{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:07:06Z","timestamp":1764997626453,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/iotsms62296.2024.10710294","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:50Z","timestamp":1728926570000},"page":"147-152","source":"Crossref","is-referenced-by-count":2,"title":["Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations"],"prefix":"10.1109","author":[{"given":"Yuka","family":"Ikegami","sequence":"first","affiliation":[{"name":"Waseda University,Department of Computer Science and Communications Engineering"}]},{"given":"Ryotaro","family":"Negishi","sequence":"additional","affiliation":[{"name":"Waseda University,Department of Computer Science and Communications Engineering"}]},{"given":"Kento","family":"Hasegawa","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc"}]},{"given":"Seira","family":"Hidano","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc"}]},{"given":"Kazuhide","family":"Fukushima","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc"}]},{"given":"Kazuo","family":"Hashimoto","sequence":"additional","affiliation":[{"name":"Waseda University,Department of Computer Science and Communications Engineering"}]},{"given":"Nozomu","family":"Togawa","sequence":"additional","affiliation":[{"name":"Waseda University,Department of Computer Science and Communications Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18196\/jrc.2150"},{"key":"ref3","article-title":"Openvas"},{"key":"ref4","article-title":"Vuls"},{"key":"ref5","article-title":"Nikto"},{"key":"ref6","first-page":"612","article-title":"Automating vulnerability checks based on the IoT Security Checklist (in Japanese)","volume-title":"Computer Security Symposium","volume":"2019","author":"Takiguchi"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101648"},{"year":"2020","key":"ref8","article-title":"IoT Security Checklist"},{"key":"ref9","article-title":"User Guide Mini Smart Wi-Fi Plug Tapo P105"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022842"},{"key":"ref11","article-title":"GSMA IoT Security Assessment Checklist"},{"key":"ref12","first-page":"9459","article-title":"RetrievalAugmented Generation for Knowledge-Intensive NLP Tasks","volume":"33","author":"Lewis","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.54364\/AAIML.2023.1191"},{"key":"ref14","article-title":"Semantic Uncertainty: Linguistic Invariances for Uncertainty Estimation in Natural Language Generation","author":"Kuhn","year":"2023","journal-title":"arXiv preprint arXiv:2302.09664"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n18-1101"},{"key":"ref16","article-title":"Langchain"},{"key":"ref17","article-title":"Faiss"},{"key":"ref18","article-title":"Imsys\/vicuna-13b-v1.3"},{"key":"ref19","article-title":"microsoft\/deberta-large-mnli"},{"key":"ref20","article-title":"User Guide Tapo Smart Wi-Fi Light Bulb Tapo L510\/L530 Series"}],"event":{"name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710136\/10710182\/10710294.pdf?arnumber=10710294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:58:01Z","timestamp":1728968281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iotsms62296.2024.10710294","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}