{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:24Z","timestamp":1767339864162,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856708","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"260-265","source":"Crossref","is-referenced-by-count":22,"title":["Mitigating IoT security threats with a trusted Network element"],"prefix":"10.1109","author":[{"given":"Jarkko","family":"Kuusijarvi","sequence":"first","affiliation":[]},{"given":"Reijo","family":"Savola","sequence":"additional","affiliation":[]},{"given":"Pekka","family":"Savolainen","sequence":"additional","affiliation":[]},{"given":"Antti","family":"Evesti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081092"},{"journal-title":"Symantec Connect Community 2016","article-title":"IoT devices being increasingly used for DDoS attacks","year":"0","key":"ref11"},{"journal-title":"Ars Technica 2014","article-title":"'Internet of Things' is the new Windows XP&#x2014;malware's favorite target","year":"0","key":"ref12"},{"year":"0","key":"ref13","article-title":"The Bro Network Security Monitor"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.432"},{"article-title":"Securing the &#x2018;Internet of Things&#x2019; Survey","year":"2014","author":"pescatore","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.009"},{"key":"ref6","first-page":"1","article-title":"A Critical Analysis on the Security Concerns of Internet of Things (IoT)","volume":"111","author":"farooq","year":"2015","journal-title":"Int J Comput Appl"},{"year":"0","key":"ref5","article-title":"SECURity at the network EDge"},{"key":"ref8","first-page":"1","article-title":"Threat implications of the Internet of Things","author":"covington","year":"2013","journal-title":"2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2013) CyCon"},{"key":"ref7","volume":"1 5","author":"nettstr\u00e4ter","year":"2012","journal-title":"Internet-of-Things Architecture IoT-A Deliverable D1 3-Updated reference model for IoT"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref9","article-title":"2013. Authorization framework for the Internet-of-Things","author":"seitz","year":"2013","journal-title":"IEEE 14th International Symposium on a World of Wireless Mobile and Multimedia Networks WoWMoM 2013"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856708.pdf?arnumber=7856708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T22:54:46Z","timestamp":1488408886000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856708","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}