{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:01:57Z","timestamp":1753520517443},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/percomw.2016.7457163","type":"proceedings-article","created":{"date-parts":[[2016,4,21]],"date-time":"2016-04-21T16:24:49Z","timestamp":1461255889000},"page":"1-6","source":"Crossref","is-referenced-by-count":19,"title":["Invisible and forgotten: Zero-day blooms in the IoT"],"prefix":"10.1109","author":[{"given":"Kartik","family":"Palani","sequence":"first","affiliation":[]},{"given":"Emily","family":"Holt","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.11"},{"key":"ref12","article-title":"The Month of The Browser Bugs Begins","author":"kerner","year":"2006","journal-title":"Internet News Com"},{"key":"ref13","article-title":"Learn from &#x2018;onth of Kernel Bugs&#x2019;","author":"mogull","year":"2006","journal-title":"Gartner"},{"key":"ref14","article-title":"Month of PHP Bugs Begins","author":"prince","year":"2007","journal-title":"eWeek"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227141"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44667-2_9"},{"key":"ref17","article-title":"The Internet of Everything: 2015","author":"greenough","year":"2015","journal-title":"Business Insider Intelligence"},{"journal-title":"Anonymous Clinician","article-title":"Personal communication","year":"0","key":"ref4"},{"key":"ref3","article-title":"High-Profile Mobile Apps At Risk Due to Three- Year-Old Vulnerability","author":"zhang","year":"2015","journal-title":"Trendlabs security intelligence blog"},{"journal-title":"Kaspersky Lab","article-title":"The Echo of Stuxnet","year":"0","key":"ref6"},{"key":"ref5","article-title":"Windows 3.1 Is Still Alive, And It Just Killed a French Airport","author":"longeray","year":"2015","journal-title":"Vice News"},{"key":"ref8","article-title":"Car hack uses digital-radio broadcasts to seize control","author":"vallance","year":"2015","journal-title":"BBC"},{"journal-title":"The GasPot Experiment Unexamined Perils in Using Gas-Tank-Monitoring Systems","year":"2015","author":"wilhoit","key":"ref7"},{"key":"ref2","article-title":"Is Your Toaster a Silent Recruit in a &#x2018;Thingbot&#x2019; Army?","author":"belton","year":"2015","journal-title":"BBC"},{"key":"ref1","article-title":"Police Body Cameras Shipped with Pre-Installed Con-ficker Virus","author":"cimpanu","year":"2015","journal-title":"SOFTPEDIA"},{"key":"ref9","article-title":"Tracking the Blackout Bug","author":"poulsen","year":"2004","journal-title":"Security Focus"}],"event":{"name":"2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","start":{"date-parts":[[2016,3,14]]},"location":"Sydney, Australia","end":{"date-parts":[[2016,3,18]]}},"container-title":["2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7452853\/7457013\/7457163.pdf?arnumber=7457163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T19:18:10Z","timestamp":1475176690000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7457163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/percomw.2016.7457163","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}