{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:56:02Z","timestamp":1775667362130,"version":"3.50.1"},"reference-count":185,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004681","name":"Higher Education Commission (HEC), Pakistan, through its initiative of National Center for Cyber Security for the affiliated lab National Cyber Security Auditing and Evaluation Lab","doi-asserted-by":"publisher","award":["2(1078)\/HEC\/M&E\/2018\/707"],"award-info":[{"award-number":["2(1078)\/HEC\/M&E\/2018\/707"]}],"id":[{"id":"10.13039\/501100004681","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/jiot.2020.2997651","type":"journal-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T19:56:21Z","timestamp":1590522981000},"page":"10250-10276","source":"Crossref","is-referenced-by-count":313,"title":["An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3616-2621","authenticated-orcid":false,"given":"Waseem","family":"Iqbal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2437-4870","authenticated-orcid":false,"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6116-2156","authenticated-orcid":false,"given":"Mahmoud","family":"Daneshmand","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3203-7807","authenticated-orcid":false,"given":"Bilal","family":"Rauf","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6013-062X","authenticated-orcid":false,"given":"Yawar Abbas","family":"Bangash","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2015.0714"},{"key":"ref2","first-page":"80","article-title":"The Internet of Things: An overview","volume-title":"Proc. Internet Soc. (ISOC)","author":"Rose"},{"issue":"7","key":"ref3","first-page":"97","article-title":"That Internet of Things thing","volume":"22","author":"Ashton","year":"2009","journal-title":"RFID J."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501741"},{"key":"ref5","volume-title":"Worlds Well Known Trusted Advisor in It","year":"1999"},{"key":"ref6","volume-title":"Network Traffic Characteristics of the IoT Application Use Cases","author":"Mocnej","year":"2017"},{"key":"ref7","volume-title":"Primitives and elements of Internet of Things (IoT) trustworthiness","author":"Voas","year":"2016"},{"key":"ref8","volume-title":"How the Internet of Things Will Affect Security & Privacy","author":"Meola","year":"2016"},{"key":"ref9","volume-title":"These Devices May Be Spying on You (Even in Your Own Home)","author":"Steinberg","year":"2014"},{"key":"ref10","volume-title":"Internet of Things security study: Smartwatches","author":"Fortify","year":"2015"},{"key":"ref11","volume-title":"IBM point of view: Internet of Things security","author":"Hahn","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.04.003"},{"key":"ref13","article-title":"Hackers exploit SCADA holes to take full control of critical infrastructure","volume":"15","author":"Storm","year":"2014","journal-title":"Computerworld"},{"key":"ref14","volume-title":"The CEOS Guide to Data Security Protect Your Data Through Innovation","year":"2016"},{"key":"ref15","volume-title":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015\u20132020 White Paper","year":"2016"},{"key":"ref16","first-page":"15","article-title":"Software defined network SDN based Internet of Things IoT a road ahead","volume-title":"Proc. ACM Int. Conf. Future Netw. Distrib. Syst.","author":"Tayyaba"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779180"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4978"},{"key":"ref20","volume-title":"Understanding security requirements and challenges in Internet of Things (IoTs): A review","author":"Khan","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2607786"},{"key":"ref22","volume-title":"The challenges in SDN\/ML based network security: A survey","author":"Nguyen","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2874978"},{"key":"ref25","article-title":"IoT standardization and implementation challenges","author":"Banafa","year":"2016","journal-title":"IEEE Internet of Things Newsletter"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.714"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref29","first-page":"2165","article-title":"Internet of Things: Proposed security aspects for digitizing the world","volume-title":"Proc. 3rd Int. Conf. Comput. Sustain. Global Develop. (INDIACom)","author":"Khari"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745382"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19157-2_1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"ref34","first-page":"1","article-title":"Smart nest thermostat: A smart spy in your home","volume-title":"Proc. Black Hat USA","author":"Hernandez"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.113"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2017.7962762"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaging.2018.01.009"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2018.10.009"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref41","article-title":"Health insurance portability and accountability act (HIPAA)","volume-title":"StatPearls [Internet]","author":"Edemekong","year":"2019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2010040103"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref44","volume-title":"Its Depressingly Easy to Spy on Vulnerable Baby Monitors Using Just a Browser","author":"Brewster","year":"2015"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.63"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2296-6.ch003"},{"key":"ref47","volume-title":"MS Windows NT Kernel Description","author":"Paganini","year":"2014"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref49","volume-title":"Some top baby monitors lack basic security features report finds","author":"Fowler","year":"2015"},{"key":"ref50","volume-title":"Survey of Security and Privacy Issues of Internet of Things","author":"Borgohain","year":"2015"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542881"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.02.005"},{"key":"ref54","volume-title":"MS Windows NT Kernel Description","author":"Murphy","year":"2016"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2012.250241"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref58","volume-title":"Ten Most Critical Web Application Security Risks","year":"2017"},{"key":"ref59","volume-title":"SQLI XSS Zero Days Expose BELKIN IoT Devices Android Smartphones","author":"Staff","year":"2016"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"ref61","volume-title":"Cross-Site Scripting (XSS) Attack","year":"2018"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.09.001"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.74"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.013"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/11604938_19"},{"key":"ref68","first-page":"272","article-title":"KATAN and KTANTAN a family of small and efficient hardware-oriented block ciphers","volume-title":"Proc. Cryptograph. Hardw. Embedded Syst. (CHES)","author":"DeCanniere"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-012-0070-x"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0160-y"},{"key":"ref72","first-page":"1","article-title":"More secure Internet of Things using robust encryption algorithms against side channel attacks","volume-title":"Proc. IEEE\/ACS 13th Int. Conf. Comput. Syst. Appl. (AICCSA)","author":"Lo\u2019ai"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2516905"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.30"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095812"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.31"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425280"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"ref82","first-page":"1","article-title":"SMART: