{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:22:36Z","timestamp":1759335756178,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icphys.2018.8390807","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:28:02Z","timestamp":1529954882000},"page":"789-794","source":"Crossref","is-referenced-by-count":12,"title":["A technique for design of secure data transfer environment: Application for I2C protocol"],"prefix":"10.1109","author":[{"given":"Dmitry","family":"Levshun","sequence":"first","affiliation":[]},{"given":"Andrey","family":"Chechulin","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A security protocol adaptation layer for the IP-based internet of things","volume":"3","author":"hummen","year":"2011","journal-title":"Interconnecting Smart Objects with the Internet Workshop"},{"key":"ref11","article-title":"Security issues in wireless sensor networks: attacks and countermeasures","volume":"1","author":"chelli","year":"2015","journal-title":"Proceedings of the World Congress on Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/32.481514"},{"key":"ref13","first-page":"54","article-title":"Automatic verification of security protocols in the symbolic model: The verifier ProVerif","author":"blanchet","year":"2014","journal-title":"Foundations of Security Analysis and Design VII"},{"journal-title":"Intruder deducibility constraints with negation decidability and application to secured service compositions","year":"2012","author":"avanesov","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095090"},{"key":"ref16","first-page":"474","article-title":"Review of I2C protocol","volume":"2","author":"mankar","year":"2014","journal-title":"Int Journalof Research in Advent Technology (IJRAT)"},{"journal-title":"Official site for Arduino platform developers","year":"0","key":"ref17"},{"journal-title":"Official documentation of the TWI hardware interface on the forum for Arduino platform developers","year":"0","key":"ref18"},{"journal-title":"Official documentation of the Wire h library on the site for Arduino platform developers","year":"0","key":"ref19"},{"journal-title":"A Design & Verification Methology for Networked Embedded Systems","year":"2011","author":"stefanni","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.15622\/sp.48.1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_13"},{"journal-title":"Official website of SecFutur project","year":"0","key":"ref5"},{"journal-title":"Official Cisco Secure Development lifecycle (Cisco SDL) documentation","year":"0","key":"ref8"},{"key":"ref7","article-title":"The Security Development Lifecycle. SDL: A Process for Developing Demonstrably More Secure Software","author":"howard","year":"2006","journal-title":"Microsoft Press Redmond Washington"},{"key":"ref2","first-page":"533","article-title":"Agent-Based Modeling and Simulation of Cyber-Warfare between Malefactors and Security Agents in Internet","author":"kotenko","year":"2005","journal-title":"Proc of 19th European Simulation Multiconference &#x201C;Simulation in wider Europe&#x201D; (ESM'05)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNMC.2003.1243025"},{"key":"ref9","article-title":"IPsec for Embedded Systems","author":"riedm\u00fcller","year":"2005","journal-title":"ITCS"},{"key":"ref20","first-page":"60","article-title":"Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System","volume":"7","author":"desnitsky","year":"2016","journal-title":"JoWUA"}],"event":{"name":"2018 IEEE Industrial Cyber-Physical Systems (ICPS)","start":{"date-parts":[[2018,5,15]]},"location":"St. Petersburg","end":{"date-parts":[[2018,5,18]]}},"container-title":["2018 IEEE Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376183\/8387624\/08390807.pdf?arnumber=8390807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T12:50:36Z","timestamp":1643201436000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8390807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icphys.2018.8390807","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}