{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:05Z","timestamp":1761611465338,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iotsms.2018.8554802","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:54:17Z","timestamp":1543884857000},"page":"70-77","source":"Crossref","is-referenced-by-count":14,"title":["Situation Assessment to Secure IoT Applications"],"prefix":"10.1109","author":[{"given":"Pushpinder Kaur","family":"Chouhan","sequence":"first","affiliation":[]},{"given":"Sally","family":"McClean","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Shackleton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Global Market Insights","year":"0","key":"ref39"},{"journal-title":"Beecham senior analyst High and Dry Climate Change Water and the Economy","year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779180"},{"journal-title":"SECURED moves IoT and BYOD security to the network","year":"2016","author":"kassner","key":"ref32"},{"key":"ref31","article-title":"IoT Security- A General View, BTIIC Deliverable 1.1.1","author":"martnez carracedo","year":"2018","journal-title":"IoT security Techniques based on Machine learning SciRate Cryptography and Security"},{"key":"ref30","article-title":"Inter-Technology Bridging Gateway: A Low Cost Legacy Adaptation Approach to Secure Industrial Systems","author":"khan","year":"2018","journal-title":"Proc IEEE Power and Energy Society General Meeting (PESGM'11)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038391"},{"key":"ref35","article-title":"Security of IoT Systems: Design Challenges and Opportunities","author":"xy","year":"0","journal-title":"IEEE\/ACM International Conference on Computer-Aided Design Digest of Technical Papers ICCAD"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"journal-title":"Efficient XML Interchange (EXI) Format 1 0 W3C Recommendation EXI-20140211","year":"2014","author":"kamiya","key":"ref10"},{"journal-title":"Machina Research's predictions for IoT in 2016","year":"2016","key":"ref40"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1023\/B:TIME.0000045319.20260.73","author":"stankovic","year":"2004","journal-title":"Real-Time Operating Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.01.004"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.ress.2014.08.003","article-title":"An abnormal situation modeling method to assist operators in safety-critical systems","volume":"133","author":"mohsen","year":"2015","journal-title":"Reliability Engineering and System Safety"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"21046","DOI":"10.1109\/ACCESS.2017.2734681","article-title":"Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things","author":"xu","year":"2017","journal-title":"IEEE Access 5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2011.01.003"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.jbi.2016.04.007","article-title":"Process mining in healthcare: A literature review","volume":"61","author":"el","year":"2016","journal-title":"Biomed Inform"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00179-6_17"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.05.002"},{"journal-title":"Unlocking the potential of the Internet of Things Report McKinsey Global Institute","year":"0","author":"manyika","key":"ref28"},{"journal-title":"Internet of Things (IoT) Cybersecurity Improvement Act of 2017","year":"0","author":"mark warner","key":"ref4"},{"journal-title":"Choosing the Right Platform for the Industrial IoT","year":"2017","author":"brief","key":"ref27"},{"journal-title":"Mirai Malware","year":"0","key":"ref3"},{"journal-title":"National Cyber Security Strategy 2016 to 2021 Policy paper UK Government","year":"0","key":"ref6"},{"journal-title":"CSPs and IoT Big challenge","year":"2017","author":"rooney","key":"ref29"},{"journal-title":"Baseline Security Recommendations for IoT","year":"2017","key":"ref5"},{"journal-title":"North American Editors How to Secure IoT Device Communications with a Single Chip","year":"0","key":"ref8"},{"key":"ref7","first-page":"1","article-title":"An analysis of reference architectures for the internet of things","author":"cavalcante","year":"2015","journal-title":"2015 1st International Workshop on Exploring Component-based Techniques for Constructing Reference Architectures (CobRA) CobRA"},{"journal-title":"Situation awareness","year":"2018","key":"ref2"},{"journal-title":"Worldwide Semiannual Mobility Spending Guide from International Data Corporation","year":"2018","key":"ref9"},{"journal-title":"Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions)","year":"2018","key":"ref1"},{"key":"ref20","article-title":"Cyber and Physical Security Vulnerability Assessment for IoTBased Smart Homes","author":"bako","year":"2018","journal-title":"Journal Article Sensors V18 N 13 P 817"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2267549"},{"journal-title":"Activity Learning Discovering Recognizing and Predicting Human Behavior from Sensor Data","year":"2015","author":"cook","key":"ref21"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/THMS.2013.2293714","article-title":"An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes","volume":"44","author":"liming","year":"2014","journal-title":"IEEE Trans Human-Machine Systems"},{"key":"ref24","article-title":"Situation Model for Situation-Aware Assistance of Dementia Patients in Outdoor Mobility","volume":"60","author":"kristina","year":"2017","journal-title":"J Alzheimers Dis"},{"journal-title":"Land Agriculture Decision farming and livestock management driving IoT","year":"2016","author":"kaul","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2188534"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1108\/IJPCC-07-2014-0042","article-title":"A duration-based online reminder system","volume":"10","author":"priyanka","year":"2014","journal-title":"Int J Pervasive Computing and Communications"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2889","DOI":"10.1109\/TMC.2016.2640959","article-title":"Sensor-Based Change Detection for Timely Solicitation of User Engagement","volume":"16","author":"timothy","year":"2017","journal-title":"IEEE Trans Mob Comput"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1109\/THMS.2016.2641388","article-title":"From Activity Recognition to Intention Recognition for Assisted Living Within Smart Homes","volume":"47","author":"joseph","year":"2017","journal-title":"IEEE Trans Human-Machine Systems"},{"key":"ref25","article-title":"Optimal Parameter Exploration for Online Change-Point Detection in Activity Monitoring Using Genetic Algorithms","author":"naveed","year":"2016","journal-title":"Sensors 16"}],"event":{"name":"2018 Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Internet of Things: Systems, Management and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537438\/8554379\/08554802.pdf?arnumber=8554802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:34:35Z","timestamp":1546997675000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/iotsms.2018.8554802","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}