{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T15:26:38Z","timestamp":1725636398599},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/meco.2018.8406031","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:17:35Z","timestamp":1531178255000},"page":"1-4","source":"Crossref","is-referenced-by-count":3,"title":["Cybersecurity of improved fiscal devices"],"prefix":"10.1109","author":[{"given":"Milan","family":"Prokin","sequence":"first","affiliation":[]},{"given":"Aleksandar","family":"Neskovic","sequence":"additional","affiliation":[]},{"given":"Natasa","family":"Neskovic","sequence":"additional","affiliation":[]},{"given":"Dragana","family":"Prokin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The &#x2018;autonomous,&#x2019; hackable car","author":"armerding","year":"2006","journal-title":"Internet"},{"key":"ref11","article-title":"Mozilla: The internet is unhealthy and urgently needs your help","author":"tung","year":"2017","journal-title":"Internet"},{"journal-title":"ECRI Institute Plymouth Meeting PA USA","article-title":"ECRI Institute PSO Deep Dive: Health information technology","year":"2012","key":"ref12"},{"key":"ref13","article-title":"White hats do an NSA, figure out live phone tracking via protocol vulnerability","author":"leyden","year":"2014","journal-title":"Internet"},{"journal-title":"ITU-T Internet","article-title":"Q.700: Introduction to CCITT signaling system no. 7","year":"1993","key":"ref14"},{"key":"ref15","article-title":"Hackers remotely kill a jeep on the highway_with me in it","author":"greenberg","year":"2015","journal-title":"Internet"},{"journal-title":"KPMG report 2016","article-title":"Your connected car is talking. Who's listening?","year":"0","key":"ref16"},{"key":"ref17","article-title":"Businesses beware: the &#x2018;industrial internet of things&#x2019; is a prime target for cyberattcks","author":"reese","year":"2016","journal-title":"Internet"},{"key":"ref18","article-title":"This security camera was infected by malware 98 seconds after it was plugged in","author":"coldewey","year":"2016","journal-title":"Internet"},{"journal-title":"McAfee Labs Intel Security","article-title":"The Economic Impact of Cybercrime and Cyber Espionage","year":"2013","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2016.7525759"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2011.6143687"},{"journal-title":"Siemens AG Corporate Communications Internet","article-title":"Verifying sales tax revenues with Siemens wireless modules: Contract in Serbia and Montenegro","year":"2006","key":"ref6"},{"key":"ref5","first-page":"34","article-title":"Wireless data transfer from taxpayers to the tax administration","author":"ilic","year":"2006","journal-title":"Tax Tribune Intra-European Organisation of Tax Administrations"},{"journal-title":"The Department of commerce Internet policy task force & Digital economy leadership team Washington DC USA","article-title":"Fostering the advancement of the Internet of Things","year":"2017","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2016.7525760"},{"journal-title":"Tax Administration of Czech Republic Internet","article-title":"Electronic records of sales","year":"2016","key":"ref2"},{"journal-title":"Hrvatski Sabor Internet","article-title":"Zakon o fiskalizaciji u prometu gotovinom","year":"2017","key":"ref1"},{"journal-title":"Federal Bureau of Investigation Washington DC USA","article-title":"Internet of things poses opportunities for cyber crime","year":"2015","key":"ref9"},{"journal-title":"Ponemon Institute","article-title":"Cost of Cyber Crime Study: United States","year":"2015","key":"ref20"},{"journal-title":"McAfee Labs Intel Security","article-title":"Threats report","year":"2015","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2018.8406030"},{"key":"ref23","article-title":"Information security for the next century","author":"khosla","year":"2009","journal-title":"Carnegie Mellon Cylab"}],"event":{"name":"2018 7th Mediterranean Conference on Embedded Computing (MECO)","start":{"date-parts":[[2018,6,10]]},"location":"Budva","end":{"date-parts":[[2018,6,14]]}},"container-title":["2018 7th Mediterranean Conference on Embedded Computing (MECO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399137\/8405943\/08406031.pdf?arnumber=8406031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T07:48:50Z","timestamp":1533023330000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/meco.2018.8406031","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}