{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:47:31Z","timestamp":1751521651800,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.1109\/lanman61958.2024.10621894","type":"proceedings-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T17:19:54Z","timestamp":1723569594000},"page":"15-20","source":"Crossref","is-referenced-by-count":2,"title":["IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms"],"prefix":"10.1109","author":[{"given":"Md Morshed","family":"Alam","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA"}]},{"given":"A B M","family":"Mohaimenur Rahman","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA"}]},{"given":"Weichao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA"}]}],"member":"263","reference":[{"volume-title":"Ifttt: Every thing works better together","year":"2024","key":"ref1"},{"volume-title":"Samsung smartthings","year":"2024","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488687"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-200108"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23070"},{"volume-title":"Iotguard: Dynamic enforcement of security and safety policy in commodity iot","author":"Celik","key":"ref6"},{"key":"ref7","article-title":"Iotdots: A digital forensics framework for smart environments","author":"Babun","year":"2018","journal-title":"CoRR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354254"},{"key":"ref9","first-page":"4223","article-title":"HAWatcher: Semantics-Aware anomaly de-tection for appified smart homes","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Fu"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771878"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570786"},{"issue":"12","key":"ref12","first-page":"9","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobbs Journal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"article-title":"Shattered chain of trust: Understanding security risks in cross-cloud iot access delegation","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium, ser. SEC20","author":"Yuan","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24097","article-title":"Packet-level signatures for smart home devices","volume-title":"Network and Distributed System Security Symposium","author":"Trimananda"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586140"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501437"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1512\/iumj.1957.6.56038"},{"volume-title":"Deep recurrent q-Iearning for partially observable mdps","year":"2017","author":"Hausknecht","key":"ref20"},{"key":"ref21","article-title":"Openai gym","volume":"abs\/1606.01540","author":"Brockman","year":"2016","journal-title":"CoRR"},{"key":"ref22","article-title":"Adam: A method for stochastic optimization","volume":"abs\/1412.6980","author":"Kingma","year":"2014","journal-title":"CoRR"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177703732"}],"event":{"name":"2024 IEEE 30th International Symposium on Local and Metropolitan Area Networks (LANMAN)","start":{"date-parts":[[2024,7,10]]},"location":"Boston, MA, USA","end":{"date-parts":[[2024,7,11]]}},"container-title":["2024 IEEE 30th International Symposium on Local and Metropolitan Area Networks (LANMAN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621711\/10621874\/10621894.pdf?arnumber=10621894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T05:05:15Z","timestamp":1723611915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/lanman61958.2024.10621894","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]}}}