{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:42:28Z","timestamp":1767339748767,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,28]]},"DOI":"10.1109\/iotais60147.2023.10346032","type":"proceedings-article","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T19:22:21Z","timestamp":1702581741000},"page":"40-44","source":"Crossref","is-referenced-by-count":3,"title":["Determination of the Transition Probability Matrix for an IoT Fuzzy Security Model"],"prefix":"10.1109","author":[{"given":"Igor V.","family":"Kotenko","sequence":"first","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Sciences,Laboratory of Computer Security Problems,St. Petersburg,Russia"}]},{"given":"Igor B.","family":"Parashchuk","sequence":"additional","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Sciences,Laboratory of Computer Security Problems,St. Petersburg,Russia"}]},{"given":"Vasily A.","family":"Desnitsky","sequence":"additional","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Sciences,Laboratory of Computer Security Problems,St. Petersburg,Russia"}]}],"member":"263","reference":[{"volume-title":"Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem","year":"2018","author":"Russell","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2019.8671571"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2015.26"},{"volume-title":"The IoT Architects Guide to Attainable Security and Privacy","year":"2019","author":"Fagbemi","key":"ref4"},{"volume-title":"Security Controls Evaluation, Testing, and Assessment Handbook","year":"2019","author":"Johnson","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18302-2"},{"volume-title":"Network Security Assessment","year":"2008","author":"McNab","key":"ref7"},{"volume-title":"Security Assessment","year":"2004","author":"Rogers","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71119-1_54"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"Zadeh","year":"1965","journal-title":"Fuzzy Sets, Information and Control"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2013.6653774"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313399"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/87.998036"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2001.973113"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.engfailanal.2023.107233"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhydene.2022.05.192"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.12.039"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/0471224596"},{"volume-title":"Fuzzy Modeling and Control","year":"2017","author":"Pegat","key":"ref19"},{"volume-title":"Fuzzy Modeling And Fuzzy Control","year":"2006","author":"Zhang","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2010.09.019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/9781119994374"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-324-1"},{"key":"ref24","article-title":"Elementary Fuzzy Matrix and Fuzzy Models for Social Scientists","author":"Kandasamy","year":"2007","journal-title":"Automation. Los Angeles"},{"issue":"5","key":"ref25","first-page":"167","article-title":"Fuzzy Model Identification: A New Parallel BB-BC Optimization Based Approach","volume":"2","author":"Kumar","year":"2013","journal-title":"International Journal of Electronics and Communication Engineering (IJECE)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-1994-2306"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2023.05.058"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/202032903005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/rusautocon52004.2021.9537332"}],"event":{"name":"2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","start":{"date-parts":[[2023,11,28]]},"location":"Bali, Indonesia","end":{"date-parts":[[2023,11,30]]}},"container-title":["2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10346030\/10346031\/10346032.pdf?arnumber=10346032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T23:01:07Z","timestamp":1703026867000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10346032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,28]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iotais60147.2023.10346032","relation":{},"subject":[],"published":{"date-parts":[[2023,11,28]]}}}