshop Visualization for Computer Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532068"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2004.26"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.209"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"}],"event":{"name":"2015 ICC - 2015 IEEE International Conference on Communications Workshops (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communication Workshop (ICCW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7226899\/7247062\/07247576.pdf?arnumber=7247576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T15:31:15Z","timestamp":1498231875000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7247576\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iccw.2015.7247576","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}