{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T09:45:58Z","timestamp":1775382358722,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/isi.2017.8004904","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T16:42:42Z","timestamp":1502383362000},"page":"179-181","source":"Crossref","is-referenced-by-count":73,"title":["Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Williams","sequence":"first","affiliation":[]},{"given":"Emma","family":"McMahon","sequence":"additional","affiliation":[]},{"given":"Sagar","family":"Samtani","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Patton","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"kennedy","year":"2011","journal-title":"Metasploit"},{"key":"ref11","first-page":"57","author":"hu","year":"2016","journal-title":"Employing Miniaturized Computers for Distributed Vulnerability Assessment"},{"key":"ref12","author":"weidman","year":"2014","journal-title":"de Penetration Testing A hands on introduction to hacking"},{"key":"ref13","first-page":"25","author":"samtani","year":"2016","journal-title":"Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.43"},{"key":"ref15","first-page":"1","article-title":"A Survey on Internet of Things: Architecture, Enabling Technologies","author":"lin","year":"2017","journal-title":"Security and Privacy and Applications IEEE Internet of Things Journal 4662(c)"},{"key":"ref4","author":"zhang","year":"2014","journal-title":"IoT security Ongoing challenges and research opportunities In Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications SOCA 2014"},{"key":"ref3","year":"2015","journal-title":"Things&#x201D; Will Be in Use in 2016 Up 30 Percent From 2015"},{"key":"ref6","author":"vermesan","year":"2014","journal-title":"Internet of Things - From Research and Innovation to Market Deployment"},{"key":"ref5","year":"2012","journal-title":"Retrieved From"},{"key":"ref8","first-page":"261","volume":"5","author":"rutledge","year":"2016","journal-title":"Privacy Impacts of loT Devices A SmartTV Case Study"},{"key":"ref7","article-title":"A Critical Analysis on the Security Concerns of Internet of Things (IoT)","volume":"111","author":"farooq","year":"0","journal-title":"International Journal of Computer Applications"},{"key":"ref2","first-page":"1","article-title":"IEEE-SA Internet of Things (loT) Ecosystem Study","year":"2015","journal-title":"Retrieved From"},{"key":"ref1","author":"li","year":"2016","journal-title":"Securing the Internet of The Internet of Things"},{"key":"ref9","author":"markowsky","year":"2015","journal-title":"Scanning for vulnerable devices in the Internet of Things In Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications IDAACS 2015"}],"event":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"Beijing, China","start":{"date-parts":[[2017,7,22]]},"end":{"date-parts":[[2017,7,24]]}},"container-title":["2017 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999198\/8004858\/08004904.pdf?arnumber=8004904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T19:52:35Z","timestamp":1503517955000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8004904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isi.2017.8004904","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}