Secure and minimal architecture for (establishing dynamic) root of trust","volume-title":"Proc. NDSS","volume":"12","author":"Eldefrawy"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_20"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3079763"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"ref87","first-page":"109","article-title":"Short paper: Lightweight remote attestation using physical functions","volume-title":"Proc. WiSec","author":"Sadeghi"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593192"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062276"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2016.012"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3680960"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.007"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.04.005"},{"issue":"1","key":"ref97","first-page":"83","article-title":"Universally composable RFID mutual authentication","volume":"14","author":"Su","year":"2017","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.07.002"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.045"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"ref102","volume-title":"Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic","author":"Apthorpe","year":"2017"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2799820"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707489"},{"key":"ref105","first-page":"361","article-title":"SmartAuth: User-centered authorization for the Internet of Things","volume-title":"Proc. 26th USENIX Security Symp. (USENIX Security)","author":"Tian"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.43"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2767561"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.3.2.23-32"},{"issue":"2","key":"ref109","first-page":"924","article-title":"A lightweight pseudonym authentication and key agreement protocol for multi-medical server architecture in TMIS","volume":"11","author":"Liu","year":"2017","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.013"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.05.006"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800288"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.02.018"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0618-9"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2277938"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656475"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2446492"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2504395"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.46"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251117"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.060"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.57"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254159"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.3390\/s18020492"},{"key":"ref125","volume-title":"Changing Driving Laws to Support Automated Vehicles","year":"2017"},{"key":"ref126","first-page":"2","volume-title":"Software-defined networking: The new norm for networks","volume":"2","author":"Fundation","year":"2012"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282382"},{"key":"ref128","first-page":"50","article-title":"SANE: A protection architecture for enterprise networks","volume-title":"Proc. USENIX Security Symp.","volume":"49","author":"Casado"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1737"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref132","volume-title":"Open Networking Foundation","year":"2013"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.006"},{"key":"ref134","volume-title":"Osrg.githubioryu","year":"2015"},{"key":"ref135","volume-title":"Open Networking Operating System Project","year":"2015"},{"key":"ref136","volume-title":"Openday Light Project","year":"2018"},{"key":"ref137","volume-title":"Flood Light Project","year":"2019"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"ref139","volume-title":"Pox Controller","author":"McCauley","year":"2018"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.017"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491190"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7047"},{"key":"ref143","volume-title":"Software-defined networking: A comprehensive survey","author":"Kreutz","year":"2014"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/2103621.2103685"},{"key":"ref147","first-page":"8","article-title":"Modular SDN programming with pyretic","volume-title":"Proc. USENIX","author":"Reich"},{"key":"ref148","volume-title":"A general SDN-based IoT framework with NVF implementation","author":"Li","year":"2015"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-015-0290-y"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7848825"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838365"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/SCNS.2016.7870558"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543778"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2018.8372689"},{"key":"ref155","first-page":"1","article-title":"Intent-based management and orchestration of heterogeneous OpenFlow\/IoT SDN domains","volume-title":"Proc. IEEE Conf. Netw. Softw. (NetSoft)","author":"Cerroni"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511053"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8290809"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.110"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.099"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218384"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3845-0"},{"key":"ref162","first-page":"1871","article-title":"SDSecurity: A software defined security experimental framework","volume-title":"Proc. IEEE Int. Conf. Commun. Workshop (ICCW)","author":"Al-Ayyoub"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.30"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2701549"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.001"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2015.100"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/SpliTech.2016.7555946"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2016.22"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05063-4_24"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.006"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841889"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1147-3"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"ref176","volume-title":"Software defined security service provisioning framework for Internet of Things","author":"Khan","year":"2017"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2017.8088617"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00057"},{"key":"ref179","volume-title":"Private Cloud Security","year":"2014"},{"key":"ref180","volume-title":"VArmour DSS Deception Data Sheet","year":"2015"},{"key":"ref181","volume-title":"The Technology Foundations of VMware vShield","year":"2010"},{"key":"ref182","volume-title":"Netcitadels one control platform the key to intelligent, adaptive network security","year":"2012"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.05.003"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-016-0355-x"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.08.006"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9219268\/09099839.pdf?arnumber=9099839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:08:33Z","timestamp":1706058513000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9099839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":185,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.2997651","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]}}}