{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:58:09Z","timestamp":1757541489931},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/mownet.2016.7496625","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T07:39:28Z","timestamp":1466840368000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["Slinging MUD: Manufacturer usage descriptions: How the network can protect things"],"prefix":"10.1109","author":[{"given":"Eliot","family":"Lear","sequence":"first","affiliation":[]},{"given":"Brian","family":"Weis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"International Telecommunication Union ITU-T Recommendation","article-title":"Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks","year":"2012","key":"ref10"},{"journal-title":"IEEE 802 1 AR Institute for Electrical and Electronics Engineers","article-title":"Secure Device Identity","year":"1998","key":"ref11"},{"key":"ref12","article-title":"Dynamic Host Configuration Protocol","author":"droms","year":"1997","journal-title":"RFC 2131"},{"journal-title":"IEEE 802 1AB Institute for Electrical and Electronics Engineers","article-title":"Link Layer Discovery Protocol","year":"2005","key":"ref13"},{"key":"ref14","article-title":"Hypertext Transfer Protocol _ HTTP\/1.1","author":"fielding","year":"1999","journal-title":"RFC 2616"},{"key":"ref15","article-title":"HTTP over TLS","author":"rescorla","year":"2000","journal-title":"RFC 2818"},{"key":"ref16","article-title":"Internet Printing Protocol\/I.l: Encoding and Transport","author":"herriot","year":"2000","journal-title":"RFC 2910"},{"key":"ref17","article-title":"A Border Gateway Protocol 4 (BGP-4)","author":"rekhter","year":"1995","journal-title":"RFC 1771"},{"journal-title":"RFC 3410","year":"2002","author":"case","key":"ref18"},{"key":"ref19","article-title":"The Secure Shell (SSH) Protocol Architecture","author":"ylonen","year":"2006","journal-title":"RFC 4251"},{"key":"ref4","article-title":"Samsung smart fridge leaves Gmail logins open to attack","author":"leyden","year":"2015","journal-title":"The Register"},{"key":"ref3","article-title":"How Thieves Can Hack and Disable Your Home Alarm System","author":"zetter","year":"2014","journal-title":"Wired com"},{"year":"0","key":"ref6"},{"journal-title":"Retrieved","article-title":"OpenSSL vulnerabilities by common vulnerability and exposures ID","year":"2015","key":"ref5"},{"key":"ref8","article-title":"YANG _ A Data Modeling Language for the Network Configuration Protocol (NETCONF)","author":"bjorklund","year":"2010","journal-title":"RFC 6020"},{"key":"ref7","article-title":"Network Configuration Protocol (NETCONF)","author":"enns","year":"2011","journal-title":"RFC 64241"},{"key":"ref2","article-title":"HACKING loT: A Case Study on Baby Monitor Exposures and Vulnerabilities","author":"stanislav","year":"2015","journal-title":"Rapid 7"},{"article-title":"Internet of Things Prediction and Methodology","year":"2013","author":"cisco","key":"ref1"},{"journal-title":"IEEE 802 1X Institute for Electrical and Electronics Engineers","article-title":"Port Based Network Access Control","year":"1998","key":"ref9"},{"key":"ref20","article-title":"How long will it take for Internet of Things Hello Barbie to be hacked?","author":"smith","year":"2015","journal-title":"Network World"},{"article-title":"pyang","year":"2015","author":"bjorklund","key":"ref22"},{"key":"ref21","article-title":"Universal Resource Identifier (URI)","author":"berners-lee","year":"2005","journal-title":"RFC 3986"},{"key":"ref24","article-title":"dhclient","author":"lemon","year":"0","journal-title":"ISC DHCP Distribution"},{"key":"ref23","article-title":"Network Access Control List (ACL) YANG Data Model","author":"bogdanovic","year":"2015","journal-title":"draft-ietf-netmod-acl-model-06 txt (work in progress)"}],"event":{"name":"2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT)","start":{"date-parts":[[2016,4,11]]},"location":"Cairo, Egypt","end":{"date-parts":[[2016,4,13]]}},"container-title":["2016 International Conference on Selected Topics in Mobile &amp; Wireless Networking (MoWNeT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7492633\/7496590\/07496625.pdf?arnumber=7496625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T12:15:28Z","timestamp":1475064928000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7496625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/mownet.2016.7496625","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}