{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:54:20Z","timestamp":1729626860173,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266525","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T21:59:13Z","timestamp":1443131953000},"page":"1-5","source":"Crossref","is-referenced-by-count":12,"title":["Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures"],"prefix":"10.1109","author":[{"given":"Kashif","family":"Habib","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Leister","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","volume":"4","author":"price","year":"2010","journal-title":"Information Security Management Handbook"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5336915"},{"key":"ref30","first-page":"1","article-title":"An architectural blueprint for autonomic computing","year":"2006","journal-title":"Autonomic Computing White Paper"},{"key":"ref10","first-page":"1","article-title":"Towards Run-Time Verification of Adaptive Security for loT in eHealth","author":"torjusen","year":"2014","journal-title":"ECSA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00137-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883437"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75696-5_6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0030-y"},{"key":"ref15","first-page":"34","article-title":"Self-healing and secure adaptive messaging middleware for business-critical systems","volume":"3","author":"abie","year":"2010","journal-title":"International Journal on Advances in Security"},{"key":"ref16","first-page":"184","article-title":"Self-protection for Distributed Component-Based Applications Stabilization, Safety, and Security of Distributed Systems","volume":"4280","author":"claudel","year":"2006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2011.28"},{"key":"ref18","first-page":"1","article-title":"A Testbed for Adaptive Security for loT in eHealth","author":"woldegeorgis","year":"2013","journal-title":"ASPIC"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/11527800_20","article-title":"Autonomic Computing: An Overview","volume":"3566","author":"parashar","year":"2005","journal-title":"Unconventional Programming Paradigms Springer Berlin Heidelberg"},{"key":"ref4","first-page":"896","article-title":"Autonomic Protection System Using Adaptive Security Policy Computational Science and Its Applications","volume":"3045","author":"park","year":"2004","journal-title":"ICC 2004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1186778.1186782"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.495"},{"key":"ref6","first-page":"13","article-title":"Adaptive Security for the Internet of Things Reference Model","author":"habib","year":"2013","journal-title":"The Sixth Norwegian Information Security Conference NISK'13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1516533.1516538"},{"key":"ref5","first-page":"250","article-title":"Self-protection against attacks in an autonomic computing environment","volume":"17","author":"qu","year":"2010","journal-title":"I J Comput Appl"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"59","DOI":"10.22215\/timreview\/717","article-title":"On the Road to Holistic Decision Making in Adaptive Security","volume":"3","author":"emami-taba","year":"2013","journal-title":"Technology Innovation Management Review Talent First Network"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/482949"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2555611"},{"key":"ref9","first-page":"93","article-title":"An Evaluation Framework for Adaptive Security for the loT in eHealth","volume":"7","author":"leister","year":"2014","journal-title":"International Journal on Advances in Security"},{"key":"ref1","first-page":"73","article-title":"Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth","author":"habib","year":"2015","journal-title":"proceedings of eTelemed 2015 The Seventh International Conference on eHealth Telemedicine and Social Medicine"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2523501.2523507"},{"key":"ref22","first-page":"131","article-title":"Multi-Level Intrusion Detection System (ML-IDS)","author":"ai-nashif","year":"2008","journal-title":"Autonomic Computing ICAC '08"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.082713.00154"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1387229.1387233"},{"journal-title":"Guide to Information Security for the Health Care Sector eHealth Ontario","year":"2010","author":"ash","key":"ref26"},{"journal-title":"Identifying emerging and future risks in remote health monitoring and treatment ENISA","year":"2009","key":"ref25"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2015,7,27]]},"location":"Paris, France","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266525.pdf?arnumber=7266525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T23:28:38Z","timestamp":1567207718000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266525","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}